Networking Ch 1-10

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz

2.3 GHz, 2.5 GHz, and 3.5 GHZ

IEEE 802.11ac runs on which of the following two different frequency spectrums simultaneously? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz

2.4GHz and 5GHz

The typical range of human hearing is: a. 0 to 4,000 Hz b. 0 to 1,200 Hz c. 20 to 14,000 Hz d. 0 to 300 Hz e. 0 to 56,000 Hz

20 to 14,000 Hz

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

24

The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________. a. 802.11n b. 802.11a c. 802.3 d. 802.11b e. 802.11g

802.11n

Which of the following standards is backward compatible with IEEE802.11a, b, and g? a. 802.11a b. 802.11b c. 802.11g d. 802.11n e. 802.15

802.11n

Which of the following is not a WLAN standard? a. 802.11ac b. 802.11a c. 802.3 d. 802.11b e. 802.11g

802.3

If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is : a. 890 Hz b. 8900 HZ c. 9100 Hz d. 9Khz e. 890 KHz

9100 Hz

The backbone architecture layer that is closest to the users is the a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Access layer

VLANs prioritize traffic based on the ______. a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics

IEEE 802.1q standard

Which of the following is not true about 10/100 Ethernet? a. It is not a hybrid type of Ethernet. b. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time. c. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client's NIC and use 10 Mbps or 100 Mbps, depending on what the client uses. d. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. e. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term.

It is not a hybrid type of Ethernet.

Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting

It is used in token ring protocol LANs

The network architecture component which contains the organization's servers is called the a. LAN b. building backbone c. data center d. enterprise edge e. WAN

data center

Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles

0.5 to 1.5 miles

With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect? a. 01101011 b. 00011011 c. 00100101 d. 10110110 e. 11111110

00011011

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1

1.5

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

1.544 Mbps

________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet

10/100 Ethernet

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a. 256 b. 20 c. 200 d. 512 e. 1024

1024

If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is? a. 128 Kbps b. 64 Kbps c. 12800 bps d. 96 Kbps e. 32000 bps

128 Kbps

The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps

150 Mbps

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps

159.25 Gbps

When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______. a. 24 b. 16 c. 2 d. 8 e. 4

16

How many channels does 802.11g provide for communication with clients, a. 20 b. 12 c. 10 d. 3 e. 8

3

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750

400

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

44.376 Mbps

The probability of detecting an error, given that one has occurred, using parity checking is about: a. 100% b. 0% c. 50% d. 75% e. 98%

50%

The maximum data rate of a an 802.11ad WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps

54 Mbps

The maximum data rate of an 802.11g WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps

54 Mbps

How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels? a. 64 b. 32 c. 16 d. 8 e. 6

6

How many channels does the 802.11ac standard provide for communication between the access point and clients? a. 4 b. 6 c. 8 d. 11 e. 2

8

When converting analog voice data to digital signals, Pulse Code Modulation typically samples the incoming voice signal _______ times per second. a. 8,000 b. 8 c. 18,000 d. 64 e. 256

8,000

According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20

80

802.11g is backward compatible with which type of LAN? a. 802.11a b. 802.11b c. 802.15 d. 802.3 e. 802.5

802.11b

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about: a. 75% b. 0% c. exactly 100% d. 50% e. > 99%

> 99%

____________ is one of the most commonly used coding schemes used in data transmission. a. ASCII b. ISDN c. MAU d. ATM e. FDM

ASCII

_____________ is an effective way to prevent attenuation. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuit d. Changing multiplexing techniques e. Shorting a circuit

Adding repeaters or amplifiers to a circuit

Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.

All of the above are true statements.

With respect to converting digital data into analog signals, AM stands for: a. Asynchronous Manchester b. Analog Multimode c. Amplitude Modulation d. Anomaly Multiplexing e. Analytical Mosaic

Amplitude Modulation

___________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control

Amplitude shift keying

Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.

BYOD stands for a. Bring Your Own Device b. Bring Your Own Database c. Build Your Own Device d. Build Your Own Database

Bring Your Own Device

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS

CRTC

Which of the following is not a controlled access method of media access control? a. Token passing b. CSMA/CD c. polling d. roll call polling e. hub polling

CSMA/CD

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

CSU/DSU

CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance

Carrier Sense Multiple Access with Collision Avoidance

___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation

Circuit loading

Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors. e. Multimedia applications on networks are becoming common.

Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors.

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

Common carriers

The _________ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Core layer

Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva

DEC, Xerox, and Intel

A _________ is an FDM device that splits the physical circuit into three logical circuits (phone, upstream data, downstream data). a. DSL modem b. cable modem c. wireless router d. V.44 modem e. Serial modem

DSL modem

At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge

DSL modem

A DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub

DSL router

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD

DSLAM

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM

DSLAM

___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling

Data rate signaling

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

Dedicated-circuit networks

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services

Directory Services

The _______ is the part of the backbone that connects the LANs together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Distribution layer

Which of the following is a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. 100 Mbps d. WAN e. SNA

Ethernet

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps

Ethernet

WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH

Ethernet LANs

____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission. a. Contracted bits b. Polled bits c. Inverse multiplexed bits d. Flipped bits e. Bit delineation

Flipped bits

_____________ can be thought of as dividing the circuit horizontally. a. Frequency division multiplexing b. Statistical frequency division multiplexing c. Statistical time division multiplexing d. Time division multiplexing e. Wavelength division multiplexing

Frequency division multiplexing

______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message. a. Hamming code b. Huffman encoding c. Front end processing d. Wave division multiplexing e. Hub polling

Hamming code

__________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables

Hubs provide a complicated way to connect network cables

The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language

Hypertext Markup Language

WiGig is standardized as a. IEEE 802.11ad b. IEEE 802.11ac c. IEEE 802.11n d. IEEE 802.11g e. IEEE 802.11a

