CIS*1200 Chapter 12 (Final Exam Questions)
________ networks contain servers as well as computers that individual users access and use. 1) Client/server 2) Peer-to-peer 3) Switch 4) CSMA/CD
1) Client/server
Which of the following causes interference when a cable is exposed to strong electromagnetic fields? 1) EMI 2) RFI 3) STP 4) IEEE
1) EMI
A bus topology network is most often deployed as a peer-to-peer network. 1) True 2) False
1) True
A disadvantage of operating a network is the special equipment and software that a network requires. 1) True 2) False
1) True
A jam signal is a special signal sent to all network nodes alerting them that a collision has occurred. 1) True 2) False
1) True
All computers in a bus network connect to a single cable. 1) True 2) False
1) True
An application server does not require you to install and upgrade the software on the network client computers. 1) True 2) False
1) True
Coaxial and fiber-optic are two common cable types used by business networks. 1) True 2) False
1) True
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on a wire next to it. 1) True 2) False
1) True
Database servers, e-mail servers, and communications servers are all examples of dedicated servers. 1) True 2) False
1) True
Each network computer requires a network adapter to enable it to communicate on a network. 1) True 2) False
1) True
In a typical college network, backups of student files are typically done on a server. 1) True 2) False
1) True
In an active topology, each node participates in moving data through the network. 1) True 2) False
1) True
Intranets and extranets often use VPN to keep information secure. 1) True 2) False
1) True
Networks enable enhanced communication. 1) True 2) False
1) True
The computer lab at your school or the network serving the floor of the office building where you work is probably a LAN. 1) True 2) False
1) True
The flow of data is more efficient in a client/server network than in a peer-to-peer network. 1) True 2) False
1) True
With a database server, multiple users can access the same database information at the same time. 1) True 2) False
1) True
Client/server networks are said to be ________, in that many tasks can be carried out on the server. 1) centralized 2) independent 3) autonomous 4) stand-alone
1) centralized
Which cable type is the most costly to install? 1) fiber-optic 2) twisted-pair 3) ThinNet coaxial 4) ThickNet coaxial
1) fiber-optic
A(n) ________ server is a server that stores and manages files for network users. 1) file 2) e-mail 3) print 4) database
1) file
What is the name for a group of data packets that are sent together? 1) frame 2) plot 3) switch 4) token
1) frame
A ________ topology is created when more than one topology is used to build a network. 1) hybrid 2) multiple-use 3) fusion 4) crossover
1) hybrid
A(n) ________ is a set of rules for how information and communication is exchanged. 1) protocol 2) token 3) switch 4) packet
1) protocol
A(n) ________ server acts as a liaison between an intranet and the Internet. 1) proxy 2) intermediate 3) transition 4) surrogate
1) proxy
The inclusion of ________ is what differentiates a client/server network from a peer-to-peer network. 1) servers 2) a hub 3) laptops 4) cables
1) servers
Which layer of the OSI model sets up a virtual connection between the communications devices on a network? 1) session 2) transport 3) physical 4) application
1) session
Which of the following is the most commonly used client/server network topology? 1) star 2) cluster 3) ring 4) hierarchical
1) star
Which of the following networks has high scalability, which means adding computers as needed is easy? 1) star 2) ring 3) bus 4) hybrid
1) star
A ________ is used at the end of a bus network. 1) terminator 2) possessed object 3) packet 4) network adaptor
1) terminator
A Web server is a server that stores and manages files for network users. 1) True 2) False
2) False
An Ethernet network is a type of network topology. 1) True 2) False
2) False
An NOS only needs to be installed on a server rather than on each individual client computer. 1) True 2) False
2) False
An extranet is a private network of a corporation that is used exclusively by company employees. 1) True 2) False
2) False
An international company like Microsoft would use a MAN to connect all of its computers. 1) True 2) False
2) False
Data flows in both directions in a ring network. 1) True 2) False
2) False
Databases can be shared in a network, but printers cannot be shared. 1) True 2) False
2) False
Fiber-optic cable allows bidirectional (two-way) data transmission. 1) True 2) False
2) False
In a client/server network, each network node communicates directly with every other node on the network. 1) True 2) False
2) False
In a peer-to-peer network, security can be handled by the server. 1) True 2) False
2) False
Passing a token from computer to computer is most closely associated with a bus network. 1) True 2) False
2) False
Peer-to-peer networks become difficult to administer when they are expanded beyond three users. 1) True 2) False
2) False
Printing is a function that takes very little CPU time on a network. 1) True 2) False
2) False
Rackspace Hosting is a company most associated with Web servers. 1) True 2) False
2) False
Star topologies are popular when fair allocation of network access is a major requirement. 1) True 2) False
2) False
The main technology for achieving a VPN is called channeling. 1) True 2) False
2) False
Two computers cannot begin transmitting a data signal at the same time in a star network. 1) True 2) False
2) False
UTP cable has the greatest bandwidth. 1) True 2) False
2) False
________ cable is NOT subject to electromagnetic interference or radio frequency interference. 1) Twisted-pair 2) Fiber-optic 3) Polycarbonate 4) Coaxial
2) Fiber-optic
