634 multi final
Which of the following is an application layer standard?
HTTP, POP, IMAP, HTML
Which of the following is true with respect to the data link layer?
It is responsible for getting a message from one computer to another (one node to another) without errors.
Which of the following is not true about CSMA/CD?
It is used in token ring protocol LANs
Which of the following is not a key advantage of digital transmission?
It permits only low transmission rates.
Which of the following is true about roll call polling?
It typically involves some waiting because the server has to wait for
Which of the following is true about roll call polling?
It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
Which of the following is not true about formal standards?
They are always developed before de facto standards.
An N-tiered architecture:
is generally more "scalable" than a three-tiered architecture
Media access control:
is not very important in point-to-point with full duplex configuration
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?
transport Layer
Pervasive networking means that:
virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:
wavelength division multiplexer
The familiar background static on radios and telephones is called:
white noise
In general, controlled approaches:
work better than contention approaches for large networks that have high usage
With QoS routing different __________ are defined, each with different priorities.
classes of service
Which of the following is not a basic LAN component?
client, server., network interface card, network operating system
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.
cloud-based mesh design
Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.
codec
A virtual circuit is established in the ___________ routing method.
connection-oriented
Which of the following is not a property of a WAN:
connects a group of computers in a small geographic area such as room, floor, building or campus.
With __________ ARQ, the sender immediately sends the next message or packet of data.
continuous
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?
controlled chaos
Media access control refers to:
controlling access to a media by more than one computer in a LAN
The integration of voice, video, and data communications is also known as __________.
convergence
In general, local ISPs make money by charging ________.
customers
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
d. 255.255.0.0
A _______ is a connectionless method of sending data packets on a packet switched service.
datagram
A star topology is:
dependent upon the capacity of the central computer for its performance
An example of _____ of data would be if a computer virus eliminated files on that computer.
destruction
Which of the following is not an important future trend in communication and networking?
development of online batch systems
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.
dial-up access through a modem
When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
dialed circuit
Transmission speeds:
differ widely among media
A tornado that eliminates a network control center would be an example of a natural __________
disaster
A network switch failure is an example of a(n) ________ threat.
disruptive
Which of the following media has the lowest error rates and the highest transmission speeds?
fiber optic cable
Which of the following media is least susceptible to noise?
fiber optic cable
Which of the following type of media is least susceptible to eavesdropping?
fiber optics
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
full mesh design
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.
giga, gigabit
The two basic types of media are:
guided and wireless (radiated)
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.
half-duplex
A client computer is assigned a data link layer address is by:
hardware manufacturers
The newer form of IP, version 6 (Ipv6) is:
has an increased address size from 32 bits to 128 bits
Which of the following is a primary advantage of a VPN?
low cost
Routers:
may also be called TCP/IP gateways
Which of the following would be considered a type of wireless media?
microwave
Which of the following is not a way to reduce network demand?
moving data further from the applications and people who use them
A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.
multiplexer
The _________ layer is responsible for routing of messages from the sender to the final destination.
network layer
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
network profile
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
newer version permits jumbo frames
Switched Ethernet:
operates at about 95% of capacity before performance becomes a problem.
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star
point-to-point
The server version of the Network Operating System does not:
provide the software that performs the functions associated with the physical layer
Which is not a function of the physical layer:
providing error-free transmission of data.
The three stages of the formal standardization process are ______________________.
specification, identification of choices and acceptance.
Another term for impulse noise is:
spikes
The primary source of error in data communications is:
spikes
A typical TCP packet has a _______ header of control information.
192-bit
The older version of IP has a ________ header of control information.
192-bit
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.
star design
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.
stop and wait
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
transport Layer
With a virtual private network, users create permanent virtual circuits through the Internet called:
tunnels
Switched Ethernet:
usually enables all attached circuits to send or receive packets simultaneously
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.
virtual private network
The source destination port identifier tells the destination station _____________.
which application layer process the packet is from.
A(n) _____________ is required to connect a computer to WLAN.
wireless NIC
____________ is not a function of a data link protocol.
Amplitude shift keying
____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.
Common carriers
_____________ routing is a method of routing in which each packet makes its own way through the network.
Connectionless
______________ routing is most commonly used when the application data or message can fit into one single packet.
Connectionless
Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?
Ethernet
Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type?
Gateway
Which of the following devices is the most complex?
Gateway
______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message.
Hamming code
Which of the following is a term used to group together the physical and data link layers?