IEEE 802.11ad

The Internet standards organization that will allow anyone to join is __________________. a. ANSI b. ISO c. IETF d. IEEE e. ITU-T

IETF

The network layer of the Internet model uses the _____________ protocol to route messages though the network. a. TCP b. HTTP c. FTP d. SMTP e. IP

IP

Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. a. gigapop b. autonomous system c. ISP d. IXP e. Service provider

IXP

Tier 1 ISPs connect together and exchange data at ___________. a. IXPs b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center

IXPs

__________can obliterate a group of bits, causing a burst error. a. Cross-talk b. Attenuation c. Impulse noise d. Intermodulation noise e. White noise

Impulse noise

Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network

In designing LAN networks, network designers tend to err on the side of building too small a network

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

Internet Engineering Steering Committee

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

Internet Engineering Task Force

The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

Internet Research Task Force

The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society

Internet Society

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines

Internet service providers

Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. Internet2

Internet2

Which of the following is true with respect to the data link layer? a. It accepts streams of bits from the application layer. b. It is responsible for encoding the bit-stream as a series of electronic voltages. c. It performs error detection. d. It performs routing functions. e. It organizes data from the physical layer and passes these coherent messages directly to the application layer.

It performs error detection.

Which of the following is not a key advantage of digital transmission? a. It permits only low transmission rates. b. It is more efficient. c. It is simpler to integrate voice, video, and data on the same circuit. d. It is more secure. e. It produces fewer errors.

It permits only low transmission rates.

Which of the following is true about roll call polling? a. It can not be modified to increase priority of clients or terminals. b. It does not require a server or host or special device that performs the polling. c. It is also called token passing. d. It is a type of contention approach to media access control. e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal.

It typically involves some waiting because the server has to wait for a response from the polled client or terminal.

Which of the following is true about the data link protocol, SDLC: a. It is a client-server protocol developed by Compaq in 1996. b. It transmits each character independently of one another and includes start and stop bits for each character sent. c. It uses a special bit pattern called a flag at the beginning and end of every frame (or packet). d. It uses a contention media access control protocol and is used in most LANs today. e. It does not have any error detection capabilities.

It uses a special bit pattern called a flag at the beginning and end of every frame (or packet).

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP

L2TP

The network architecture component which enables users to access the network is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN

LAN

LAN bottlenecks are usually found at the: a. data entry keyboard and client video monitors b. LAN server and network circuit c. hub repeaters and transducer circuit modules d. client operating system and diskette drive e. client hard drive and processor

LAN server and network circuit

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

Latency

___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control

Logical topology

With _____________, the AP permits the owner to provide a list of valid addresses that can connect. a. EAP. b. SSID c. WEP d. MAC address filtering e. SWEP

MAC address filtering

Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1

MPLS

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP

MPLS

The earliest type of fiber optic systems were: a. Graded index multimode b. Attenuated c. Multimode d. Single mode e. Step mode

Multimode

The acronym, MIME, refers to: a. Multimedia Internet Mail Enterprise b. Multiple Internet Media Extension c. Multipurpose Internet Mail Extension d. Media Internet Mail Extension e. Multimedia Internet Mime Extension

Multipurpose Internet Mail Extension

_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System

Network Operating System

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy

Next Generation Internet

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.

On a circuit, the shorter the distance, the higher the speed.

Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system

PAD

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN

PAD

__________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer

Peak circuit traffic

_________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

Peering

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking

Peering

________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive. a. Contention b. Polling c. Pooling d. Carrier sense e. CRC

Polling

______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission). a. Line-of-sight effect b. Multimode index c. Saturation effect d. Raindrop attenuation e. Propagation delay

Propagation delay

Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access

QoS

Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE

RAID

RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol

Request for Proposal

With which type of digital signaling does the signal always return to zero volts after each bit? a. Non-return-to-zero signaling b. Unipolar signaling c. Return-to-zero signaling d. Data rate signaling e. Huffman encoding signal

Return-to-zero signaling

__________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization's possible changes in product mix c. Understanding the organization's strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization's projections of sales

Reviewing the NFL scores

A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

Routed backbone

_________ move packets along the backbone based on their network layer address. a. Bridged backbones b. Hubbed backbones c. Multistation access unit backbones d. Routed backbones e. NIC backbones

Routed backbones

_________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet

Securenet

Which of the following statements is correct? a. Parallel transmission is most often used for sending data on a circuit that is made up of one wire. b. Parallel transmission is distinguished from serial transmission by the fact that the transmitting device sends a single bit, then a second bit, and so on, until all the bits are transmitted. c. Parallel transmission is only used for analog data. d. Serial transmission is slower than parallel transmission. e. Parallel transmission is the same as serial transmission.

Serial transmission is slower than parallel transmission.

____ is the process of creating several logically separate servers on the same physical computer. a. Server virtualization b. Server optimization c. Server proliferation d. Server platforming e. Server redundancy

Server virtualization

_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit

Shielding wires

________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users

Simulation

Which of the following is one of the tier 1 ISPs in North America? a. IETF b. IEEE c. IAB d. Sprint e. ISOC

Sprint

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch

Subscriber

A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone

Switched backbone

_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones c. Hubbed backbones d. Bridged backbones e. Multistation access unit backbones

Switched backbones

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location

T-1 VPN

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

T-carrier services

Which of the following is not an application layer standard? a. HTTP b. POP c. T1 d. IMAP e. HTML

T1

Some of the new applications being developed for a high-speed Internet include a.) Tele-immersion b.) Tele-conferencing c.) QoS d.) Broadband e.) Tele-phoning

Tele-immersion

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

The data transmission rates tend to be lower than dial-up or dedicated circuits.

