IT Test 3
A(n) ________ address is the address that external entities use when communicating with your network. A) ALU B) WAP C) MAC D) IP
MAC
A large network designed to provide access to a specific geographic area, such as a large city, is a ________. A) PAN B) MAN C) LAN D) HAN
MAN
A ________ uses the Internet communications infrastructure to build a secure and private network. A) HAN B) VPN C) WAN D) PAN
VPN
On a network, a(n) ________ helps prevent data packets from colliding with each other. A) adapter B) switch C) router D) access point
switch
Which of the following was created for the transfer of hypertext documents across the Internet? A) SSL B) FTP C) AJAX D) HTTP
HTTP
The ________ is responsible for the Internet's domain name system and the allocation of IP addresses. A) IAB B) ISOC C) W3C D) ICANN
ICANN
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet. A) SMTP B) NetBIOS C) TCP D) IP
IP
The physical address assigned to each network adapter is called its ________ address. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC)
Media access control (MAC)
Which protocol is used when sending files as attachments by e-mail? A) JavaScript Object Notation (JSON) B) Post Office Protocol (POP) C) User Datagram Protocol (UDP) D) Multipurpose Internet Mail Extensions (MIME)
Multipurpose Internet Mail Extensions (MIME)
A(n) ________ device facilitates file sharing and data backup. A) WAN B) NOS C) UTP D) NAS
NAS
Which of the following refers to the name of your wireless network? A) HTML B) SSID C) WEP D) WPA
SSID
The main suite of protocols used for transmitting data on the Internet is ________. A) SMTP B) TCP/IP C) FTP D) POP
TCP/IP
________ describes the website content in terms of the data that is being described rather than how it is to be displayed. A) CGI B) JavaScript C) XML D) HTML
XML
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________. A) a key pair B) linked keys C) key tags D) code keys
a key pair
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer. A) JavaScript B) applet C) SSL D) CGI script
applet
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A) dedicated B) application C) file D) authentication
authentication
The main path of the Internet along which data travels the fastest is known as the Internet ________. A) cache B) highway C) backbone D) protocol
backbone
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A) Infusion B) Bandwidth C) Data capacity D) Scalability
bandwidth
A ________ sends data from one collision domain to another. A) bridge B) router C) link D) switch
bridge
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) hierarchical B) star C) cluster D) bus
bus
Which of the following is not a major factor to consider when selecting network cabling? A) Bandwidth B) Maximum run length C) Cable diameter D) Interference
cable diameter
A client/server network is an example of ________ administration. A) wide area B) local C) central D) remote
central
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. A) An open circuit B) Circuit switching C) A closed circuit D) Packet switching
circuit switching
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility. A) Device B) Setup C) Hardware D) Network
device
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. A) assigned B) dynamic C) transition D) static
dynamic
________ is the standard communications protocol used on most client/server networks. A) NOS B) Ethernet C) VPN D) Mac
ethernet
________ cable is not subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Coaxial C) Polycarbonate D) Fiber-optic
fiber-optic
Which transmission medium transmits data the fastest? A) Fiber-optic cable B) Coaxial cable C) Twisted-pair cable D) Wireless
fiber-optic cable
A(n) ________ server is a server that stores and manages files for network users. A) file B) authentication C) e-mail D) print
file
The current standard for wired Ethernet networks is IEEE 802.3, also known as ________ Ethernet. A) gigabit B) megabyte C) gigabyte D) megabit
gigabit
A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent? A) dotted quad B) binary digit C) hexadecimal digit D) decimal digit
hexadecimal digit
Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________. A) information assurance B) data integrity C) referential integrity D) multi-factor authentication
information assurance
________ permits two or more people to communicate over the Internet in real time. A) Flickr B) E-mail C) Snapfish D) Instant messaging
instant messaging
A peer-to-peer (P2P) network is an example of ________ administration. A) local B) central C) corporate D) wide area
local
Routers and switches are example of network ________ devices. A) provider B) storage C) navigation D) access
navigation
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. A) network B) switch C) node D) broadband
network
Client/server networks are controlled by a central server that runs specialized software called a(n) ________. A) network operating system (NOS) B) central operating system (COS) C) central server operating system (CCOS) D) multipersonnel operating system (MPOS)
network operating system (NOS)
IPv6 was introduced when IPv4 ________. A) was revoked B) no longer had enough unique addresses C) became too old D) was eliminated
no longer had enough unique addresses
A ________ is any device connected to a network such as a computer, printer, or game console. A) NIC B) node C) NOS D) packet
node
________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.
packet switching
Data are sent through a network in bundles called ________. A) packets B) pouches C) packages D) nodes
packets
To transfer data packets between two networks, a ________ is used. A) hub B) router C) firewall D) switch
router
A print server uses a print ________ as a software holding area for jobs waiting to be printed. A) stack B) logger C) spooler D) heap
spooler
Which of the following is the most commonly used client/server network topology? A) Cluster B) Ring C) Hierarchical D) Star
star
An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address. A) stationary B) static C) dynamic D) fixed
static
The network architecture that spans the largest physical distance is called a ________. A) HAN B) WAN C) PAN D) LAN
wan
If you want to access your home network from your distant garage, a ________ might help boost the signal. A) router B) switch C) wireless range extender D) wireless access point
wireless range extender
Strong encryption now requires ________-bit keys. A) 512 B) 40 C) 128 D) 256
256
Which generation of wireless data is being rolled out as the latest mobile data service and also as a home Internet service? A) 6th B) 5th C) 4th D) 3rd
5th
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server. A) DNS B) URL C) XML D) FTP
DNS
Which of the following would not be considered a possessed object? A) driver's license B) password C) smart keys D) key cards
passwords
In a ________ network, each node connected to the network communicates directly with every other node. A) router B) bridge C) client/server D) peer-to-peer
peer-to-peer
Individual Internet users connect to ISPs through a(n) ________. A) T line B) optical carrier (OC) line C) User Datagram Protocol (UDP) D) point of presence (POP)
point of presence (POP)
A network ________ is a set of rules for how information and communications are exchanged. A) packet B) frame C) token D) protocol
protocol
Wireless network devices use ________ to communicate with each other. A) DSL B) radio waves C) fiber optics D) microwaves
radio waves
A ________ sends information between two networks. A) router B) repeater C) bridge D) switch
router
Which of the following information is not contained in a packet sent over the Internet? A) The size (in bytes) of the packet B) The data that are transmitted C) The address from where the packet originates D) The address to which the packet is sent
the size (in bytes) of the packet
________ is the actual speed of data transfer that is achieved between two nodes on a network. A) Benchmark B) Throughput C) Broadband D) LAN speed Question 71 / 1 point
throughout
Ring networks use the ________ method to avoid data collisions. A) active-check B) packet screening C) token D) passive-check
token
Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device? A) scalability B) authentication C) tunneling D) virtualization
virtualization