Hardware layers
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
IP
__________can obliterate a group of bits, causing a burst error.
Impulse noise
_____________ refers to having users access the same data files, exchange information via electronic mail, or search the Internet for information.
Information sharing
The closest the Internet has to an "owning" organization is the ___________.
Internet Society
At the top of the Internet structure are national ___________, such as AT&T and Sprint.
Internet service providers
Which of the following is not a critical software component in a dedicated server LAN?
LAN metering software
_______________ is a type of dynamic routing.
Link state
___________ is how the network works conceptually.
Logical topology
Marc Andreessen led a team that developed the first graphical Web browser, which was called:
Mosaic
The earliest type of fiber optic systems were:
Multimode
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.
NAT proxy server
National ISPs connect together and exchange data at ___________.
Network Access Points
_____________ is the software that controls the network.
Network Operating System
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
Network address translation
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
Peering
________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive.
Polling
With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic.
Presentation; data access
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
TCP connection
what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
TCP connection
_______ is the dominant network protocol today.
TCP/IP
Some of the new applications being developed for a high-speed Internet include
Tele-immersion
Which of the following is not a benefit of packet switched services?
The data transmission rates tend to be lower than dial-up or dedicated circuits.
Which of the following is not true about switched Ethernet?
The switch has a physical bus topology.
One drawback to dynamic routing is:
The transmission of status information "wastes" network capacity that could be used to send user messages
Which of the following is true regarding switched backbones?
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks.
True
Which of the following groups developed Internet 2?
UCAID
Which of the following new Internet efforts was started by 34 universities?
UCAID
To get a page from the Web, a user must type in a URL, which stands for:
Uniform Resource Locator
Which of the following is not a problem with dialed circuits?
Use of these circuits is very simple.
Which of the following is not an advantage of a WLAN?
WLANs allow users to work more securely than a wired LAN.
To interact with the World Wide Web, a client computer needs an application layer software package called a:
Web browser
A backbone network is:
a high speed central network that connects other networks in a distance spanning up to several miles.
A metropolitan area network is:
a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.
ARQ means that:
a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error
A phase hit is likely to be:
a short term shift out of phase
The three fundamental approaches to routing are:
centralized, static routing, and dynamic routing
Which of the following is not a type of hardware device that can be used to interconnect networks?
'dumb' terminals
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
0001101 1
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.
1024
CA*Net3 was developed by a Canadian organization known as:
ARDNOC
Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
ARPANET
____________ is one of the most commonly used coding schemes used in data transmission.
ASCII
_________ is a specially formatted request used to perform IP address to data link address resolution.
Address Resolution Protocol
___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
Addressing
Which of the following is not a controlled access method of media access control?
CSMA/CD
CSMA/CA is an acronym for:
Carrier Sense Multiple Access with Collision Avoidance
Ethernet LAN was developed by:
DEC, Xerox, and Intel
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
DNS request packet
___________ is not a type of digital signaling technique.
Data rate signaling
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
Directory Services
Server name resolution is done using the:
Domain Name Service
Which of the following can provide fault tolerance for the storage space on a server?
RAID
____________ refers to one computer legally sharing a software package, such as Microsoft Word, with other computers on the network to save costs.
Resource sharing
With which type of digital signaling does the signal always return to zero volts after each bit?
Return-to-zero signaling
A special packet called a(n) _____________ packet is sent to the receiver requesting the establishment of a connection
SYN
___________ is the translation of application layer addresses into IP addresses.
Server name resolution
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
Static routing
Which of the following is not a type of VPN?
T-1 VPN
Using parity, the probability for detecting an error, given that one has occurred, is:
about 50% for either even or odd parity
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
access point
Which of the following is not an effective way to reduce LAN network demand:
add hidden nodes
With a client-based network, one fundamental problem is that:
all data on the server must travel to the client for processing
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?
application layer address
Errors on a network can occur:
because of noise on the line
Which type of digital signaling would experience fewer errors because it has more distinct signals?
bipolar
Threat of intrusion comes from ____________.
both inside and outside of the organization
Which of the following is a function of the transport layer?
breaking long messages into several smaller messages
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
broadcast message
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet
broadcast message
The type of logical topology that Ethernet uses is a:
bus
The probability of detecting an error, given that one has occurred, using parity checking is about:
c. 50%
A digital service offered by cable companies is the _________.
cable modem
Dynamic addressing:
can solve many updating headaches for network managers who have large, growing, changing networks
Gateways:
can translate one network protocol into another
When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
echo
Network demand will not be reduced by:
encouraging the use of applications such as medical imaging
The primary reason for networking standards is to:
ensure that hardware and software produced by different vendors can work together
To snare intruders, many organizations now use _________ techniques.
