Unit 2 Exam - CIS 345
41. ISDN PRI uses ____ B channels and one 64-Kbps D channel. a. 10 c. 23 b. 12 d. 32
23
30. Which wireless networking standard is faster? a. 802.11a b. 802.11b c. 802.11g d. 802.11n
802.11n
27. Why is it a good idea to change your wireless router's password? a. so other people cannot change the router's settings b. so you won't forget it c. to make it the same as your login password d. the default password is most likely too complex
A
14. Which of the following wireless technologies boasts the highest maximum theoretical throughput? a. LTE b. HSPA+ c. 802.11g d. 802.11n
LTE
An IP address reserved for communicating from a node to itself is called: a. Loopback address b. Logical c. IP address d. MAC address
Loopback address
A number that uniquely identifies a network node is referred to as: a. MAC address c. IP address b. Loopback address d. Logical address
MAC address
______ WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points. a. Bus b. Star c. Mesh d. Tiered
Mesh
18. As the network manager for a small business, you have been asked to evaluate high-speed, packet-switched wireless data services that your company's users can use at their desks, in their cars, and at their homes within your metropolitan area. Which two of the following meet those criteria, and are therefore candidates for evaluation? a. 802.11g b. 802.11n c. WiMAX 2 d. HSPA+ e. LTE
WiMAX 2
____ area networks can cover large geographic distances, including the entire Earth. a. Personal b. Local c. Wide d. Universal
Wide
1000Base-SX has a maximum throughput of ____. a. 1 Gbps b. 10 Gbps c. 100 Gbps d. 1000 Gbps
1 Gbps
Which of the following is the type of 10-Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? r. 10GBase-T s. 10GBase-ER t. 10GBase-LR u. 10GBase-SR
10GBase-ER
Which of the following Ethernet standards is specially encoded for transmission over WANs using SONET technology? e. 100Base-T f. 10GBase-ER g. 100Base-FX h. 10GBase-SW
10GBase-SW
55. Which of the following is the type of 10-Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? a. 10GBase-T b. 10GBase-ER c. 10GBase-LR d. 10GBase-SR
10gbase-er
52. Which of the following Ethernet standards is specially encoded for transmission over WANs using SONET technology? a. 100Base-T b. 10GBase-ER c. 100Base-FX d. 10GBase-SW
10gbase-sw
7. What frequency band is used by 802.11b, 802.11g, and 802.11n? a. 1.5 GHz b. 2.4 GHz c. 5 GHz d. 11 GHz
2.4 ghz
8. Your office currently runs a mix of 802.11b and 802.11g clients. Rumor has it that your company is about to merge with another company that uses a different wireless technology. Which of the following would be compatible with what your WLAN currently runs? a. 802.11a b. 802.11n c. Bluetooth d. WiMAX
802.11n
17. Suppose you work for a telecommunications carrier who is looking into providing WiMAX in a suburb of a large city. A colleague suggests that your company reserve licensed frequencies from the FCC for your service. Why? a. Licensed frequencies will suffer less interference than unlicensed frequencies. b. Licensed frequencies allow users to roam farther than unlicensed frequencies. c. Licensed frequencies can use multiple areas of the wireless spectrum at once, thus increasing potential throughput. d. Licensed frequencies require less expensive equipment to transmit and receive than unlicensed frequencies.
A
50. On a 10Base-T network, which of the following best describes how the wires of a UTP cable are used to transmit and receive information? a. One wire pair handles data transmission, while another wire pair handles data reception. b. One wire in one pair handles data transmission, while the other wire in the same pair handles data reception. c. Three wires of two wire pairs handle both data transmission and reception, while the fourth wire acts as a ground. d. All four wires of two wire pairs handle both data transmission and reception.
A
51. What technique is used to achieve 1-Gbps throughput over a Cat 5 cable? a. All four wire pairs are used for both transmission and reception. b. The cable is encased in a special conduit to prevent signal degradation due to noise. c. Signals are issued as pulses of light, rather than pulses of electric current. d. Data is encapsulated by a unique type of frame that allows rapid data compression.
A
22. Which of the following are potential disadvantages of wireless LANs as compared with cabled LANs? a. Controlling access to a wireless LAN is more difficult. b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN. c. The additional protocols required by wireless LANs create additional overhead. d. Signal strength can be affected by many sources of electronic noise.
