Networking Chapter 1 + 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a data link layer standard? a. HTTP b. Ethernet c. T1 d. PPP e. Frame Relay

HTTP

Taken together, the physical and data link layers are called the ____________________. a. Internet layer b. Hardware layer c. Internetwork layer d. Application layer

Hardware layer

Which of the following is a term used to group together the physical and data link layers? a. Internetwork layers b. Hardware layers c. Software layers d. Middleware layers e. Application layers

Hardware layers

The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language

Hypertext Markup Language

In a ___________ architecture, computers are both client and server, thus sharing the work. a. Host-based b. Client-based c. Client-server d. Peer-to-peer e. Network

Peer-to-peer

One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered

n-tier

The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer

network layer

The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private b. public c. community d. hybrid

private

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand. a. agreement b. standard c. protocol d. regulations e. policy

protocol

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation b. transport c. physical d. session e. application

transport

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation b. transport c. physical d. session e. application

transport

The _________ layer performs error checking which is redundant to some extent with the function of the _________ layer. a. application, presentation b. physical, data link c. transport, data link d. presentation, transport e. network, physical

transport, data link

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n

two

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above

web server

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. broadcasting b. instant messaging c. webcasting d. H.323 e. Net Meeting.

webcasting

One of the most frequently used Telnet applications is a. WS-FTP b. PuTTY c. Outlook d. Word e. FTP

PuTTY

___________ is an orderly close to a dialogue between end users. a. Session termination b. Physical bits c. Frame overhead d. Packet encapsulation e. Message encryption

Session termination

The most commonly used e-mail standard is: a. Simple Mail Transfer Protocol b. X.400 c. CMC d. Post Office Protocol e. Telnet

Simple Mail Transfer Protocol

__________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets

Standards

Which of the following is not an application layer standard? a. HTTP b. POP c. T1 d. IMAP e. HTML

T1

To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library

Uniform Resource Locator

The standards H.320, H.323, and MPEG-2 are commonly used with a. Telnet b. Videoconferencing c. Email d. IM e. Microsoft Office

Videoconferencing

To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package

Web browser

Data communications and networking can be considered as a global area of study because: a. new technologies and applications emerge from a variety of countries and spread around the world b. the technologies enable global communication c. the political and regulatory issues are exactly the same in every country d. a and b e. none of the above

a and b

When a user accesses an application via a web browser on their mobile device, this is referred to as a. a browser-based approach b. a native app c. Internet Explorer d. BYOD

a browser-based approach

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

application logic

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. a. WAN b. BN c. extranet d. intranet e. MAN

intranet

In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer

middleware

Which of the following is true about ISO: a. It makes technical recommendations about data communications interfaces b. Its name stands for International Organization for Standardization c. It is based in Geneva, Switzerland d. It is one of the most important standards-making bodies e. All of the above

All of the above

____________ is not an important middleware standard. a. CORBA (Common Object Request Broker Architecture b. Distributed Computed Environment (DCE) c. Asynchronous Transfer Mode (ATM) d. Open Database Connectivity (ODBC) e. none of the above is an appropriate answer

Asynchronous Transfer Mode (ATM)

BYOD stands for a. Bring Your Own Device b. Bring Your Own Database c. Build Your Own Device d. Build Your Own Database

Bring Your Own Device

Which of the following would be a standard used at the Data Link layer of the Internet or OSI model? a. IP b. TCP c. Ethernet d. HTTP e. FTP

Ethernet

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. Hypertext Transfer Protocol b. File Transfer Protocol c. Simple Mail Transfer Protocol d. Internet Message Access Protocol e. Hyperlink Transfer Protocol.

Hypertext Transfer Protocol

Which standards body is responsible for the development of local area network (LAN) standards? a. ANSI b. ISO c. IETF d. IEEE e. ITU-T

IEEE

The Internet standards organization that will allow anyone to join is __________________. a. ANSI b. ISO c. IETF d. IEEE e. ITU-T

IETF

The network layer of the Internet model uses the _____________ protocol to route messages though the network. a. TCP b. HTTP c. FTP d. SMTP e. IP

IP

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a. private clouds b. hardware clouds c. storage services d. IaaS

IaaS

Which of the following is not an advantage of instant messaging? a. It usually takes days for an IM message to be delivered to the recipient. b. It allows real time typed messages to be exchanged. c. Some products are ICQ and AOL Instant Messenger. d. It is generally faster than snail-mail. e. It helps people avoid telephone tag.

