Business Data Communications & Networking Quiz Bank Ch 1-12
The data rate for a T-1 circuit in North America is: 1.544 Mbps 6.312 Mbps 44.376 Mbps 274.176 Mbps 1.544 Gbps
1.544 Mbps
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. 200 256 1024 42.____________ is one of the most commonly used coding schemes used in data transmission. *a. ASCII b. ISDN c. MAU d. ATM e. FDM 512 20
1024 (2^10)
In North America, a T1 circuit has ______ 64Kbps channels. 2 30 24 12 36
24
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. 11111111.0.0.0 255.255.255.255 255.255.0.0 255.0.0.0 255.255.255.0
255.255.0.0
The backbone architecture layer that is closest to the users is the Access layer Distribution layer Core layer Privacy layer Switched layer
Access layer
_____________ is an effective way to prevent attenuation. Shielding wires Shorting a circuit Adding fluorescent lights Adding repeaters or amplifiers to a circuit Changing multiplexing techniques
Adding repeaters or amplifiers to a circuit
A(n) _________ is a specially formatted request used to perform IP address to data link address resolution. HTTP request Autonomous System Request Link state request Address Resolution Protocol (ARP) request Domain Name Service (DNS) Request
Address Resolution Protocol (ARP) request
CSMA/CA is an acronym for: Carrier Sense Multiple Acknowledgment with Collision Avoidance Carrier Sensory Multiple Access without Collision Acknowledgment Carrier Sense Multiple Access with Collision Acknowledgment Carrier Sense Mode Access with Carrier Avoidance Carrier Sense Multiple Access with Collision Avoidance
Carrier Sense Multiple Access with Collision Avoidance
The _________ is the part of the backbone that connects the different backbones together. Access layer Distribution layer Core layer Privacy layer Switched layer
Core layer
Ethernet LAN was developed by: CERN laboratory in Geneva DEC, Xerox, and Intel University of Minnesota IBM ARPANET
DEC, Xerox, and Intel
The _______ is the part of the backbone that connects the LANs together. Access layer Distribution layer Core layer Privacy layer Switched layer
Distribution layer
Server name resolution is done using the: Routing Information Protocol Border Gateway Protocol Address Resolution Protocol Domain Name Service Internet Control Message Protocol
Domain Name Service
Which of the following is a term used to group together the physical and data link layers? Hardware layers Middleware layers Software layers Internetwork layers Application layers
Hardware Layers
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. Internet Message Access Protocol File Transfer Protocol Simple Mail Transfer Protocol Hypertext Transfer Protocol Hyperlink Transfer Protocol.
Hypertext Transfer Protocol
Which of the following new Internet efforts was started by 34 universities? CA*net 3 NGI vBNS Internet2 ARDNOC
Internet2
___________ is how the network works conceptually. Physical topology Network topology Ethernet Media access control Logical topology
Logical topology
The software that runs on the mail server is referred to as the ____________ Mail transfer agent Web server Mail user agent Microsoft Outlook SMTP
Mail transfer agent
The acronym, MIME, refers to: Multiple Internet Media Extension Multimedia Internet Mime Extension Multimedia Internet Mail Enterprise Multipurpose Internet Mail Extension Media Internet Mail Extension
Multipurpose Internet Mail Extension
Which of the following statements is true in regards to DSL? On a circuit, the longer the distance, less attenuation occurs. When more attenuation occurs, higher frequency signals can be used effectively. On a circuit, the longer the distance, the higher the speed. On a circuit, the shorter the distance, the higher the speed. On a circuit, the shorter the distance, more attenuation occurs.
On a circuit, the shorter the distance, the higher the speed.
