Chapter 1-2 Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A Wi-Fi device is generally any device based on the IEEE 802.11 standard. A) True B) False

A) True

A knowledge worker is a professional whose job involves the use and manipulation of data. A) True B) False

A) True

An attacker can use The Onion Router (TOR) and other tools to disguise their source locationInternet Protocol (IP) address. A) True B) False

A) True

In 1997, the IEEE 802.11 standard was ratified, specifying the use of the 2.4 GHz band with data rates of up to 2 Gbps. A) True B) False

A) True

In a packet-switched network, packets can take multiple paths from source to destination, so there is no dependence on a single circuit A) True B) False

A) True

On a local area network, Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses to devices as needed. A) True B) False

A) True

Regarding the OSI Reference Model, many people lump Layers 5 through 7 together, referring to them as the "Application Layers." A) True B) False

A) True

The 802.11 wireless local area network protocols are defined at Layer 1 in the OSI Reference Model. A) True B) False

A) True

The Data Link Layer of the OSI Reference Model is viewed as the "switching" layer because it is the layer where switching paths are determined in LANs. A) True B) False

A) True

Which layer of the Open Systems Interconnection (OSI) Reference Model connects software applications to the network? A)Application Layer B)Presentation Layer C)Network Layer D)Transport Layer

A)Application Layer

In the late 1980s, which wide area network (WAN) technology became one of the standard methods of connecting business computers and networks over long distances? A)Frame Relay B)DECnet C)AppleTalk D)Token Ring

A)Frame Relay

The Internet of Things (IoT) has great potential for remote management of devices, for example, vending machines could report their status and stock levels. But there are important technical prerequisites before the IoT is viable. What is a technical requirement to deploying a remote management system for 500 vending machines across a region? A)Internet Protocol version 6 (IPv6) support B)Internet Protocol version 4 (IPv4) support C)wired Ethernet D)2G technology

A)Internet Protocol version 6 (IPv6) support

Which layer of the Open Systems Interconnection (OSI) Reference Model represents the signal path over which data is transmitted? This can include copper wires, optical fibers, or radio signals, such as Wi-Fi, WiMAX, and Bluetooth. A)Physical Layer B)Network Layer C)Transport Layer D)Session Layer

A)Physical Layer

Encryption and cryptography primarily support which principle of security? A)confidentiality B)integrity C)availability D)nonrepudiation

A)confidentiality

Which Mobile IP client stack component is a router capable of processing and tracking mobile routing IP updates, tracking mobile node registrations, and forwarding traffic to mobile nodes on visited networks through Internet Protocol (IP) tunnels? A)home agent (HA) B)mobile node (MN) C)foreign agent (FA) D)none of the above

A)home agent (HA)

A media access control (MAC) address is intended to be both unique and temporary. A) True B) False

B) False

Modems convert analog data into a digital signal for transport over the wire. At the other end, the digital signal is demodulated to recover the original analog signal. A) True B) False

B) False

The ARPANET project developed the Integrated Services for Digital Network (ISDN) protocol, which became the protocol of the Internet. A) True B) False

B) False

The IBM personal computer (PC) was launched in the early 2000s. A) True B) False

B) False

The IEEE is the U.S. regulatory body in charge of telecommunication rules. A) True B) False

B) False

What began as the result of a U.S. government project and is the predecessor of the Internet? A)Worldwide Interoperability for Microwave Access (WiMAX) B)ARPANET C)Global System for Mobile (GSM) D)Transmission Control Protocol/Internet Protocol (TCP/IP)

B)ARPANET

Which layer of the Open Systems Interconnection (OSI) Reference Model helps establish the communication path by specifying the media access control (MAC) address of each device? A)Physical Layer B)Data Link Layer C)Network Layer D)Presentation Layer

B)Data Link Layer

Which layer of the Open Systems Interconnection (OSI) Reference Model formats information sent to and from applications? A)Application Layer B)Presentation Layer C)Network Layer D)Transport Layer

B)Presentation Layer

Which two layers of the Open Systems Interconnection (OSI) Reference Model are closely associated due to the use of Transmission Control Protocol/Internet Protocol (TCP/IP)? A)Physical and Data Link (layers 1 and 2) B)Data Link and Network (layers 2 and 3) C)Network and Transport (layers 3 and 4) D)Transport and Presentation (layers 4 and 6)

C)Network and Transport (layers 3 and 4)

Which of the following is true of packet switching A)Packet switching is less resilient than circuit switching. B)Packet switching is more expensive than circuit switching. C)Packet switching is more efficient than circuit switching. D)Packet switching is an analog process.