Which of the following is not making the traditional design approach less appropriate for today's networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware

The most expensive part of any network is the hardware

Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to route the packet to the correct circuit/computer. e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily.

The physical topology is the same as the physical topology of shared Ethernet: a ring.

Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.

The switch has a physical bus topology.

Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.

They can only switch messages based on their data link layer addresses.

Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.

They tend to use lower speed circuits than LANs.

_________________ is defined as the total number of information bits divided by the total number of bits in the transmission. a. Asynchronous rate b. Protocol percentage c. Throughput d. Transmission Rate of Information Bits e. Transmission efficiency

Transmission efficiency

TRIB, an acronym that relates to throughput, stands for: a. Throughput Reduction of Information Barriers b. Transmission Rate of Information Bits c. Throughput Rate of Iso-synchronous Bytes d. Transmission Regulation for Inverse-multiplexing Bands e. Trellis-coded Regulation of Information Bits

Transmission Rate of Information Bits

To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library

Uniform Resource Locator

______ is a modem standard that uses Lempel-Ziv encoding to compress data. a. V.22 b. V.44 c. V.32bis d. V.34 e. RS 232

V.44

Which of the following is not a type of synchronous protocol? a. SDLC b. VT100 c. HDLC d. Ethernet e. PPP

VT100

The standards H.320, H.323, and MPEG-2 are commonly used with a. Telnet b. Videoconferencing c. Email d. IM e. Microsoft Office

Videoconferencing

A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

Virtual LAN

Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone

Virtual LAN

A second type of network that a wireless access point provides is a ______ that is secured by a separate password that is entered on a Web page when you first connect to the network. a. WI-LO network b. guest network c. transient network d. IEEE 802.temp e. IEEE 802.11guest

WI-LO network

To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package

Web browser

Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities

When a variety of devices are used in a network, it takes less time to perform network management activities

ARQ means that: a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c. a sender is using a data link protocol called Asynchronous Repeating reQuest d. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines e. a sender is using a parity scheme called Array Resource Quality

a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error

Using parity, the probability for detecting an error, given that one has occurred, is: a. about 50% for either even or odd parity b. about 70% for even parity and 30% for odd parity c. about 30% for even parity and 70% for odd parity d. about 0% for either even or odd parity e. about 100% for either even or odd parity

about 50% for either even or odd parity

A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub

access point

____________ is used by IM and other applications that provide voice services over lower-speed digital circuits. a. pulse code modulation b. adaptive differential pulse code modulation c. Voice conversation d. code modulation e. phase modulation

adaptive differential pulse code modulation

Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines

add hidden nodes

Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network

adding new keyboards to the client computers

The large network purchases are done: a. before the vendor(s) are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendor(s) are selected d. after the vendor(s) are selected e. after the network has been implemented

after the vendor(s) are selected

Microwave transmission: a. is a type of high frequency radio communication b. requires a clear line-of-sight path c. is typically used for long distance data transmission d. does not require the laying of any cable e. all of the above

all of the above

10Base-T: a. supports 10 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct

all of the answers are correct

Which of the following is not a potential bottleneck for LAN performance? a. number and speed of hard disks in the server b. amount of memory in the server c. speed of server's CPU d. network interface card e. all of the answers are potential bottlenecks for LAN performance

all of the answers are potential bottlenecks for LAN performance

The height of a sound wave is called its: a. frequency b. phase c. amplitude d. bandwidth e. furlong

amplitude

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices

an application will have drop down menu choices

In general, older networks and local loops designed to transmit voice data are likely to be ________. a. international b. level 2 c. numeric d. digital e. analog

analog

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

are supported with gigabit fiber optic networks in large cities

How can a set of 802.11b access points be configured to operate without interference? a. assigning each access point a different channel to communicate with clients b. separate each access point by more than 10 meters c. assign the same channel to no more than two access points d. use omnidirectional antennas on some access points and directional on others. e. none of the above

assigning each access point a different channel to communicate with clients

Another term for the weakening of a signal over distance is: a. turnaround time b. propagation delay c. dispersion d. insulation e. attenuation

attenuation

The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is: a. white noise b. spiking c. attenuation d. intermodulation noise e. echo

attenuation

The _____________ of a circuit determines a circuit's capacity. a. frequency b. bandwidth c. phase d. amplitude e. loudness

bandwidth

Which of the following statements is true? a. the longer the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire b. the shorter the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire c. bandwidth is constant across any wire, therefore distance is not relevant to its capacity d. the longer the distance of a telephone wire between sender and recipient, the higher the bandwidth across that wire e. bandwidth is not a term that can be used when discussing telephone transmissions

bandwidth is constant across any wire, therefore distance is not relevant to its capacity

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP

baseline

Errors on a network can occur: a. only on dial-up type of circuits b. because of noise on the line c. only on poorly maintained networks d. only due to Gaussian noise e. only due to lightning strikes

because of noise on the line

Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal

bipolar

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) a. bottleneck b. building backbone c. breakneck d. congested network e. e-commerce edge

bottleneck

Which of the following is a function of the transport layer? a. linking the physical layer to the network layer b. formatting messages by indicating where they start and end c. deciding which route the message should take d. breaking long messages into several smaller messages e. specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it

breaking long messages into several smaller messages

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband

broadband

The network architecture component that is sometimes referred to as the distribution layer is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN

building backbone

Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network

building-block

In a _________ , more than one data bit is changed by the error-causing condition. a. burst error b. data rate shift c. Trellis-coded modulation d. uniform distribution e. amplitude key shift

burst error

The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected

bus

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh

bus

A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet

cable modem

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

cable modem termination system

1000 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 1000Base-SLCX

can run at either full- or half-duplex

Estimating the size and type of the "standard" and "advanced" network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs

capacity planning

_________ is the basic physical layout of the circuit. a. point-to-point configuration b. configuration c. circuit configuration d. circuit design e. circuit plan

circuit configuration

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

cloud-based mesh design

Which of the following would not be part of an "ideal" backbone design for the future? a. access layer composed of 10/100 layer 2 Ethernet switches b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T c. redundant switches d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber e. coax cabling throughout LANs and BN

coax cabling throughout LANs and BN

Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator

codec

A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server

collision server

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS

combiner

Calculating the actual throughput of a data communication network is: a. not normally required for synchronous networks because they are so fast b. complex because many factors affect throughput c. simple because packet size is the primary factor affecting throughput d. not needed for satellite-based networks e. far less complicated if the system operates on a contention basis

complex because many factors affect throughput

With contention: a. computers wait until the circuit is free before they send data b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media c. the front end processor must wait for a response from the polled client or terminal d. one computer starts the poll and passes it to the next computer on the multipoint circuit e. there is never a chance for "collision," or two computers trying to send data at the same time

computers wait until the circuit is free before they send data

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards

connecting optical-electrical converters

Which of the following is not a property of a WAN: a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses leased lines from IXCs like ATT, MCI, and Sprint.

connects a group of computers in a small geographic area such as room, floor, building or campus.

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

connects all computers to one central computer that routes messages to the appropriate computer

With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR)

continuous

Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider

controlling access to a media by more than one computer in a LAN

The biggest drawbacks to VLANs are their_________________. a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size

cost and management complexity

In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

cost assessment

Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system

cost of advertising brochures for new products to be offered by an organization

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point

customer premises

In general, tier 3 ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs

customers

With the two-tier client-server architecture, the server is responsible for the ________ logic. a. application b. presentation c. data access d. session e. physical

data access

The ___________ is where the organization housing its primary servers. a. MDF b. guest house c. SOHO network d. data center e. load balancer

data center

_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

data storage

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

datagram

Which of the following is not a technology layer that is considered when designing backbone networks? a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options

decentralized layer

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

dependent upon the capacity of the central computer for its performance

Transmission speeds: a. are the same among all media b. are not a factor in selecting a media because all media have more than enough speed to serve current communication demands c. are a constant, 56Kbps, for all media types d. differ widely among media e. always have a direct correlation with security

differ widely among media

In general, networks designed to transmit primarily computer data are likely to be ________. a. international b. level 1 c. numeric d. analog e. digital

digital

Two fundamentally different types of data are: a. DSL and ADSL b. asymmetric and symmetric c. Microsoft and IBM d. digital and analog e. local area and wide area

digital and analog

The representation of the character A by the group of 8 bits, 01000001, is an example of: a. digital coding b. phase modulation c. binary modulation d. analog transmission e. pitch variation

digital coding

__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical

directional

There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement

discover

___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination. a. turnaround time b. propagation delay c. dispersion d. insulation e. attenuation

dispersion

A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node

distribution hub

A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint

domain

Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used

dumb terminals

The cheapest time to install network cabling is: a. during the construction of the building b. as soon as the building is completed c. as soon as the building is occupied d. about five years after the building is occupied so that the exact office locations for each network computer is known e. any time that a network needs to be installed

during the construction of the building

The _____ contains the servers that are designed to serve data to customers and suppliers. a. e-commerce edge b. SAN c. LAN d. domain controller e. bottleneck

e-commerce edge

The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the a. LAN b. building backbone c. data center d. enterprise edge e. e-commerce edge

e-commerce edge

Another term for a mail user agent is: a. message transfer agent b. router agent c. e-mail client d. Webcast package e. Web client

e-mail client

Asynchronous transmission: a. is used to transmit each character simultaneously with all other characters b. has a pre-determined, fixed time between sending characters c. is typically used on multipoint half duplex circuits d. uses a continuous series of start bits as an idle signal e. each character is transmitted independently of all other characters

each character is transmitted independently of all other characters

When a signal is reflected back to the transmitting equipment, it is called a(n) _________. a. white noise b. echo c. crosstalk d. attenuation e. impulse noise

echo

Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia

encouraging the use of applications such as medical imaging

Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers

ergonomic chairs for users

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic

failure in one circuit means that the network can most likely continue to function

Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair

fiber

Which of the following is the most secure wired media? a. coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared

fiber optic cable

Which of the following media can best withstand harsh environmental conditions? a. shielded twisted pair b. unshielded twisted pair c. Cat 5 twisted pair d. coaxial cable e. fiber optic cable

fiber optic cable

Which of the following media has the lowest error rates and the highest transmission speeds? a. Coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared

fiber optic cable

Which of the following media is least susceptible to noise? a. fiber optic cable b. coaxial cable c. twisted pair d. unshielded twisted pair e. shielded twisted pair

fiber optic cable

A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server

file server

Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on the growth in network use e. discuss SNA architecture

focus on the growth in network use

A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________. a. ADS b. domain c. forest d. tree e. NDS

forest

A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion

forwarding table

Which of the following is a mode in which a switch operates: a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching

fragment-free switching

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

full mesh design

Having a conversation with someone using a cellular phone is an example of _________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital

full-duplex

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit

giga, gigabit

Circuit capacity on a backbone network will not be improved by: a. going from 100Base-T Ethernet to 10Base-T Ethernet b. going from 100Base-T Ethernet to gigabit Ethernet c. adding additional circuits alongside heavily used ones d. replacing a shared circuit backbone with a switched circuit backbone e. providing a faster circuit to the server

going from 100Base-T Ethernet to 10Base-T Ethernet

The two basic types of media are: a. statistical and frequency b. guided and wireless (radiated) c. local and wide area d. attenuator and Gaussian e. duplexed and non-duplexed

guided and wireless (radiated)