________ networks do not require a dedicated server. 1) Client/server 2) Peer-to-peer 3) Intranet 4) Extranet
2) Peer-to-peer
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. 1) gateway 2) authentication 3) dedicated 4) file
2) authentication
A ________ sends data from one collision domain to another. 1) switch 2) bridge 3) link 4) band
2) bridge
Which network topology is considered a passive topology because its nodes do nothing to help the data move through the network? 1) star 2) bus 3) mesh 4) cluster
2) bus
Which of the following networks is most known for data collisions? 1) star 2) bus 3) hierarchical 4) cluster
2) bus
Which of the following is NOT a common network topology? 1) star 2) cluster 3) bus 4) ring
2) cluster
A(n) ________ server handles all interaction between a network and other networks, including managing Internet connectivity. 1) e-mail 2) communications 3) applications 4) database
2) communications
A ________ keeps your computer safe by confirming who is trying to access it. 1) gateway 2) firewall 3) hub 4) switch
2) firewall
A(n) ________ is used exclusively within a corporation. 1) VPN 2) intranet 3) extranet 4) Internet
2) intranet
A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. 1) application software 2) network operating system 3) protocol guideline 4) switch
2) network operating system
A print server uses a print ________ as a software holding area for printing jobs. 1) stack 2) queue 3) buffer 4) spooler
2) queue
Which of the following is something a network adapter does NOT do? 1) It uses high-powered signals so data can move easily over network transmission media. 2) It allows or denies access to the computer in which it is installed. 3) It verifies that all information transmitted from the computer is correctly received by the recipient. 4) It breaks down data and puts it into packets.
3) It verifies that all information transmitted from the computer is correctly received by the recipient.
What is CSMA/CD? 1) Type of network topology 2) A special signal of a star network 3) Method used to avoid data collisions 4) The central communication device on a star or ring network
3) Method used to avoid data collisions
________ cable consists of pairs of copper wires twisted around each other and covered by a protective sheath. 1) Coaxial 2) Fiber-optic 3) Twisted-pair 4) Polycarbonate
3) Twisted-pair
A ________ uses the public Internet communications infrastructure to build a secure, private network. 1) LAN 2) WAN 3) VPN 4) MAN
3) VPN
When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer. 1) communication 2) database 3) application 4) file
3) application
Which of the following is something you would NOT consider when choosing a cable type? 1) bandwidth 2) cable cost 3) cable radius 4) bend radius
3) cable radius
A(n) ________ server provides client computers with access to information stored in databases. 1) Web 2) file 3) database 4) print
3) database
A ________ allows multiple users to connect to the Internet through one connection. 1) file server 2) hub 3) network 4) packet screener
3) network
The star topology uses a ________ to connect all network nodes. 1) terminator 2) gateway 3) switch 4) router
3) switch
Ring networks use the ________ method to avoid data collisions. 1) packet screening 2) active-check 3) token 4) passive-check
3) token
Which of the following is FALSE about servers? 1) Servers are the workhorses of the client/server network. 2) Servers interface with many different network users. 3) A file server stores and manages files for a network. 4) All networks require at least two servers.
4) All networks require at least two servers.
Which of the following servers is most often the only device on a network connected to the Internet? 1) E-mail server 2) File server 3) Applications server 4) Communications server
4) Communications server
Which is NOT a networking protocol? 1) Apple File Protocol (AFP) 2) NetBIOS Extended User Interface (NetBEUI) 3) Internet Packet Exchange (IPX) 4) HyperText Transfer Protocol (HTTP)
4) HyperText Transfer Protocol (HTTP)
A(n) ________ address is the address external entities use to communicate with your network. 1) AL 2) MAC 3) WI 4) IP
4) IP
A ________ is a network used to connect computers in very close proximity, with wired or wireless connectivity. 1) WAN 2) LAN 3) MAN 4) PAN
4) PAN
________ are often equipped to act as hardware firewalls. 1) Repeaters 2) Switches 3) Jammers 4) Routers
4) Routers
Which of the following topologies has primarily become legacy technology? 1) ring 2) star 3) hierarchical 4) bus
4) bus
Cable television, as well as some networks, uses ________ cable. 1) fiber-optic 2) unshielded twisted-pair 3) shielded twisted-pair 4) coaxial
4) coaxial
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? 1) enhanced resource sharing 2) increased productivity 3) increased communication capabilities 4) ease of maintenance and administration
4) ease of maintenance and administration
In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ________ signal. 1) hit 2) crash 3) stop 4) jam
4) jam
What is another name for the physical address assigned to each network adapter? 1) network access control (NAC) 2) physical address control (PAC) 3) network physical address (NPA) 4) media access control (MAC)
4) media access control (MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources. 1) router 2) bus 3) bridge 4) network
4) network
Which of the following devices are used to send data between two networks? 1) repeaters 2) switches 3) hubs 4) routers
4) routers
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. 1) viewing 2) browsing 3) filtering 4) screening
4) screening
A ________ is passed from computer to computer around the ring of a ring topology network. 1) packet 2) protocol 3) proxy 4) token
4) token