CNT Final Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a characteristic of a switched logical topology? (Choose all that apply.) Select one or more: a. Uses a physical bus topology b. Creates dynamic connections c. Sometimes called a shared-media topology d. Uses a physical star topology

Creates dynamic connections, Uses a physical star topology

Which of the following is a field of the most common Ethernet frame type? (Choose all that apply.) Select one or more: a. FCS b. MAC type c. Destination MAC Address d. Data e. ARP trailer

FCS, Destination MAC Address, Data

Which protocol uses TCP port 21 be default?

FTP

T/F: A collision can occur on a switch only if the switch is operating in full-duplex mode.

False

T/F: An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255.

False

T/F: DNS is a protocol that automatically provides a computer with its IP address configuration.

False

T/F: IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

False

T/F: The first packet in the four-packet exchange between a DHCP client and server is the DHCPRequest.

False

T/F: The physical bus topology is no longer used because it required extra cable to connect all the computers and required a central device.

False

T/F: When a NIC is in "promiscuous" mode, it will process only the frames in which the destination MAC address matches its own MAC address.

False

T/F: You cannot connect a hub to another hub unless it has an uplink port.

False

Which of the following is an advantage of a star topology? (Choose all that apply.) Select one or more: a. Allows faster technologies than a bus does b. Centralized monitoring of network traffic c. No single point of failure d. Requires less cabling than a bus

Allows faster technologies than a bus does, Centralized monitoring of network traffic

Which of the following components provides a number of critical services, including a user interface, memory management, multitasking, and the interface to hardware devices? Select one: a. Operating system (OS) b. RAM c. BIOS d. Hard drive

BIOS

Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data? Select one: a. Bandwidth multiplier b. Bandwidth optimization c. Bandwidth dedication d. Bandwidth sharing

Bandwidth sharing

What type of packets are transmitted between DHCP client and server when a client is initially leasing an IP address?

Broadcast

To which device is a wireless access point most similar in how it operates? Select one: a. Router b. Hub c. Switch d. NIC

Hub

Which structured cabling component provides connectivity to computer equipment in the nearby work area?

IDF

a telecommunications closet that houses the cabling and devices for work area computers

IDF

protocol in which only e-mail headers are downloaded to the host until the message is opened

IMAPv4

Which of the following protocols provides connectionless service? (Choose 2.) a. TCP b. HTTP c. UDP d. IP

IP, UDP

an extension to IP working at the Internetwork layer that provides security by using authentication and encryption

IPsec

_______ addresses are 128 bits, so the number of possible addresses can be expressed as 34 followed by 37 0s.

IPv6

A(n) ________________ measures the amount of light transmitted by a device on a fiber-optic cable and whether the amount of light on the cable's receiver meets the requirements for the device you're connecting.

OPM

Which of the following is a feature of 100BaseFX? (Choose all that apply.) Select one or more: a. Uses two strands of fiber b. The fastest of the Ethernet standards c. Best when only short cable runs are needed d. Often used as backbone cabling

Often used as backbone cabling, Uses two strands of fiber

The entrance facility is the place where the connection to a WAN is located. It is basically the point where the LAN begins and ends. What is another name for this point?

demarcation point

Which component manages the details of communicating with the NIC hardware to send and receive data to and from network media?

device driver

You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do? Select one: a. Connect the switches in groups of five, and connect each group of switches to a central hub. b. Upgrade the switches to a faster speed. c. Disable broadcast forwarding on the switches. d. Reorganize the network into smaller groups and connect each group to a router.

Reorganize the network into smaller groups and connect each group to a router.

With some types of wireless networks, before a computer can transmit data to the AP, it must first send a short ________________________message to let the AP know it intends to transmit data.

Request to Send (RTS)

If you want a computer to be assigned the same IP address each time an address is assigned, what DHCP option should you configure?

Reservation

What element of a DHCP server uses the client MAC address to ensure that the client is leased the same address each time it requests an IP address?

Reservation

What's another name for a DNS client?

Resolver

Where does a DNS server look when it can't resolve a query from its zone records or cache?

Root hints

Which of the following accurately describes the .edu in the FQDN www.yc.edu?

Top-level domain

If you want to design an Application-layer protocol that provides fast, efficient communication and doesn't work with large amounts of data, what Transport-layer protocol would you design it to use?

UDP

Transport layer protocol that is connectionless

UDP

Which transport protocol does DHCP use?

UDP

Which of the following is a Transport layer protocol? (Choose 2.) a. ICMP b. ARP c. DHCP d. UDP e. IP f. TCP

UDP, TCP

You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing?