A,B and D
2. Which of the following is not true about multipath signaling? a. The more obstacles a wireless signal reflects or diffracts off, the better chance it has of reaching its destination. b. Multipath signaling uses less energy and results in clearer reception than line-of-sight signaling. c. Given that they follow multiple paths to their destination, signals will arrive at the same destination at slightly different times. d. The more obstacles between a wireless transmitter and receiver, the more signal fading will occur.
B
25. Why is a wireless signal susceptible to noise? a. Wireless NICs are usually poorly made. b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable. c. Wireless NICs do not support the network protocols necessary for error correction. d. Wireless NICs rely on the upper levels of the OSI model for error correction.
B
6. Suppose a user on your office network has changed the channel on which his wireless NIC communicates. Assuming the wireless connection is his only access to the LAN, what will happen when he next tries to send an e-mail? a. The e-mail program will take longer than usual to send his message. b. The e-mail program will respond with a message indicating it could not connect to the mail server. c. The e-mail program will send the message without problems. d. The e-mail program will request the user to supply his logon credentials again before sending the message.
B
65. You are asked to configure a backbone switch that connects servers supplying weather data to mariners and pilots around the world. Your network's traffic load is very high at all times, day and night. What type of switching do you configure the switch to use? a. Bypass switching b. Store-and-forward switching c. Cut-through switching d. Message switching
B
What is an advantage of using a parallel backbone over a collapsed backbone? a. A collapsed backbone requires too many connecting devices. b. A parallel backbone uses redundant connections and is more reliable. c. A collapsed backbone uses redundant connections, which costs more money. d. A parallel backbone uses fewer redundant connections, which costs less money.
B
The ____ is the main telecommunications line through the network, connecting the major router sites across the country. a. star topology b. ARPANET c. mid-level network d. backbone
Backbone
Which of the following is a connectivity device that operates at the Data Link layer of the OSI model and reads header information to forward packets according to their MAC addresses? a. Bridge b. Buffering c. Dynamic routing d. Firewall
Bridge
When a node on a wide area network ____ network transmits its data, the data is received by all the other nodes. a. broadcast b. packet-switched c. circuit-switched d. datagram packet-switched
Broadcast
Which of the following refers to the transmission to all nodes on a network? a. Broadcast b. Peering c. Sequencing d. Encryption
Broadcast
21. In which of the following ways does a wireless LAN differ from an Ethernet LAN? a. A wireless LAN requires additional protocols in the TCP/IP suite. b. A wireless LAN uses completely different protocols than an Ethernet LAN. c. A wireless LAN uses different techniques at the Physical layer to transmit data. d. A wireless LAN uses different techniques at the Data Link layer to transmit frames.
C
24. You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN? a. Wireless LAN users have the same access as users attached to the Ethernet network. b. Wireless LAN users may surf the Web, but may not access the rest of the bank's network. c. Wireless LAN users may surf the Web, but may not access the rest of the bank's network without special security software. d. Wireless LAN users must use their own wireless ISP.
C
4. Which of the following 802.11 transmission requirements contributes to its inefficiency? a. Before it can associate, a station must listen for an access point's beacon on every channel within its frequency range. b. A source node must regularly ping the access point to ensure it is still available for transmitting data to the rest of the stations. c. A destination node must issue an acknowledgment for every packet that is received intact. d. Before transmitting, a source node must check to ensure the access point has not changed its SSID.
C
70. What is a router's convergence time? a. The time a router takes to interpret Layer 2 addressing information for any given frame b. The maximum amount of time a router is allowed for choosing the best path c. The time it takes for a router to recognize a best path in the event of a change or network outage d. The time it takes for border routers to exchange routing table information
C
How do bridges keep track of whether they should forward or filter frames? a. From each frame they receive, they extract source addresses; those frames whose source addresses don't belong to the bridge's broadcast domain are filtered. b. They hold each frame until it is requested by the destination node, at which time the bridge forwards the data to the correct segment based on its MAC address. c. They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address. d. They compare the incoming frame's network address to known addresses on both segments and filter those that don't belong to either.