In a ___________ architecture, computers are both client and server, thus sharing the work. Client-based Network Host-based Peer-to-peer Client-server
Peer-to-peer
The direction in which the sound wave begins is known as: bandwidth amplitude, which our ears detect as loudness furlong frequency, which our ears detect as pitch phase
Phase
_________ move packets along the backbone based on their network layer address. Bridged backbones Hubbed backbones Multistation access unit backbones Routed backbones NIC backbones
Routed backbones
____ is the process of creating several logically separate servers on the same physical computer. Server proliferation Server redundancy Server virtualization Server platforming Server optimization
Server virtualization
________ is used to model the behavior of the planned communication network once the proposed network map is complete. Simulation Post-implementation review Implementation Documentation Training users
Simulation
A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. Bridged backbone Virtual LAN Hubbed backbone Switched backbone Routed backbone 815. Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building *c. use a star topology with one interconnect device, usually a switch d. switch the traffic based on layer 3 addresses e. require much more management that do routed backbone networks
Switched backbone
_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world. TCP/IP IPX/SPX SDLC SNA X.25
TCP/IP
Which of the following is true regarding switched backbones? They place all network devices for one part of the building physically in the same room, often in a rack of equipment They have an advantage of requiring less cable They make it more difficult to move computers from one LAN to another Network capacity is always tied to the physical location of the computers They are harder to maintain and upgrade than a BN that is not rack-based
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
_________________ is defined as the total number of information bits divided by the total number of bits in the transmission. Throughput Asynchronous rate Transmission efficiency Transmission Rate of Information Bits Protocol percentage
Transmission efficiency
To get a page from the Web, a user must type in a URL, which stands for: Uniform Router Location Unknown Resource Locator Uniform Resource Locator Unknown Router Location Uniform Resource Library
Uniform Resource Locator
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. none of the above WLANs WAN extranet intranet
WLANs
A local area network is: a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning exactly 10 miles with common carrier circuits. a large central network that connects other networks in a distance spanning exactly 5 miles. a network spanning a large geographical area (up to 1000s of miles).
a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.
A sniffer program is a: a program that records all LAN messages received for later analysis used in a call-back modem secure hub program small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location type of macro-virus
a program that records all LAN messages received for later analysis
A(n) ___________ is a radio transceiver that plays the same role as a hub in a wired network and connects the WLAN to the wired network. antennae access point Ethernet NIC hub wireless NIC
access point
Symmetric encryption systems have two parts: the key and the ____________. IP spoofer spamming method algorithm clearance code smart card bits
algorithm
The height of a sound wave is called its: frequency amplitude phase furlong bandwidth
amplitude
In which layer of the Internet model would the HTTP protocol be used? application transport network data link physical
application
A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. anonymous FTP application architecture response status architecture fat client data access logic
application architecture
The _____________ of a circuit determines a circuit's capacity. bandwidth phase amplitude loudness frequency
bandwidth
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) bottleneck congested network e-commerce edge breakneck building backbone
bottleneck
A digital service offered by cable companies is the _________. G.Lite ADSL Next Generation Internet Abilene network cable modem WAP proxy
cable modem
Dynamic addressing: makes network management more complicated in dial-up networks is always performed for servers only assigns a permanent network layer address to a client computer in a network can solve many updating headaches for network managers who have large, growing, changing networks has only one standard, bootp
can solve many updating headaches for network managers who have large, growing, changing networks
The three fundamental approaches to routing are: circuitous, flat, and direct routing connectionless, static, and connection-oriented host, client, and client-server routing centralized, static routing, and dynamic routing subordinate, master, and insubordinate routing
centralized, static routing, and dynamic routing
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. certificate authority DES company disaster recovery firm fingerprint advisory board directory company
certificate authority
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: sniffing Trojan horse computer forensics tunneling misuse detection
computer forensics
With contention: there is never a chance for "collision," or two computers trying to send data at the same time computers wait until the circuit is free before they send data one computer starts the poll and passes it to the next computer on the multipoint circuit the front-end processor must wait for a response from the polled client or terminal the server or front-end processor works consecutively through a list of clients to determine who should have access to the media
computers wait until the circuit is free before they send data
