Business Data Communications & Networking Quiz Bank Ch 1-12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The data rate for a T-1 circuit in North America is: 1.544 Mbps 6.312 Mbps 44.376 Mbps 274.176 Mbps 1.544 Gbps

1.544 Mbps

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. 200 256 1024 42.____________ is one of the most commonly used coding schemes used in data transmission. *a. ASCII b. ISDN c. MAU d. ATM e. FDM 512 20

1024 (2^10)

In North America, a T1 circuit has ______ 64Kbps channels. 2 30 24 12 36

24

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. 11111111.0.0.0 255.255.255.255 255.255.0.0 255.0.0.0 255.255.255.0

255.255.0.0

The backbone architecture layer that is closest to the users is the Access layer Distribution layer Core layer Privacy layer Switched layer

Access layer

_____________ is an effective way to prevent attenuation. Shielding wires Shorting a circuit Adding fluorescent lights Adding repeaters or amplifiers to a circuit Changing multiplexing techniques

Adding repeaters or amplifiers to a circuit

A(n) _________ is a specially formatted request used to perform IP address to data link address resolution. HTTP request Autonomous System Request Link state request Address Resolution Protocol (ARP) request Domain Name Service (DNS) Request

Address Resolution Protocol (ARP) request

CSMA/CA is an acronym for: Carrier Sense Multiple Acknowledgment with Collision Avoidance Carrier Sensory Multiple Access without Collision Acknowledgment Carrier Sense Multiple Access with Collision Acknowledgment Carrier Sense Mode Access with Carrier Avoidance Carrier Sense Multiple Access with Collision Avoidance

Carrier Sense Multiple Access with Collision Avoidance

The _________ is the part of the backbone that connects the different backbones together. Access layer Distribution layer Core layer Privacy layer Switched layer

Core layer

Ethernet LAN was developed by: CERN laboratory in Geneva DEC, Xerox, and Intel University of Minnesota IBM ARPANET

DEC, Xerox, and Intel

The _______ is the part of the backbone that connects the LANs together. Access layer Distribution layer Core layer Privacy layer Switched layer

Distribution layer

Server name resolution is done using the: Routing Information Protocol Border Gateway Protocol Address Resolution Protocol Domain Name Service Internet Control Message Protocol

Domain Name Service

Which of the following is a term used to group together the physical and data link layers? Hardware layers Middleware layers Software layers Internetwork layers Application layers

Hardware Layers

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. Internet Message Access Protocol File Transfer Protocol Simple Mail Transfer Protocol Hypertext Transfer Protocol Hyperlink Transfer Protocol.

Hypertext Transfer Protocol

Which of the following new Internet efforts was started by 34 universities? CA*net 3 NGI vBNS Internet2 ARDNOC

Internet2

___________ is how the network works conceptually. Physical topology Network topology Ethernet Media access control Logical topology

Logical topology

The software that runs on the mail server is referred to as the ____________ Mail transfer agent Web server Mail user agent Microsoft Outlook SMTP

Mail transfer agent

The acronym, MIME, refers to: Multiple Internet Media Extension Multimedia Internet Mime Extension Multimedia Internet Mail Enterprise Multipurpose Internet Mail Extension Media Internet Mail Extension

Multipurpose Internet Mail Extension

Which of the following statements is true in regards to DSL? On a circuit, the longer the distance, less attenuation occurs. When more attenuation occurs, higher frequency signals can be used effectively. On a circuit, the longer the distance, the higher the speed. On a circuit, the shorter the distance, the higher the speed. On a circuit, the shorter the distance, more attenuation occurs.

On a circuit, the shorter the distance, the higher the speed.