C)Packet switching is more efficient than circuit switching.

Redundant and fault tolerant security devices primarily support which principle of security? A)confidentiality B)integrity C)availability D)nonrepudiation

C)availability

You are a networking specialist supporting a client's IPv4 network. You want to protect the client's servers that host sensitive and important information, such as the HR and Finance servers, from network sniffing and the spread of malware. What configuration change could you make to the network router to protect the servers in this way? A)Segment the network using VLANs. B)Segment the network using subnets. C)Use device firewalls. D)Configure access control lists on the router.

B)Segment the network using subnets.

In which of the following models does the company buy the device and pay for all the operational charges associated with it, but the employee is free to use the device for personal business? A)bring your own device (BYOD) B)corporate owned, personally enabled (COPE) C)Common Operating Environment (COE) D)none of the above

B)corporate owned, personally enabled (COPE)

A mathematical message-digest (or hashing) algorithm primarily supports which principle of security? A)confidentiality B)integrity C)availability D)nonrepudiation

B)integrity

Which mobile technology was the first to facilitate high-speed, packet-switched Internet access suitable for browsing high-resolution Web pages? A)1G B)2G C)3G D)4G

C)3G

________ refers to a wide range of illegal activities performed on a network, and has existed since the earliest forms of electronic technology came on the scene in the 1960s. A)Wardriving B)Phishing C)Cybercrime D)Spam

C)Cybercrime

Which of the following is a 2G digital technology that was established in Europe? A)Advanced Mobile Phone System (AMPS) B)Code Division Multiple Access (CDMA) C)Global System for Mobile (GSM) D)Worldwide Interoperability for Microwave Access (WiMAX)

C)Global System for Mobile (GSM)

Which layer of the Open Systems Interconnection (OSI) Reference Model handles communication paths between local area networks (LANs)? Internet Protocol (IP) exists at this layer as well. A)Physical Layer B)Data Link Layer C)Network Layer D)Session Layer

C)Network Layer

________ is a method that allows the seamless transfer of an Internet Protocol (IP) address from one network to another without losing IP sessions, which facilitates roaming. A)Network effect B)Packet switching C)Wi-Fi D)IP mobility

D)IP mobility

You are a networking specialist who has been asked to look into some network-related problems for a small business. The company began experiencing problems after moving into new premises and hiring additional employees. You find the network consists of a single asymmetric digital subscriber line (ADSL) router. Some employees have no network connection problems, while others cannot connect to the network using either the wireless or fixed Ethernet cables. What is the most likely cause of the problems? A)Physical layer connectivity issues B)Transport layer issues C)incorrect PC configuration D)Internet Protocol (IP) addressing issues

D)Internet Protocol (IP) addressing issues

Initially proposed in 1984, __________________ was a solution to issues created by proprietary data networking and equipment development at the dawn of the networking era. A)Transmission Control Protocol/Internet Protocol (TCP/IP) B)International Organization for Standardization (ISO) C)media access control (MAC) address D)Open Systems Interconnection (OSI) Reference Model

D)Open Systems Interconnection (OSI) Reference Model

Which of the following is considered to be a "killer app"? A)Wi-Fi B)Wi-Fi Protected Access 2 (WPA2) C)Subscriber identification module (SIM) D)Short Message Service (SMS)

D)Short Message Service (SMS)

Which layer of the Open Systems Interconnection (OSI) Reference Model is the bridge between the network and the application-processing software on devices? At this layer, data from applications is broken down into packets that are suitable for transport from the sending device, and then reassembled on the receiving device. A)Network Layer B)Application Layer C)Data Link Layer D)Transport Layer

D)Transport Layer

Which of the following is NOT an advantage of digital communications versus analog communications? A)more efficient use of bandwidth B)fewer rates C)less susceptibility to noise and interference D)decreased throughput E)support for additional services such as caller ID

D)decreased throughput

Communication at the Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is achieved through a logical addressing scheme that enables routers to move packets across the network to the correct destination. A) True B) False

b) False


Ensembles d'études connexes

How Alcohol affects customers LESSON 3

View Set

Intro to Journalism: The Inverted Pyramid

View Set

Care of the Patients with Endocrine Disorders

View Set

Insurance Quiz - BASIC INSRUANCE CONCEPTS AND PRINCIPLES

View Set