Stop-and-wait ARQ uses ___________ type of data flow. a. full simplex b. half complex c. full duplex d. half duplex e. full complex

half duplex

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital

half-duplex

When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: a. out of range problem b. collision problem c. hidden node problem d. controlled access problem e. media access problem

hidden node problem

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax

hybrid fiber coax

Which of the following is not a step used in newer types of network design processes? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer

implementation

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

imposes an overhead cost by increasing network traffic

To get more "bandwidth" in a digital transmission, you must: a. increase the range of frequencies available for a transmission b. increase the loudness per transmission c. decrease the bits per second transmission speed d. increase the phase shifts per transmission e. decrease the baud rate per transmission

increase the range of frequencies available for a transmission

In communication protocols, _________ are used to convey the user's meaning. a. information bits b. overhead bits c. stop bits d. start bits e. flag bits

information bits

If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of: a. intermodulation noise b. attenuation c. echo d. white noise e. cross-talk

intermodulation noise

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. a. WAN b. BN c. extranet d. intranet e. MAN

intranet

Media access control: a. is not very important in point-to-point with full duplex configuration b. is not very important in local area networks c. is not very important in a point-to-point with a half duplex configuration d. is not very important in a multipoint configuration e. does not control when computers transmit

is not very important in point-to-point with full duplex configuration

In ARQ, a NAK: a. is sent by the recipient if the message was received without error b. is sent by the sender at the same time as it sends a data packet c. is sent by the recipient if the message contains an error d. refers to non-asynchronous Kermit technique e. means that the sender should continue with sending the next message

is sent by the recipient if the message contains an error

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

is typically offered only to commercial customers

Synchronous transmission: a. cannot be used on multipoint circuits b. is used to send one character at a time c. uses start bits before each character to be sent d. uses stop bits after each character to be sent e. is used to transmit a "frame" or "packet" of data at a time

is used to transmit a "frame" or "packet" of data at a time

To estimate costs for large network purchases, organizations often: a. purchase all network purchases 'off the shelf' b. obtain 'book value' information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors

issue an RFP to vendors

Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media

it has a very low capacity

Which of the following is true about the data link protocol, PPP? a. it is commonly used in WANs b. it is a bit-oriented protocol c. it uses block check characters for error detection d. it was developed in the 1960s e. it uses parity bits for error detection

it is commonly used in WANs

Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches

learn addresses by reading the source and destination addresses

Wired Ethernet is a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. . a. host b. legacy c. caching d. hub e. peak

legacy

Optical media is: a. more likely to suffer from noise than electrical media b. has about the same likelihood of suffering from noise as electrical media c. has about the same likelihood of suffering from noise as coaxial cable d. less likely to suffer from noise than electrical media e. more prone to noise than twisted pair media

less likely to suffer from noise than electrical media

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

line splitter

Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice

list of wish list requirements

The ________ acts as a router at the front of the server farm. a. load router b. MDF c. Layer 2 switch d. front-end loader e. load balancer

load balancer

The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3

local loop

____________ refers to the transmission characteristics of the circuit. a. handshaking b. virtual circuit c. bonding d. logical circuit e. physical circuit

logical circuit

The two sublayers of the data link layer consist of the media access control sublayer and the________ . a. logical link control sublayer b. network control sublayer c. session sublayer d. physical sublayer e. transport sublayer

logical link control sublayer

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design

logical network design

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user

low cost

In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack

main distribution center

Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility

main distribution facility

Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer

may also be called TCP/IP gateways

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

messages can take a long time to travel from the sender to the receiver

Which of the following would be considered a type of wireless media? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. microwave e. fiber optics

microwave

__________ is a line-of-sight type of wireless media. a. coaxial cable b. microwave c. radio d. twisted pair e. fiber optic

microwave

In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer

middleware

____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0. a. digitizing. b. sampling c. modulation d. demodulation e. shaping

modulation

The acronym, Modem, stands for _________________. a. multiplexing/demultiplexing b. more/demote c. Mode-M technique d. modulator/demodulator e. Mod emulation technique

modulator/demodulator

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

moving data further from the applications and people who use them

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more

much more

A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal

multiplexer

One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered

n-tier

The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat

narrow and deep

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

needs analysis

A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list

network profile

Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)? a. it is not very popular b. it is a bit-oriented protocol c. it uses block check characters for error detection d. newer version permits jumbo frames e. it uses parity bits for error detection

newer version permits jumbo frames

Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer

non-necessary requirements

Cross-talk: a. occurs when one circuit picks up signals in another b. is always bothersome because it has a high signal strength c. decreases with increased proximity of two wires d. decreases during wet or damp weather e. increases with lower frequency signals

occurs when one circuit picks up signals in another

__________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical

omnidirectional

Frequency division multiplexing: a. operates by statistically time slicing the signal b. operates by dividing the signal into different frequencies c. uses a codec that divides signals into different channels d. operates by time slicing the signal e. operates by light dividing the signal

operates by dividing the signal into different frequencies

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter

optical-electrical converter

Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________. a. overlay networks b. Bluetooth c. cellular networks d. mobile networks e. Ethernet networks

overlay networks

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

packet assembly/disassembly device

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network

packet switched network

Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches

patch cables

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

permanent virtual circuit

A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

The direction in which the sound wave begins is known as: a. amplitude, which our ears detect as loudness b. frequency, which our ears detect as pitch c. phase d. bandwidth e. furlong

phase

Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals? a. phase b. attenuation c. bipolar d. bandwidth e. codec

phase

In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins? a. bandwidth modulation b. amplitude modulation c. frequency modulation d. phase modulation e. codec modulation

phase modulation

Another name for distributed coordination function (DCF) is __________. a. distributed carrier sense method b. physical carrier sense method c. physical carrier sense mode d. distributed carrier sense mode e. distributed coordination mode

physical carrier sense method

Computers can be assigned to a VLAN based on the ________. a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer

physical port on the switch

Which of the following is way to reduce or eliminate crosstalk on a circuit? a. physically separating the cables from other communication cables b. adding repeaters or amplifiers to a circuit c. reducing the length of the cable d. adding fluorescent lights e. shorting a circuit

physically separating the cables from other communication cables

A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange

point-of-presence

Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star

point-to-point

Which is not true about point-to-point circuits? a. point-to-point circuits are dedicated to the use of the two computers. b. point-to-point circuits are more expensive than multipoint circuits. c. point-to-point circuits are called dedicated circuits. d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits. e. point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit.

point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.