WAN

You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?

device driver

a method for transmitting data in which two wires of opposite polarity are used

differential signal

what characteristic of twisted pair cabling helps mitigate the effects of crosstalk?

differential signals

What is a disadvantage of using fiber-optic cabling?

difficult to install

(Ch 4 Rev) Which of the following wireless technologies does an 802.11 wireless network using the 2.4 GHz frequency range use?

direct-sequence spread spectrum

You have installed Windows Server 2012 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?

directory services

is a collection of users and computers whose accounts are managed by Windows servers called domain controllers.

domain

is a packet that has been encapsulated with the source and destination MAC addresses in the header and an error-checking code in the trailer.

frame

What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch? Select one: a. Uplink port b. Full-duplex mode c. Shared bandwidth d. Frame doubling e. Bit strengthening f. Signal regeneration

full duplex

A switch operating in ___________ mode can send and receive data at the same time.

full-duplex

communication in which a device can send and receive signals but not at the same time

half-duplex mode

which of the following is a characteristic of unshielded twisted-pair cable? (choose 2)

has a distance limitation of 100 meters, is susceptible to electrical interference

The frequency at which a wireless network operates is measured in cycles per second and is expressed as what unit of measurement?

hertz

runs from work area's jack to telecommunications closet

horizontal wiring

Which of the following are components of a network that are defined by structured cabling? (Choose Three)

horizontal wiring, entrance facility, work area

What are you likely to find in a DNS zone?

hostname-IP address pairs

A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?

hub

device that connects multiple computers but regenerates signals out all ports

hub

Which of the following is the purpose of an SSID? Select one: a. Assigns an address to a wireless NIC b. Acts as a unique name for a local area connection c. Identifies a wireless network d. Acts as a security key for securing a network

identifies a wireless network

Peer-to-peer networks aren't suitable in which of the following situations? Select one: a. Five or fewer users need network access. b. Tight security is required c. Budget is the primary consideration. d. No one uses the network heavily.

tight security is required

Which of the following is NOT a field in an Ethernet frame?

time-to-live

which of the following technologies are used in wireless LANs use for transmitting and receiving data?

narrowband radio, spread-spectrum radio

What command would you issue from the command prompt to test whether your computer has connectivity to the network?

ping IPaddress

the space between a false ceiling and the true ceiling where heating and cooling air circulates is called the __________.

plenum

direct connection between two devices

point-to-point topology

Which of the following is used by TCP and UDP to specify the source and destination Application-layer protocols?

port numbers

Which statements are correct about the gatekeeper?

to block network traffic not intended for a specific computer, Its on the NIC

when might you want to use a rollover cable?

to configure a Cisco device

Which media access method is used by FDDI?

token passing

A device used to trace or locate cables.

tone generator

What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer?

tracert

which command displays the route packets take between two computers?

tracert

what is the name of the device that is used to translate between wired and wireless networks (choose2)

transceiver, access point

Which of the following is NOT a function of a hub?

transmits the signal to the correct port

(Ch 4 Test) t/f: Wireless and wired networks are both susceptible to RFI.

true

(t/f) In order to find out your MAC address, you should open a command prompt and type ipconfig /all.

true

(t/f) What makes a computer a "server" is the fact that it has a server operating system installed on it.

true

(t/f)A network that has locations in different countries is considered a WAN.

true

True or False: All hosts on the same network must share the same network ID.

true

True or False: In a physical star topology, a failure in the central device causes the entire network to go down.

true

t/f: CSMA/CD is the name of the media access method used by Ethernet

true

t/f: There are two basic categories of physical cabling used in Ethernet networks. They are copper wire and fiber optic.

true

t/f: Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping.

true

t/f: Most office buildings usually have a false ceiling with an area above that which is used to run conduit for heating and air conditioning units, called the plenum.

true

t/f: Token Passing is used by FDDI

true

t/f: When copper wires are bundled together, they are susceptible to crosstalk a form of interference where the signals leak out onto other wires.

true

t/f: Wireless networks are often used to extend the reach of a wired LAN.

true

t/f: fiber-optic cable is immune to electromagnetic interference? (EMI)

true

What is a frame called that is intended for only one individual computer?

unicast

What is a packet called that is intended for only one individual computer?

unicast

Question text You're configuring a WLAN in a long narrow ballroom. The only place you can put the AP is at the far end of the room. Which type of antenna should you use?

unidirectional

When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?

switch

device that uses MAC addresses to determine the destination of frame

switch

Which of the following connections might require a crossover cable?

switch to switch

What is the most common topology and technology combination in use today?

switched/Ethernet

which IPv6 transition technology can be used with NAT routers and has the address prefix 2001::/32?

teredo

Which of the following is not one of the main differences between the types of network cabling?

the ability to send and receive signals

What does a switch store in its switching table?

the source MAC address of a frame and the port it was received on

When discussing Ethernet standards, what does the XBaseY terminology refer to?

the transmission speed, the type of transmissions, and the length or type of cabling

what happens to signals as they travel the length of the medium?

they attenuate.