In a ___________ architecture, computers are both client and server, thus sharing the work. Client-based Network Host-based Peer-to-peer Client-server

Peer-to-peer

The direction in which the sound wave begins is known as: bandwidth amplitude, which our ears detect as loudness furlong frequency, which our ears detect as pitch phase

Phase

_________ move packets along the backbone based on their network layer address. Bridged backbones Hubbed backbones Multistation access unit backbones Routed backbones NIC backbones

Routed backbones

____ is the process of creating several logically separate servers on the same physical computer. Server proliferation Server redundancy Server virtualization Server platforming Server optimization

Server virtualization

________ is used to model the behavior of the planned communication network once the proposed network map is complete. Simulation Post-implementation review Implementation Documentation Training users

Simulation

A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. Bridged backbone Virtual LAN Hubbed backbone Switched backbone Routed backbone 815. Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building *c. use a star topology with one interconnect device, usually a switch d. switch the traffic based on layer 3 addresses e. require much more management that do routed backbone networks

Switched backbone

_______ is the dominant network protocol today and is in use in virtually every LAN and WAN in the world. TCP/IP IPX/SPX SDLC SNA X.25

TCP/IP

Which of the following is true regarding switched backbones? They place all network devices for one part of the building physically in the same room, often in a rack of equipment They have an advantage of requiring less cable They make it more difficult to move computers from one LAN to another Network capacity is always tied to the physical location of the computers They are harder to maintain and upgrade than a BN that is not rack-based

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

_________________ is defined as the total number of information bits divided by the total number of bits in the transmission. Throughput Asynchronous rate Transmission efficiency Transmission Rate of Information Bits Protocol percentage

Transmission efficiency

To get a page from the Web, a user must type in a URL, which stands for: Uniform Router Location Unknown Resource Locator Uniform Resource Locator Unknown Router Location Uniform Resource Library

Uniform Resource Locator

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. none of the above WLANs WAN extranet intranet

WLANs

A local area network is: a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning exactly 10 miles with common carrier circuits. a large central network that connects other networks in a distance spanning exactly 5 miles. a network spanning a large geographical area (up to 1000s of miles).

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.

A sniffer program is a: a program that records all LAN messages received for later analysis used in a call-back modem secure hub program small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location type of macro-virus

a program that records all LAN messages received for later analysis

A(n) ___________ is a radio transceiver that plays the same role as a hub in a wired network and connects the WLAN to the wired network. antennae access point Ethernet NIC hub wireless NIC

access point

Symmetric encryption systems have two parts: the key and the ____________. IP spoofer spamming method algorithm clearance code smart card bits

algorithm

The height of a sound wave is called its: frequency amplitude phase furlong bandwidth

amplitude

In which layer of the Internet model would the HTTP protocol be used? application transport network data link physical

application

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. anonymous FTP application architecture response status architecture fat client data access logic

application architecture

The _____________ of a circuit determines a circuit's capacity. bandwidth phase amplitude loudness frequency

bandwidth

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) bottleneck congested network e-commerce edge breakneck building backbone

bottleneck

A digital service offered by cable companies is the _________. G.Lite ADSL Next Generation Internet Abilene network cable modem WAP proxy

cable modem

Dynamic addressing: makes network management more complicated in dial-up networks is always performed for servers only assigns a permanent network layer address to a client computer in a network can solve many updating headaches for network managers who have large, growing, changing networks has only one standard, bootp

can solve many updating headaches for network managers who have large, growing, changing networks

The three fundamental approaches to routing are: circuitous, flat, and direct routing connectionless, static, and connection-oriented host, client, and client-server routing centralized, static routing, and dynamic routing subordinate, master, and insubordinate routing

centralized, static routing, and dynamic routing

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. certificate authority DES company disaster recovery firm fingerprint advisory board directory company

certificate authority

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: sniffing Trojan horse computer forensics tunneling misuse detection

computer forensics

With contention: there is never a chance for "collision," or two computers trying to send data at the same time computers wait until the circuit is free before they send data one computer starts the poll and passes it to the next computer on the multipoint circuit the front-end processor must wait for a response from the polled client or terminal the server or front-end processor works consecutively through a list of clients to determine who should have access to the media

computers wait until the circuit is free before they send data

Routers: connect different IP networks or subnetworks typically do not require any configuration by the network administrator use data link layer addresses to move packets that leave the subnet typically require only one TCP/IP address do less processing on packets than a layer 2 switch doe

connect different IP networks or subnetworks

Media access control refers to: security over floppy disks in a user environment controlling access to a media by more than one computer in a LAN the ability for a user to use multimedia equipment in a LAN the control over coax cable installed by a cable service provider the price of fiber optic cable