The ____________ layer of the OSI model is responsible for data format translation. a. session b. presentation c. physical d. application e. transport

presentation

With the two-tier client-server architecture, the client is responsible for the ________ logic. a. session b. presentation c. data access d. data storage e. networking

presentation

In the three tier architecture, the software on the client computer is responsible for the ____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage

presentation logic

________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

presentation logic

Which of the following is not an important factor to consider when selecting media to be used in a network? a. prestige value of the type of media b. type of network c. cost d. transmission distance e. security

prestige value of the type of media

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

prestige value of using a particular common carrier

The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system

provide the software that performs the functions associated with the physical layer

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only

provides a communications circuit with two 64 Kbps B channels, plus one D channel

10/100 Ethernet: a. uses 100 Mbps throughout the entire network b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use c. uses 10 Mbps throughout 100% of the entire network d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server e. uses 10 Gbps throughout 100% of the entire network

provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server

Which is not a function of the physical layer: a. transmission of bits. b. defining the rules by which one and zeroes are transmitted. c. providing error-free transmission of data. d. providing the physical connection between sender and receiver. e. specifying the type of connection and type of signals, waves or pulses that pass though it.

providing error-free transmission of data.

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT

public utilities commission

Which of the following is not an error detection method used in the data link layer? a. parity checking b. cyclic redundancy checking c. CRC-32 d. pulse code checking e. odd parity

pulse code checking

____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol. a. quadrature amplitude modulation b. time division multiplexing c. synchronous digital line control d. pulse code modulation e. baseband signaling

quadrature amplitude modulation

_____________ refers to the difference between the original analog data and the approximation of that data using the techniques for translating from analog data to digital signals. a. quantizing error b. handshaking phase c. modulating frequency d. POTS anomaly e. amplitude Trellis effect

quantizing error

With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack

rack

The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing

rapidly growing

A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server

remote-access server.

On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. a. amplifiers b. repeaters c. multiplexers d. digitizers e. modems

repeaters

If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)? a. adding one or more additional servers b. upgrading the server's CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable

replacing the cable with fiber optic cable

There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body

request line, request header, request body

Routers: a. require more management than switches b. are not susceptible to time delays c. use data link layer addresses to move packets that leave the subnet d. require only a few set of TCP/IP addresses e. don't need much time to establish separate subnet addresses for each LAN

require more management than switches

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

require more processing by each computer in the network than in star or ring networks

There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header

response status, response header, response body

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

ring design

A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone

routed backbone

Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet

routers can connect two or more networks that use the same data link protocol

Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber)

security (relative to fiber)

Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation

segmentation

When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex

serial

A(n) __________ circuit is another name for a multipoint configuration. a. analog b. dedicated c. point-to-point d. shared e. simplex

shared

Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network

specific routers that have been chosen to implement the proposed network

Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center

specifications for a particular lighting fixture in the network operating center

Another term for impulse noise is: a. Gaussian noise b. spikes c. attenuation d. cross-talk e. intermodulation noise

spikes

The primary source of error in data communications is: a. echoes b. intermodulation noise c. spikes d. attenuation e. cross-talk

spikes

Time (non-statistical) division multiplexing differs from frequency division multiplexing because it: a. does not share a communication circuit b. splits the communication circuit vertically (with time slots) instead of horizontally c. increases the wavelength and phase angles of the baseband frequency used for transmission d. moves the baseband of a circuit by shifting it to a higher frequency e. reduces baseband signal velocity more than frequency division multiplexing

splits the communication circuit vertically (with time slots) instead of horizontally

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

star design

With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. a. open window b. halt and be recognized (HBR) c. sliding window d. stop and wait e. continuous

stop and wait

A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network. a. wide area network b. local area network c. storage area network d. storage server e. local area storage WAN

storage area network

When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe. a. submarine cables b. satellites c. telephone lines d. boats e. modems

submarine cables

Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11

sufficient memory

_____________ is not a form of modulation used to transform digital data into analog signals. a. synchronous time division b. amplitude shift keying c. amplitude modulation d. frequency modulation e. phase modulation

synchronous time division

In __________, the network designer examines the available technologies and assesses which options will meet the users' needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

technology design

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. technology design d. turnpike design e. backplane design

technology design

The room that contains the cable termination points and the distribution frames is referred to as a. telecommunications closet b. equipment room c. building entrance d. backbone room e. work area

telecommunications closet

In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage

the decisions for fundamental technology/protocols and circuit capacity are interrelated

In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue

the goal is to understand what users and applications the network will support

As part of the five-layer network model used in this textbook, the data link layer sits directly between: a. the physical and the application layers b. the network and the application layers c. the network and transport layers d. the physical and the application layers e. the physical and the network layers

the physical and the network layers

Which of the following is not determined by a site survey? a. feasibility of the desired coverage b. potential sources of interference c. the security of the WLAN d. estimated number of access points needed to provide coverage e. current locations of the wired network into which the WLAN will connect.