Routers: connect different IP networks or subnetworks typically do not require any configuration by the network administrator use data link layer addresses to move packets that leave the subnet typically require only one TCP/IP address do less processing on packets than a layer 2 switch doe
connect different IP networks or subnetworks
Media access control refers to: security over floppy disks in a user environment controlling access to a media by more than one computer in a LAN the ability for a user to use multimedia equipment in a LAN the control over coax cable installed by a cable service provider the price of fiber optic cable
controlling access to a media by more than one computer in a LAN
________ controls fix a trespass into the network. corrective detective backup preventive mitigating
corrective
The biggest drawbacks to VLANs are their_________________. cost and management complexity size and contention contention and cost learning curve and contention speed and size
cost and management complexity
In the __________ step of the building-block process to network design, the network designer considers the relative cost of the technology options. needs analysis distribution layering technology design narrow and deep analysis cost assessment
cost assessment
With the two-tier client-server architecture, the server is responsible for the ________ logic. presentation session data access physical application
data access
An example of _____ of data would be if a computer virus eliminated files on that computer. disaster disruption controlled chaos intrusion destruction
destruction
________ controls discover unwanted events. detective mitigating corrective preventive backup
detective
__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. microware directional radio vertical omnidirectional
directional
A tornado that eliminates a network control center would be an example of a natural __________ disruption intrusion disaster controlled chaos destruction
disaster
A network switch failure is an example of a(n) ________ threat. intrusion disaster internal disruptive causal
disruptive
To snare intruders, many organizations now use _________ techniques. Trojan horse entrapment DES hacker cracker
entrapment
Which of the following media is least susceptible to noise? twisted pair unshielded twisted pair coaxial cable shielded twisted pair fiber optic cable
fiber optic cable
IP spoofing means to: illegally tape or listen in on telephone conversations act as an intermediate host computer between the Internet and the rest of the organization's networks fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network detect and prevent denial-of-service attacks clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation
fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
A switch uses a _____________ that is very similar to a routing table used in a router. reversing table cable plan forwarding table network server switching mullion
forwarding table
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. full mesh design ring design star design bus design partial mesh design
full mesh design
Having a conversation with someone using a cellular phone is an example of _________ transmission. analog half-duplex full-duplex simplex digital
full-duplex
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. half-duplex analog digital full-duplex simplex
half-duplex
When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: out of range problem hidden node problem media access problem controlled access problem collision problem
hidden node problem
Media access control: does not control when computers transmit is not very important in point-to-point with full duplex configuration is not very important in a multipoint configuration is not very important in local area networks is not very important in a point-to-point with a half duplex configuration
is not very important in point-to-point with full duplex configuration
In ARQ, a NAK: is sent by the sender at the same time as it sends a data packet means that the sender should continue with sending the next message is sent by the recipient if the message was received without error refers to non-asynchronous Kermit technique is sent by the recipient if the message contains an error
is sent by the recipient if the message contains an error
To estimate costs for large network purchases, organizations often: ask other companies for an itemized list of their previous year's IT equipment purchases issue an RFP to vendors purchase all network purchases "off the shelf" obtain "book value" information for the existing network from the accounting department multiply old network costs by a factor of 3
issue an RFP to vendors
Which of the following is a primary advantage of a VPN in comparison to a private WAN connection? low cost inflexibility unpredictable traffic congestion security complexity to the user
low cost
In a ring design WAN, messages can take a long time to travel from the sender to the receiver a message arrives at all computers on the network simultaneously messages always arrive faster than in other types of layouts messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver messages always take one second to travel between sender and receiver
messages can take a long time to travel from the sender to the receiver
A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. intelligent terminal inverse multiplexer multiplexer transponder codec
multiplexer
In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. needs analysis distribution layering technology design narrow and deep analysis cost assessment
needs analysis
Cross-talk: decreases with increased proximity of two wires is always bothersome because it has a high signal strength decreases during wet or damp weather increases with lower frequency signals occurs when one circuit picks up signals in another
occurs when one circuit picks up signals in another
__________ antennas transmit the signal in all directions. radio omnidirectional microware vertical directional
omnidirectional