C
What is a router's convergence time? a. The time a router takes to interpret Layer 2 addressing information for any given frame b. The maximum amount of time a router is allowed for choosing the best path c. The time it takes for a router to recognize a best path in the event of a change or network outage d. The time it takes for border routers to exchange routing table information
C
Which of the following is a difference between a router and a hub? a. A router is less sophisticated than a hub. b. A router operates at the Transport layer of the OSI model, whereas a hub operates at the Data Link layer of the OSI model. c. A router operates at the Network layer of the OSI model, whereas a hub operates at the Physical layer of the OSI model. d. A router regenerates signals, whereas a hub interprets addressing information to ensure that data is directed to the proper destination.
C
All Ethernet networks, independent of their speed or frame type, use an access method called ____. a. CSMA b. CSMA/DC c. CSAM/CD d. CSMA/CD
CSMA/CD
A ____ network is the only network that offers a dedicated path. a. packet-switched b. broadcast c. virtual circuit d. circuit-switched
Circuit-switched
____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur. a. Broadcast b. Wireless c. Circuit-switched d. Datagram
Circuit-switched
45. Which of the following backbone types will be down if the central router fails? a. Parallel backbone b. Collapsed backbone c. Distributed backbone d. Serial backbone
Collapsed backbone
The interval during which the signals propagate down the bus and back is the ____. a. exponential backoff b. collision window c. attenuation d. bounce window
Collision Window
On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time. a. collision domain b. crash domain c. interference domain d. broadcast domain
Collision domain
47. What happens in CSMA/CD when a node detects that its data has suffered a collision? a. It immediately retransmits the data. b. It signals to the other nodes that it is about to retransmit the data, and then does so. c. It waits for a random period of time before checking the network for activity, and then retransmits the data. D. It signals to the network that its data was damaged in a collision, waits a brief period of time before checking the network for activity, and then retransmits the data
D
67. Why is a large, busy network more likely to use dynamic routing? a. Because dynamic routing is the default option on most routers, and it is difficult to configure routers to use static routing b. Because dynamic routing is the only routing method compatible with the BGP routing protocol, which is necessary for routing between WANs c. Because dynamic routing allows for stricter IP filtering and, therefore, offers greater data security than static routing d. Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error
D
Which of the following is a method of routing that automatically calculates the best path between two nodes and accumulates this information in a routing table? a. Digital loop carrier b. Bus c. Dynamic routing d. Modular router
Dynamic routing
12. Which two of the following techniques help to reduce overhead in 802.11n wireless transmission? a. CSMA/CA b. Asynchronous communication c. Frame aggregation d. Spread-spectrum signaling e. Channel bonding
Frame aggregation and channel bonding
In cut-through switching, which frame field does the switch never read? a. Start frame delimiter b. Source address c. Frame check sequence d. Protocol type
Frame check sequence
42. ___ is an updated, digital version of X.25 that also relies on packet switching. a. DSL c. Frame relay b. ISDN d. ATM
Frame relay
A combination of networking hardware and software that connects two dissimilar kinds of networks, is known as: a. Expansion slot b. Bridge c. Bus d. Gateway
Gateway
43. Why is packet switching more efficient than circuit switching? e. In packet switching, packets are synchronized according to a timing mechanism in the switch. f. In packet switching, two communicating nodes establish a channel first, then begin transmitting, thus ensuring a reliable connection and eliminating the need to retransmit. g. In packet switching, small pieces of data are sent to an intermediate node and reassembled before being transmitted, en masse, to the destination node. h. In packet switching, packets can take the quickest route between nodes and arrive independently of when other packets in their data stream arrive.
H
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. a. hub b. switch c. router d. repeater
Hub
Which two of the following might cause excessive data collisions on an Ethernet network? i. A server on the network contains a faulty NIC. j. A router on the network is mistakenly forwarding packets to the wrong segment. k. The overall network length exceeds IEEE 802.3 standards for that network type. l. A switch on the network has established multiple circuits for a single path between two nodes. m. The network attempts to use two incompatible frame types.