the security of the WLAN

Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable

there are many more networking devices in a switched backbone network

Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above

to act as a communications server

To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node

total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met

Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options

translating packets from one protocol to another as they enter the BN

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds

tunnels

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan

turnpike effect

The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire

twisted pair

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n

two

To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can: a. increase the CPU of the server b. upgrade to a bigger circuit c. increase the number of hard disks on the server d. increase the amount of disk capacity of the server e. increase the amount of memory of the server

upgrade to a bigger circuit

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

upgrading the circuits between the computers

Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building c. use a star topology with one device, usually a switch d. have a great deal of cable in their backbones e. tend to have less cable, but more network devices

use a star topology with one device, usually a switch

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

uses inverse multiplexing above the OC-1 level

Switch-based Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously

usually enables all attached circuits to send or receive packets simultaneously

Hubs: a. usually incorporate repeaters or amplifiers b. have connection points called handles c. limit the distance of a network to a few meters in length d. are a difficult method to connect network cables e. operate at the application layer

usually incorporate repeaters or amplifiers

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

virtual private network

_____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. a. wardriving b. chalking c. warchalking d. marking e. identifying

warchalking

The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer

wavelength division multiplexer

Fiber to the Home uses a. frequency division multiplexing b. wavelength division multiplexing c. time division multiplexing d. statistical time division multiplexing e. all of the above

wavelength division multiplexing

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above

web server

The familiar background static on radios and telephones is called: a. echoes b. intermodulation noise c. impulse noise d. cross-talk e. white noise

white noise

A(n) _____________ is used in a computer to connect it to a WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub

wireless NIC

In general, controlled approaches: a. work better than contention approaches for small networks that have low usage b. work better than contention approaches for large networks that have high usage c. work better than contention approaches for all sizes of networks d. do not require a host, server, or active monitor to assign media access control e. have many collisions

work better than contention approaches for large networks that have high usage

A ________ is a group of computers linked together so that they act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal

server farm

In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model. a. data link and network b. session, presentation and application c. application layer d. application and presentation e. network, transport and presentation

session, presentation and application

Which of the following is true about ISO: a. It makes technical recommendations about data communications interfaces b. Its name stands for International Organization for Standardization c. It is based in Geneva, Switzerland d. It is one of the most important standards-making bodies e. All of the above

All of the above

____________ is not an important middleware standard. a. CORBA (Common Object Request Broker Architecture b. Distributed Computed Environment (DCE) c. Asynchronous Transfer Mode (ATM) d. Open Database Connectivity (ODBC) e. none of the above is an appropriate answer

Asynchronous Transfer Mode (ATM)

Which of the following would be a standard used at the Data Link layer of the Internet or OSI model? a. IP b. TCP c. Ethernet d. HTTP e. FTP

Ethernet

Which of the following is not a data link layer standard? a. HTTP b. Ethernet c. T1 d. PPP e. Frame Relay

HTTP

Taken together, the physical and data link layers are called the ____________________. a. Internet layer b. Hardware layer c. Internetwork layer d. Application layer

Hardware layer

Which of the following is a term used to group together the physical and data link layers? a. Internetwork layers b. Hardware layers c. Software layers d. Middleware layers e. Application layers

Hardware layers

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. Hypertext Transfer Protocol b. File Transfer Protocol c. Simple Mail Transfer Protocol d. Internet Message Access Protocol e. Hyperlink Transfer Protocol.

Hypertext Transfer Protocol

Which standards body is responsible for the development of local area network (LAN) standards? a. ANSI b. ISO c. IETF d. IEEE e. ITU-T

IEEE

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a. private clouds b. hardware clouds c. storage services d. IaaS

IaaS

Which of the following is not an advantage of instant messaging? a. It usually takes days for an IM message to be delivered to the recipient. b. It allows real time typed messages to be exchanged. c. Some products are ICQ and AOL Instant Messenger. d. It is generally faster than snail-mail. e. It helps people avoid telephone tag.

It usually takes days for an IM message to be delivered to the recipient.

Which of the following is not true about ITU-T: a. It is the technical standards-setting organization of the United Nations International Telecommunications Union b. It is the International Telecommunications Union - Telecommunications Group c. Its membership is limited to U.S. telephone companies d. It is based in Geneva, Switzerland e. Its membership is comprised of representatives from over 200 member countries

Its membership is limited to U.S. telephone companies

In a host-based system with a mainframe, upgrades to the host are _____________. a. Small b. Cheap c. Lumpy d. Never going to happen e. Always performed annually

Lumpy

The software that runs on the mail server is referred to as the ____________ a. Mail transfer agent b. Mail user agent c. Microsoft Outlook d. Web server e. SMTP

Mail transfer agent

Which of the following is not an example of a mail user agent software package? a. Outlook Express b. Microsoft Word c. Eudora d. Microsoft Outlook e. All of these are mail user agent packages

Microsoft Word

Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla

Mosaic

In a ___________ architecture, computers are both client and server, thus sharing the work. a. Host-based b. Client-based c. Client-server d. Peer-to-peer e. Network

Peer-to-peer

One of the most frequently used Telnet applications is a. WS-FTP b. PuTTY c. Outlook d. Word e. FTP

PuTTY

___________ is an orderly close to a dialogue between end users. a. Session termination b. Physical bits c. Frame overhead d. Packet encapsulation e. Message encryption

Session termination

The most commonly used e-mail standard is: a. Simple Mail Transfer Protocol b. X.400 c. CMC d. Post Office Protocol e. Telnet

Simple Mail Transfer Protocol

Which of the following is not a function of the data link layer? a. deciding when to transmit messages over the media b. formatting the message by indicating where messages start and end, and which part is the address c. detecting and correcting any errors that have occurred in the transmission of the message d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it e. controlling the physical layer by determining when to transmit

Specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

__________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets

Standards

Which of the following is not true about Telnet? a. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b. Telnet poses no security threat. c. Telnet was designed in the early days of the Internet. d. Keystrokes are sent over the network in clear text. e. One program that conforms to the Telnet standard is PuTTY.