It usually takes days for an IM message to be delivered to the recipient.

Which of the following is not true about ITU-T: a. It is the technical standards-setting organization of the United Nations International Telecommunications Union b. It is the International Telecommunications Union - Telecommunications Group c. Its membership is limited to U.S. telephone companies d. It is based in Geneva, Switzerland e. Its membership is comprised of representatives from over 200 member countries

Its membership is limited to U.S. telephone companies

In a host-based system with a mainframe, upgrades to the host are _____________. a. Small b. Cheap c. Lumpy d. Never going to happen e. Always performed annually

Lumpy

The software that runs on the mail server is referred to as the ____________ a. Mail transfer agent b. Mail user agent c. Microsoft Outlook d. Web server e. SMTP

Mail transfer agent

Which of the following is not an example of a mail user agent software package? a. Outlook Express b. Microsoft Word c. Eudora d. Microsoft Outlook e. All of these are mail user agent packages

Microsoft Word

Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla

Mosaic

The acronym, MIME, refers to: a. Multimedia Internet Mail Enterprise b. Multiple Internet Media Extension c. Multipurpose Internet Mail Extension d. Media Internet Mail Extension e. Multimedia Internet Mime Extension

Multipurpose Internet Mail Extension

Which of the following is not true about Telnet? a. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b. Telnet poses no security threat. c. Telnet was designed in the early days of the Internet. d. Keystrokes are sent over the network in clear text. e. One program that conforms to the Telnet standard is PuTTY.

Telnet poses no security threat.

Which of the following is not true about de jure standards? a. They are always developed before de facto standards. b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body.

They are always developed before de facto standards.

Which of the following is not true about de facto standards? a. They never evolve into de jure standards. b. They are those standards that emerge in the marketplace. c. They tend not to be developed by an official industry or government body. d. They are generally supported by more than one vendor but de facto standards have no official standing. e. They tend to emerge based upon the needs/response of the marketplace.

They never evolve into de jure standards.

The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher

Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989

A local area network is: a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings.

A backbone network is: a. a high speed central network that connects other networks in a distance spanning up to several miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 200 miles with common carrier circuits.

a high speed central network that connects other networks in a distance spanning up to several miles.

With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic

all data on the server must travel to the client for processing

A network administrator has received several reports from users of the network that the intranet website on one of company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link

application

In which layer of the Internet model would the HTTP standard be used? a. physical b. application c. transport d. network e. data link

application

Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

application access storage

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture

application architecture

Which of the following is a function of the transport layer? a. linking the physical layer to the network layer b. formatting messages by indicating where they start and end c. deciding which route the message should take d. breaking long messages into several smaller messages e. specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it

breaking long messages into several smaller messages

Which of the following is not true about a server? a. stores data and software that can be accessed by the client. b. may be a personal computer or a mainframe on the network. c. in client/server computing they work together over the network with client computers to support the business application. d. can only perform one function on a network. e. stores documents and graphics that can be accessed from any Web browser.

can only perform one function on a network.

Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures

can use middleware to provide a standard way of communicating between software from more than one vendor

A _____________ is the input-output hardware device at the end user's end of a communication circuit in a client-server network. a. server b. circuit c. client d. host

client

The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer. a. private b. public c. community d. hybrid

community

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a. hashing b. encryption c. authentication d. identification e. compression

compression

Which of the following is not a property of a WAN: a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses leased lines from IXCs like ATT, MCI, and Sprint.

connects a group of computers in a small geographic area such as room, floor, building or campus.