entrapment
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
fiber
Which of the following media can best withstand harsh environmental conditions?
fiber optic cable
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:
increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.
intrusion
Often, incidents of ___________ involve employees of the organization, surprisingly enough.
intrusion
Digital Subscriber Line:
is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local loop combines analog transmission and frequency division multiplexing involves the use of a customer premises equipment (CPE) uses a combination of amplitude and phase modulation
Asynchronous transmission:
is also known as start-stop transmission
A peer-to-peer LAN:
is generally cheaper in hardware and software than a dedicated server
Synchronous transmission:
is used to transmit a "frame" or "packet" of data at a time
The _________ is the connection from a home or business to the telephone company end office.
local loop
Which of the following type of networks permit packets from separate messages to be interleaved?
packet switched network
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
packets
Devices in a rack are connected together using ___________.
patch cables
Networks that are designed to connect similar computers that share data and software with each other are called:
peer-to-peer networks
__________ has led to the belief that the Internet is "free".
peering
TCP/IP:
performs packetizing, as well as routing and addressing functions
IP:
performs routing functions
A _________ is a connection-oriented approach to sending packets on a packet switched service.
permanent virtual circuit
IMAP (Internet Message Access Protocol):
permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
A logical bus topology:
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
With a switched backbone network, the equipment is usually placed in a ______.
rack
Mesh networks:
require more processing by each computer in the network than in star or ring networks
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
risk assessment
Which of the following is not a way that a router differs from a switch?
routers can connect two or more networks that use the same data link protocol
__________ is not an important function of the transport layer.
routing
An advantage of centralized routing is:
routing decisions are simple
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
routing table
Breaking a network into smaller parts is called network:
segmentation
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
sequence numbers
A(n) ________ refers to a group of computers that are logically grouped together by IP number.
subnet
_____________ is not a form of modulation used to transform digital data into analog signals.
synchronous time division
Internet 2 is also known as:
the Abilene network
Which of the following is not true about switched backbones?
there are many more networking devices in a switched backbone network
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.
threat
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
transport
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
transport
_____________ is an effective way to prevent attenuation.
Adding repeaters or amplifiers to a circuit
With respect to converting digital data into analog signals, AM stands for:
Amplitude Modulation
Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?
Answer: A
With respect to costs for a client-server network, which of the following is true?
Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
Shielding wires
__________ ensure that hardware and software produced by different vendors work together.
Standards
Which of the following is not true about de facto standards?
They never evolve into formal standards.
The idea for a special hypertext network, called the World Wide Web, was conceived of by:
Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.
True
In which layer of the Internet model would the HTTP standard be used?
application
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
attenuation
Client-server architectures:
can use middleware to provide a standard way of communicating between software from more than one vendor
Which of the following is way to reduce or eliminate crosstalk on a circuit,
changing multiplexing techniques
_________ is the basic physical layout of the circuit.
circuit configuration
Inverse multiplexing means:
combining several low speed circuits to enable them to be transmitted across one high speed circuit
With contention:
computers wait until the circuit is free before they send data
The representation of the character A by the group of 8 bits, 01000001, is an example of:
digital coding
When the output signal from an amplifier on a circuit is different from the input signal, this is called _________________.
harmonic distortion
To get more "bandwidth" in a digital transmission, you must:
increase the range of frequencies available for a transmission
If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of:
intermodulation noise
Of the following, which is not true about fiber optic cable?
it has a very low capacity
____________ refers to the transmission characteristics of the circuit.
logical circuit
__________ is a line-of-sight type of wireless media.
microwave
In a client-server network, _________ gets software from different vendors to work together.
middleware
Cross-talk:
occurs when one circuit picks up signals in another
Frequency division multiplexing:
operates by dividing the signal into different frequencies
The direction in which the sound wave begins is known as:
phase
The height of a sound wave is called its:
phase
The ____________ layer of the OSI model is responsible for data format translation.
presentation
In the three tier architecture the software on the client computer is responsible for____________.
presentation logic
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
repeaters
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.
server
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.
session, presentation and application
Which of the following is not a function of the data link layer?
specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
the physical and the network layers
How are the application architecture functions split up in a client-server network?
the presentation logic is on the client, while the data storage and data access logic are on the server
One underlying problem with a host-based network is that:
the server can get overloaded since it must process all messages
The fourth layer of the OSI model is called the __________ layer.
transport