Telnet poses no security threat.

Which of the following is not true about de jure standards? a. They are always developed before de facto standards. b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body.

They are always developed before de facto standards.

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software

server

Which of the following is not true about de facto standards? a. They never evolve into de jure standards. b. They are those standards that emerge in the marketplace. c. They tend not to be developed by an official industry or government body. d. They are generally supported by more than one vendor but de facto standards have no official standing. e. They tend to emerge based upon the needs/response of the marketplace.

They never evolve into de jure standards.

The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher

Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989

Data communications and networking can be considered as a global area of study because: a. new technologies and applications emerge from a variety of countries and spread around the world b. the technologies enable global communication c. the political and regulatory issues are exactly the same in every country d. a and b e. none of the above

a and b

When a user accesses an application via a web browser on their mobile device, this is referred to as a. a browser-based approach b. a native app c. Internet Explorer d. BYOD

a browser-based approach

A local area network is: a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings.

A backbone network is: a. a high speed central network that connects other networks in a distance spanning up to several miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 200 miles with common carrier circuits.

a high speed central network that connects other networks in a distance spanning up to several miles.

With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic

all data on the server must travel to the client for processing

A network administrator has received several reports from users of the network that the intranet website on one of company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link

application

In which layer of the Internet model would the HTTP standard be used? a. physical b. application c. transport d. network e. data link

application

Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

application access storage

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture

application architecture

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

application logic

Which of the following is not true about a server? a. stores data and software that can be accessed by the client. b. may be a personal computer or a mainframe on the network. c. in client/server computing they work together over the network with client computers to support the business application. d. can only perform one function on a network. e. stores documents and graphics that can be accessed from any Web browser.

can only perform one function on a network.

Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures

can use middleware to provide a standard way of communicating between software from more than one vendor

A _____________ is the input-output hardware device at the end user's end of a communication circuit in a client-server network. a. server b. circuit c. client d. host

client

The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer. a. private b. public c. community d. hybrid

community

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a. hashing b. encryption c. authentication d. identification e. compression

compression

An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

data access logic

Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks

development of online batch systems

The primary reason for networking standards is to: a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor

ensure that hardware and software produced by different vendors can work together

A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet. a. WAN b. BN c. extranet d. intranet e. MAN

extranet

A(n) ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users outside the organization. a. intranet b. Usenet c. Wide Area Network d. extranet

extranet

An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers

is generally more "scalable" than a three-tiered architecture

The American National Standards Institute: a. is the coordinating organization for the United States' national system of standards b. is a professional society in the U.S. whose standards committees focus on local area network standards c. sets the standards that govern how much of the Internet will operate d. is an agency that develops federal information processing standards for the federal government e. makes technical recommendations about global telephone rates

is the coordinating organization for the United States' national system of standards

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent

mail user agent

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a. workstation b. transaction terminal c. cluster d. mainframe e. personal computer

mainframe

A MOOC is an example of a(n) a. BYOD b. massively online technology c. native app d. browser-based technology

massively online technology

The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer

network layer

Networks that are designed to connect similar computers that share data and software with each other are called: a. client/server networks b. peer-to-peer networks c. host networks d. client networks e. local area networks

peer-to-peer networks

IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link

physical

Data is physically transmitted from one computer or terminal to another in the ________ layer. a. physical b. transport c. application d. terminal e. data link

physical

Which of the following correctly represents order of the seven layers of the OSI model from layer 1 to layer 7? a. physical, network, data link, session, transport, application, presentation b. physical, data link, network, transport, session, application, presentation c. physical, data link, network, transport, session, presentation, application d. data link, physical, network, session, transport, application, presentation e. data link, physical, network, transport, session, presentation, application

physical, data link, network, transport, session, presentation, application

A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network

places all or almost all of the application logic on the client

A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network

places all or almost all of the application logic on the server

The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private b. public c. community d. hybrid

private

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand. a. agreement b. standard c. protocol d. regulations e. policy

protocol

The three stages of the de jure standardization process are ______________________. a. specification, identification of choices and acceptance. b. planning, implementing and acceptance. c. brainstorming, identification and implementing. d. specification, formalization, and acceptance. e. none of the above.

specification, identification of choices and acceptance.

The function of the file server is to : a. store data and software programs that can be used by client computers on the network. b. manage all printing requests from clients on the network. c. transfer e-mail messages to other servers on the network. d. store HTML documents for an Internet or intranet web site. e. coordinate the communication of client and servers on the network.

store data and software programs that can be used by client computers on the network.

How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server

the presentation logic is on the client, while the data storage and data access logic are on the server

A response status code of 404 means: a. the requested page was not found b. the server is currently unavailable c. the sever is currently busy d. your browser is incompatible with the Web server software. e. your browser needs to be updated to the latest version.

the requested page was not found

One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

the server can get overloaded since it must process all messages

The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation

transport

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation b. transport c. physical d. session e. application

transport

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation b. transport c. physical d. session e. application

transport

The _________ layer performs error checking which is redundant to some extent with the function of the _________ layer. a. application, presentation b. physical, data link c. transport, data link d. presentation, transport e. network, physical

transport, data link

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. broadcasting b. instant messaging c. webcasting d. H.323 e. Net Meeting.

webcasting


Kaugnay na mga set ng pag-aaral

Nightingale Anatomy Final Chapter 13 & 14

View Set

Strategic Management and Strategic Competitiveness

View Set

Principles of Macroeconomics (Ch. 12, 13, 14, 15)

View Set

Chapter 7 Segmentation, Target Marketing, and Positioning

View Set

Chapter 18 - Vital Signs and Measurement

View Set