controlling access to a media by more than one computer in a LAN

________ controls fix a trespass into the network. corrective detective backup preventive mitigating

corrective

The biggest drawbacks to VLANs are their_________________. cost and management complexity size and contention contention and cost learning curve and contention speed and size

cost and management complexity

In the __________ step of the building-block process to network design, the network designer considers the relative cost of the technology options. needs analysis distribution layering technology design narrow and deep analysis cost assessment

cost assessment

With the two-tier client-server architecture, the server is responsible for the ________ logic. presentation session data access physical application

data access

An example of _____ of data would be if a computer virus eliminated files on that computer. disaster disruption controlled chaos intrusion destruction

destruction

________ controls discover unwanted events. detective mitigating corrective preventive backup

detective

__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. microware directional radio vertical omnidirectional

directional

A tornado that eliminates a network control center would be an example of a natural __________ disruption intrusion disaster controlled chaos destruction

disaster

A network switch failure is an example of a(n) ________ threat. intrusion disaster internal disruptive causal

disruptive

To snare intruders, many organizations now use _________ techniques. Trojan horse entrapment DES hacker cracker

entrapment

Which of the following media is least susceptible to noise? twisted pair unshielded twisted pair coaxial cable shielded twisted pair fiber optic cable

fiber optic cable

IP spoofing means to: illegally tape or listen in on telephone conversations act as an intermediate host computer between the Internet and the rest of the organization's networks fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network detect and prevent denial-of-service attacks clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

A switch uses a _____________ that is very similar to a routing table used in a router. reversing table cable plan forwarding table network server switching mullion

forwarding table

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. full mesh design ring design star design bus design partial mesh design

full mesh design

Having a conversation with someone using a cellular phone is an example of _________ transmission. analog half-duplex full-duplex simplex digital

full-duplex

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. half-duplex analog digital full-duplex simplex

half-duplex

When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: out of range problem hidden node problem media access problem controlled access problem collision problem

hidden node problem

Media access control: does not control when computers transmit is not very important in point-to-point with full duplex configuration is not very important in a multipoint configuration is not very important in local area networks is not very important in a point-to-point with a half duplex configuration

is not very important in point-to-point with full duplex configuration

In ARQ, a NAK: is sent by the sender at the same time as it sends a data packet means that the sender should continue with sending the next message is sent by the recipient if the message was received without error refers to non-asynchronous Kermit technique is sent by the recipient if the message contains an error

is sent by the recipient if the message contains an error

To estimate costs for large network purchases, organizations often: ask other companies for an itemized list of their previous year's IT equipment purchases issue an RFP to vendors purchase all network purchases "off the shelf" obtain "book value" information for the existing network from the accounting department multiply old network costs by a factor of 3

issue an RFP to vendors

Which of the following is a primary advantage of a VPN in comparison to a private WAN connection? low cost inflexibility unpredictable traffic congestion security complexity to the user

low cost

In a ring design WAN, messages can take a long time to travel from the sender to the receiver a message arrives at all computers on the network simultaneously messages always arrive faster than in other types of layouts messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver messages always take one second to travel between sender and receiver

messages can take a long time to travel from the sender to the receiver

A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. intelligent terminal inverse multiplexer multiplexer transponder codec

multiplexer

In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. needs analysis distribution layering technology design narrow and deep analysis cost assessment

needs analysis

Cross-talk: decreases with increased proximity of two wires is always bothersome because it has a high signal strength decreases during wet or damp weather increases with lower frequency signals occurs when one circuit picks up signals in another

occurs when one circuit picks up signals in another

__________ antennas transmit the signal in all directions. radio omnidirectional microware vertical directional

omnidirectional

Frequency division multiplexing: operates by statistically time slicing the signal uses a codec that divides signals into different channels operates by time slicing the signal operates by dividing the signal into different frequencies operates by light dividing the signal

operates by dividing the signal into different frequencies

A _____________ is a user's connection into a packet switched service. packet analog/digital device packet asynchronous/discrete device packet asymmetric/data transmission device packet assembly/disassembly device packet analyzer/decoder device

packet assembly/disassembly device

Devices in a rack are connected together using ___________. patch cables string servers modules chassis switches