I and K
46. You are part of a team of engineers who work for an ISP that connects large data centers, telephone companies, and their customers throughout California and Oregon. Management has decided that the company can make large profits by promising the utmost QoS to certain high-profile customers. Which of the following switching methods will best guarantee the promised QoS? a. Circuit switching b. MPLS c. Packet switching d. Message switching
MPLS
40. ____ lets a router represent an entire local area network to the Internet as a single IP address. a. ICMP c. ARP b. NAT d. UDP
NAT
Which of the following factors is not considered when OSPF determines the best path for a packet? a. Link failure b. Number of hops c. Throughput d. Latency
Number of hops
If you are purchasing a new desktop computer today, which expansion board NIC would provide the highest transmission rate? a. PCI b. Firewire c. PCIe d. ISA
PCIe
44. Which of the following backbone types is the most fault-tolerant? a. Parallel backbone b. Collapsed backbone c. Distributed backbone d. Serial backbone
Parallel backbone
WANs typically send data over ____ available communications networks. a. privately b. publicly c. individually d. serially
Privately
11. When a mobile WLAN user roams from access point A's range into access point B's range, what does it do automatically to maintain network connectivity? a. Associate with access point B in order to communicate with access point A b. Reassociate with access point B c. Reestablish its connection with access point A on another channel d. Nothing; the user must reestablish network connectivity manually
Reassociate with access point B
In a ring network, each workstation acts as a(n) ____ for the transmission. a. repeater c. terminator b. amplifier d. manager
Repeater
The SONET network topology is a ____. a. star b. ring c. bus d. star-bus
Ring
The ____ is used to connect local area networks to wide area networks. a. hub b. repeater c. router d. bridge
Router
You are asked to configure a backbone switch that connects servers supplying weather data to mariners and pilots around the world. Your network's traffic load is very high at all times, day and night. What type of switching do you configure the switch to use? a. Bypass switching b. Store-and-forward switching c. Cut-through switching d. Message switching
Store-and-forward switching
The primary goal of a(n) ____ is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network. a. hub b. switch c. repeater d. amplifier
Switch
Which of the following distinguishes switches from repeating devices, such as hubs? a. Switches separate collision domains. b. Switches separate broadcast domains. c. Switches can alert the network administrator to high data collision rates. d. Switches do not examine Network layer protocol information, which makes them faster than repeating devices.
Switches separate collision domains.
____ cabling has become the preferred medium for star-wired bus topologies. a. Twisted pair b. Coaxial c. Fiber-optic d. FDDI
Twisted pair
In which of the following examples do the workstations necessarily share a collision domain? n. Two computers connected to the same hub o. Two computers connected to the same switch p. Two computers connected to the same router q. Two computers connected to the same access server
Two computers connected to the same hub
49. You are designing a 100Base-T network to connect groups of workstations in two different offices in your building. The offices are approximately 250 meters apart. If you only use repeating devices to connect the workstation groups, how many hubs will you need? aa. One bb. Two cc. Three dd. Four
Two or Three
60. If the on-board NIC on your office laptop stops working, and you are connected to a 1-Gigabit Ethernet wired network, which type of NIC connector replacement would provide best performance? e. Firewire f. The Best Wireless Adapter g. PCMCI h. USB Version 3
USB version 3
If the on-board NIC on your office laptop stops working, and you are connected to a 1-Gigabit Ethernet network, which type of NIC connector replacement would provide best performance? a. USB b. Firewire c. PCMCI d. USB Version 3
USB version 3
41. A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. a. NAT network c. DHCP b. TCP network d. virtual private network (VPN)
VPN
39. _________________ are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes. a. Packet Switches c. ETM switches b. Virtual Private Switches d. Virtual circuits
Virtual circuits
48. The maximum segment length for a 1000Base-FX network depends on which two of the following? a. Voltage b. Wavelength c. Frame type d. Priority labeling e. Fiber core diameter f.
Wavelength and Fiber core Diameter
The maximum segment length for a 1000Base-FX network depends on which two of the following? v. Voltage w. Wavelength x. Frame type y. Priority labeling z. Fiber core diameter
Wavelength and Fiber core diameter
53. Which two of the following might cause excessive data collisions on an Ethernet network? a. A server on the network contains a faulty NIC. b. A router on the network is mistakenly forwarding packets to the wrong segment. c. The overall network length exceeds IEEE 802.3 standards for that network type. d. A switch on the network has established multiple circuits for a single path between two nodes. e. The network attempts to use two incompatible frame types.
a and c
9. If your wireless stations are configured to perform passive scanning, what do they need from an access point to initiate association? a. A request to send b. An alert frame c. A beacon frame d. Nothing; they will find the access point on their own
a beacon frame
23. How is a wireless NIC different from a NIC that requires a cable? a. A wireless NIC contains an antenna. b. A wireless NIC contains a chip, which does additional processing at higher levels of the OSI model. c. A wireless NIC requires an external power source. d. A wireless NIC requires an external antenna.