Frequency division multiplexing: operates by statistically time slicing the signal uses a codec that divides signals into different channels operates by time slicing the signal operates by dividing the signal into different frequencies operates by light dividing the signal
operates by dividing the signal into different frequencies
A _____________ is a user's connection into a packet switched service. packet analog/digital device packet asynchronous/discrete device packet asymmetric/data transmission device packet assembly/disassembly device packet analyzer/decoder device
packet assembly/disassembly device
Devices in a rack are connected together using ___________. patch cables string servers modules chassis switches
patch cables
Networks that are designed to connect similar computers that share data and software with each other are called: host networks local area networks client networks client/server networks peer-to-peer networks
peer-to-peer networks
A _________ is a connection-oriented approach to sending packets on a packet switched service. permanent virtual circuit datagram histogram bursty packet fractional T-1 network
permanent virtual circuit
A logical bus topology: has a central control device, such as a mainframe is limited to short distances since devices like a hub or repeater cannot be used with this type of topology permits every message to be received by every computer on the bus, even when those messages are intended for other computers is always used by token ring protocol LANs has all computers connected to each other in point-to-point connections
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
A "thin client" architecture approach: always is an n-tiered architecture always is a two-tier network architecture places all or almost all of the application logic on the client places all or almost all of the application logic on the server refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the server
A _________ is the place at which the ISP provides services to its customers. metropolitan area exchange network access point remote access point point-of-presence cable modem termination system endpoint
point-of-presence
Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. multipoint ring point-to-point shared star
point-to-point
Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: data link layer address IP address application layer address port address network address
port address
The traditional network design approach does not work well for _________ networks. modestly growing not growing 71. Which of the following type of media is most commonly used in backbone networks because of its high capacity? *a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair static rapidly growing slowly evolving
rapidly growing
The key principle in preventing disruption, destruction and disaster is ___________. control spreadsheet redundancy prevention controls anti-virus software IDS
redundancy
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. digitizers repeaters modems amplifiers multiplexers
repeaters
Two primary disadvantages to the ______ BN type are that the routers in the network impose time delays, and routers are typically more expensive and require more management than switches. bridged backbone virtual LAN hubbed backbone collapsed backbone routed backbone
routed backbone
The transport layer must break messages from the application layer into several _____ that can be sent to the network layer. segments bits strings bytes frames
segments
TCP uses _____________ so that the destination station can reassemble the packets into the correct order. packet numbers sequence numbers port numbers IP addresses reassembly value
sequence numbers
The primary source of error in data communications is: echoes intermodulation noise spikes attenuation cross-talk
spikes
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. sliding window continuous halt and be recognized (HBR) stop and wait open window
stop and wait
A(n) ________ refers to a group of computers that are logically grouped together by available IP numbers. TCP group IPv6 group data link group application net subnet
subnet
In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the user's needs. cost assessment technology design narrow and deep analysis needs analysis distribution layering
technology design
A brute force attack against an encryption system: is also known as 3DES tries to gain access by trying every possible key is part of the Advanced Encyrption Standard is called RC4 always uses the Rijndael algorithm
tries to gain access by trying every possible key
With a virtual private network, users can create permanent virtual circuits through the Internet called: bursts cells tunnels rings clouds
tunnels
The performance of WANs can be improved by: upgrading the circuits between the computers increasing the demand placed on the network downgrading the circuits between the computers downgrading the devices that provide access to the circuits increasing network traffic
upgrading the circuits between the computers
Switch-based Ethernet: has a logical topology of a ring has a logical topology of a bus uses a hub to connect computers has a physical topology of a ring usually enables all attached circuits to send or receive packets simultaneously
usually enables all attached circuits to send or receive packets simultaneously
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. local carrier network virtual private network integrated service digital network software defined network SONET network
virtual private network
Fiber to the Home uses time division multiplexing all of the above wavelength division multiplexing frequency division multiplexing statistical time division multiplexing
wavelength division multiplexing
A (n) ______ is a special type of virus that spreads itself without human intervention. stealth virus snake worm boot sector virus Trojan horse
worm