patch cables

Networks that are designed to connect similar computers that share data and software with each other are called: host networks local area networks client networks client/server networks peer-to-peer networks

peer-to-peer networks

A _________ is a connection-oriented approach to sending packets on a packet switched service. permanent virtual circuit datagram histogram bursty packet fractional T-1 network

permanent virtual circuit

A logical bus topology: has a central control device, such as a mainframe is limited to short distances since devices like a hub or repeater cannot be used with this type of topology permits every message to be received by every computer on the bus, even when those messages are intended for other computers is always used by token ring protocol LANs has all computers connected to each other in point-to-point connections

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

A "thin client" architecture approach: always is an n-tiered architecture always is a two-tier network architecture places all or almost all of the application logic on the client places all or almost all of the application logic on the server refers to the size of the cable connecting the clients to the network

places all or almost all of the application logic on the server

A _________ is the place at which the ISP provides services to its customers. metropolitan area exchange network access point remote access point point-of-presence cable modem termination system endpoint

point-of-presence

Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. multipoint ring point-to-point shared star

point-to-point

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: data link layer address IP address application layer address port address network address

port address

The traditional network design approach does not work well for _________ networks. modestly growing not growing 71. Which of the following type of media is most commonly used in backbone networks because of its high capacity? *a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair static rapidly growing slowly evolving

rapidly growing

The key principle in preventing disruption, destruction and disaster is ___________. control spreadsheet redundancy prevention controls anti-virus software IDS

redundancy

On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. digitizers repeaters modems amplifiers multiplexers

repeaters

Two primary disadvantages to the ______ BN type are that the routers in the network impose time delays, and routers are typically more expensive and require more management than switches. bridged backbone virtual LAN hubbed backbone collapsed backbone routed backbone

routed backbone

The transport layer must break messages from the application layer into several _____ that can be sent to the network layer. segments bits strings bytes frames

segments

TCP uses _____________ so that the destination station can reassemble the packets into the correct order. packet numbers sequence numbers port numbers IP addresses reassembly value

sequence numbers

The primary source of error in data communications is: echoes intermodulation noise spikes attenuation cross-talk

spikes

With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. sliding window continuous halt and be recognized (HBR) stop and wait open window

stop and wait

A(n) ________ refers to a group of computers that are logically grouped together by available IP numbers. TCP group IPv6 group data link group application net subnet

subnet

In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the user's needs. cost assessment technology design narrow and deep analysis needs analysis distribution layering

technology design

A brute force attack against an encryption system: is also known as 3DES tries to gain access by trying every possible key is part of the Advanced Encyrption Standard is called RC4 always uses the Rijndael algorithm

tries to gain access by trying every possible key

With a virtual private network, users can create permanent virtual circuits through the Internet called: bursts cells tunnels rings clouds

tunnels

The performance of WANs can be improved by: upgrading the circuits between the computers increasing the demand placed on the network downgrading the circuits between the computers downgrading the devices that provide access to the circuits increasing network traffic

upgrading the circuits between the computers

Switch-based Ethernet: has a logical topology of a ring has a logical topology of a bus uses a hub to connect computers has a physical topology of a ring usually enables all attached circuits to send or receive packets simultaneously

usually enables all attached circuits to send or receive packets simultaneously

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. local carrier network virtual private network integrated service digital network software defined network SONET network

virtual private network

Fiber to the Home uses time division multiplexing all of the above wavelength division multiplexing frequency division multiplexing statistical time division multiplexing

wavelength division multiplexing

A (n) ______ is a special type of virus that spreads itself without human intervention. stealth virus snake worm boot sector virus Trojan horse

worm


संबंधित स्टडी सेट्स

Advanced Social Media & Analytics Exam One

View Set

CAE National Geographic 1 Sentence Transformations test 6

View Set

Money and Banking Chapter 5 Questions

View Set

Chapter 47: Caring for Clients with Disorders of the Liver, Gallbladder, or Pancreas

View Set

W8 - Unemployment & Economic Growth (Theory)

View Set

Investments in Debt & Equity Securities

View Set

MGNT - 4080 Special Topics: Project Management

View Set