a wireless NIC contains an antenna
13. Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal? a. The optimal quantity and locations of access points for the WLAN b. All potential sources of EMI c. The distance between each workgroup area and telco room d. All of the above
all the above
66. Which of the following routing protocols is used on the Internet's backbone? a. EIGRP b. OSPF c. BGP d. RIP
bgp
15. Which of the following will help an access point's transmissions reach farther? a. Limiting the number of stations that may associate with the access point b. Boosting its signal strength c. Using the highest possible channel in the frequency band d. Configuring it to use 802.11n only
boosting its signal strength
42 What is the minimum cabling standard required for 10GBase-T Ethernet? a. MMF b. Cat 3 c. Cat 5 d. Cat 6
cat 6
5. In the 802.11 standard, IEEE specifies what type of access method? a. Beacon passing b. Demand priority c. CSMA/CD d. CSMA/CA
csma/ca
38. SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable. a. throughput c. fault tolerance b. low cost d. latency
fault tolerance
43. What sets ATM apart from Ethernet is its ____ size. a. channel c. variable packet size b. frame d. fixed packet size
fixed packet size
72. Which of the following WAN topologies comes with the highest availability and the greatest cost? a. Bus b. Tiered c. Partial mesh d. Full mesh
full mesh
20. Which of the following types of satellites is used to provide satellite data services? a. Geosynchronous orbit b. Low Earth orbit c. Medium Earth orbit d. High Earth orbit
geosynchronous orbit
3. You are setting up a WLAN for an insurance agency. The network includes 32 clients, three printers, two servers, and a DSL modem for Internet connectivity. What type of WLAN architecture would best suit this office? a. Ad hoc b. Interstitial c. Infrastructure d. Round robin
infrastructure
68. A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device? a. It is returned to the node that originally transmitted it. b. It is encapsulated by the routing protocol and retransmitted. c. It is forwarded to its destination by the last device. d. It is discarded.
it is discarded
71 Which of the following elements of the PSTN is most likely capable of transmitting only analog signals? a. Central office b. Local loop c. CSU/DSU d. Remote switching facility
local loop
61. You are working on a 100Base-T network. A coworker has been having trouble logging on to the server and asks whether you can quickly tell her if her workstation's NIC is operating properly. You do not have the NIC's utility disk, but you look at the back of her workstation and learn that although the NIC is properly installed and connected to the network, something's wrong with it. What might you have seen that causes you to come to this conclusion? a. Its activity LED is blinking green. b. Its loopback plug is improperly terminated. c. It has two types of receptacles—SC and RJ-45—and the wrong one is in use. d. None of its LEDs are lit.
none of its less are lit
69. Which of the following factors is not considered when OSPF determines the best path for a packet? a. Link failure b. Number of hops c. Throughput d. Latency
number of hops
1. To transmit and receive signals to and from multiple nodes in a three-story office building, what type of antenna should an access point use? a. Omnidirectional b. Unidirectional c. Bidirectional d. Tri-directional
omnidirectional
29. What type of connection is used to attach a laptop to the network port on a wireless router? e. none, its wireless f. USB g. serial h. patch cable
patch cable
56. If you are purchasing a new desktop computer today, which expansion board NIC would provide the highest transmission rate? a. PCI b. Firewire c. PCIe d. ISA
pcie
16. What part of a cellular network manages handoff? a. The client b. The base station c. The MSC d. The central office
the base station
10. You're working on a school district's 802.11n WLAN. Within each school, several access points serve students, teachers, and administrators. So that users can move about the school with their laptops and not lose network connectivity, each of the access points must share which of the following? a. The same ESSID b. The same make and model c. The same average distance to the client d. The same location
the same essid
26. How is a wireless router's configuration utility usually accessed? a. by flashing the RAM BIOS b. through a Web browser c. with the Windows Cfrtr utility d. from the command line
through a web browser
54. In which of the following examples do the workstations necessarily share a collision domain? a. Two computers connected to the same hub b. Two computers connected to the same switch c. Two computers connected to the same router d. Two computers connected to the same access server
two computers connected to the same hub
The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium. a. coaxial b. twisted pair c. fiber d. atmosphere
Twisted pair
The ____ topology consists of a simple cable, or bus, to which all devices attach. a. bus/tree b. token ring c. ring star d. star
bus/tree