With the two-tier client-server architecture, the server is responsible for the ________ logic. a. application b. presentation c. data access d. session e. physical

data access

An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

data access logic

_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

data storage

Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks

development of online batch systems

Another term for a mail user agent is: a. message transfer agent b. router agent c. e-mail client d. Webcast package e. Web client

e-mail client

The primary reason for networking standards is to: a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor

ensure that hardware and software produced by different vendors can work together

A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet. a. WAN b. BN c. extranet d. intranet e. MAN

extranet

A(n) ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users outside the organization. a. intranet b. Usenet c. Wide Area Network d. extranet

extranet

An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers

is generally more "scalable" than a three-tiered architecture

The American National Standards Institute: a. is the coordinating organization for the United States' national system of standards b. is a professional society in the U.S. whose standards committees focus on local area network standards c. sets the standards that govern how much of the Internet will operate d. is an agency that develops federal information processing standards for the federal government e. makes technical recommendations about global telephone rates

is the coordinating organization for the United States' national system of standards

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent

mail user agent

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a. workstation b. transaction terminal c. cluster d. mainframe e. personal computer

mainframe

A MOOC is an example of a(n) a. BYOD b. massively online technology c. native app d. browser-based technology

massively online technology

Which of the following is not a function of the data link layer? a. deciding when to transmit messages over the media b. formatting the message by indicating where messages start and end, and which part is the address c. detecting and correcting any errors that have occurred in the transmission of the message d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it e. controlling the physical layer by determining when to transmit

pecifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

Networks that are designed to connect similar computers that share data and software with each other are called: a. client/server networks b. peer-to-peer networks c. host networks d. client networks e. local area networks

peer-to-peer networks

IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link

physical

Which of the following correctly represents order of the seven layers of the OSI model from layer 1 to layer 7? a. physical, network, data link, session, transport, application, presentation b. physical, data link, network, transport, session, application, presentation c. physical, data link, network, transport, session, presentation, application d. data link, physical, network, session, transport, application, presentation e. data link, physical, network, transport, session, presentation, application

physical, data link, network, transport, session, presentation, application

A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network

places all or almost all of the application logic on the client

A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network

places all or almost all of the application logic on the server

The ____________ layer of the OSI model is responsible for data format translation. a. session b. presentation c. physical d. application e. transport

presentation

With the two-tier client-server architecture, the client is responsible for the ________ logic. a. session b. presentation c. data access d. data storage e. networking

presentation

In the three tier architecture, the software on the client computer is responsible for the ____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage

presentation logic

________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

presentation logic

Which is not a function of the physical layer: a. transmission of bits. b. defining the rules by which one and zeroes are transmitted. c. providing error-free transmission of data. d. providing the physical connection between sender and receiver. e. specifying the type of connection and type of signals, waves or pulses that pass though it.

providing error-free transmission of data.

There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body

request line, request header, request body

There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header

response status, response header, response body

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software

server

A ________ is a group of computers linked together so that they act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal

server farm

In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model. a. data link and network b. session, presentation and application c. application layer d. application and presentation e. network, transport and presentation

session, presentation and application

The three stages of the de jure standardization process are ______________________. a. specification, identification of choices and acceptance. b. planning, implementing and acceptance. c. brainstorming, identification and implementing. d. specification, formalization, and acceptance. e. none of the above.

specification, identification of choices and acceptance.

The function of the file server is to : a. store data and software programs that can be used by client computers on the network. b. manage all printing requests from clients on the network. c. transfer e-mail messages to other servers on the network. d. store HTML documents for an Internet or intranet web site. e. coordinate the communication of client and servers on the network.

store data and software programs that can be used by client computers on the network.

How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server

the presentation logic is on the client, while the data storage and data access logic are on the server

A response status code of 404 means: a. the requested page was not found b. the server is currently unavailable c. the sever is currently busy d. your browser is incompatible with the Web server software. e. your browser needs to be updated to the latest version.

the requested page was not found

One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

the server can get overloaded since it must process all messages

The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation

transport


Ensembles d'études connexes

Search and Seizure - 4th Amendment

View Set

MGT4375 Eichorn: Chapter 5 Review Questions

View Set

Lab Practical 2: Carbohydrates Part 1

View Set

Pharm II Exam 1 practice test questions

View Set

Real Estate - Questions on Chapter 3

View Set

Lecture Test 4 - Questions from reviews and quizzes

View Set