TCP establishes a connection with the destination device using which process?

three-way handshake

With a _________ antenna, signals are focused in a single direction, which makes them ideal for placement at one end of long, narrow spaces or to cover distances between buildings.

unidirectional

Review the routing table in Figure 2-25. Based on this figure, where does the router send a packet with the source network number 1.0 and the destination network number 3.0? Select one: a. None of the above b. WAN A c. WAN B d. EthA

wan B

What does TCP use to provide flow control?

window size

(Ch 4 Quiz) which device can be used to connect networks up to three miles?

wireless bridge

Which technology is likely to be implemented as a point-to-point physical topology?

wireless bridge

On a Windows based peer to peer network, all computers are members of a:

workgroup

There are two different network models. One of them, a peer-to-peer network, also is referred to as a

workgroup

(Ch 6 Test)

wow we havent taken it yet

Using the physical mail analogy, what part of an address on an envelope is most like the IP address?

zip code

in a Class C network 192.168.1.0 how many subnets are available with a subnet mask of 255.255.255.0?

1

In an MDI device, on which two pins does the device use to transmit?

1,2

which IP address expressed in CIDR notation has the subnet mask 255.255.255.0?

10.100.44.123/24

(Ch 3 Quiz) Question text When using UTP cabling, what is the maximum cable segment allowed from the computer to a hub or switch?

100 Meters

When using UTP cabling, what is the maximum cable length that can be used from the NIC to a hub or switch?

100 meters

What is the maximum bandwidth for a network cabled using category 5e UTP cable?

1000Mbps

What is the maximum cable length for both category 5e and category 6 UTP cable?

100m

convert this IP address into Binary: 172.16.1.55

10101100.00010000.00000001.00110111

Which 10 Gigabit standard uses MMF cabling for distances up to 300 meters and is often used for SONET campus networks?

10GBaseSW

what is the standard that describes 10 Gigabit running over four pairs of CAT6A cabling?

10GBaseT

How many channels can be used on an 802.11b network in North America?

11

Which of the following is a common operational speed of a wireless network? Select one: a. 600 Kbps b. 11 Mbps c. 110 Gbps d. 10 Kbps

11 mbps

A device used to terminate twisted pair cables in a patch panel

110 punchdown tool

convert this IP address into Binary: 192.168.100.223

11000000.10101000.01100100.11011111

convert this IP address into Binary: 207.42.64.29

11001111.00101010.01000000.00011101

convert this IP address into Binary: 225.240.235.210

11100001.11110000.11101011.11010010

With access points signals don't travel through a physical medium; they travel through the airwaves as radio signals.

12 hexadecimal characters

Which of the following IP addresses has 12 bits in the host ID?

12.156.109.252/20

(Ch 5) How many bits are in an IPv6 address?

128

An IPv6 address is made up of how many bits?

128

how many bits are in an IPv6 address?

128

You just joined a new company and the network administrator has assigned you your own subnet you will be the administrator of. The network is a Class A network 10.0.0.0 and uses a subnet mask of: 255.240.0.0 How many subnets are available on this network.

16

which IP network address expressed in CIDR notation can support a maximum of 1022 hosts?

172.16.4.0/22

which address can't be assigned to a host computer?

172.16.7.255/22

which of the following is a private IP address and can't be routed across the Internet?

172.19.243.254

convert this IP address into Binary: 10.10.10.254

00001010.00001010.00001010.11111110

(Ch 6 Subnetting) Convert this IP address into Binary: 15.19.193.217

00001111.00010011.11000001.11011001

convert this IP address into Binary: 65.45.200.100

01000001.00101101.11001000.01100100

convert this IP address into Binary: 68.220.237.173

01000100.11011100.11101101.10101101

convert this IP address into Binary: 78.15.77.130

01001110.00001111.01001101.10000010

convert this IP address into Binary: 105.178.40.32

01101001.10110010.00101000.00100000

You are a network consultant and a business is asking you to quote the cost of creating a WAN for them. They currently have two offices which are not connected and they are adding 1 more so they need to have all 3 office connected. They heard that a physical mesh is the best topology for redundancy but they are afraid of the costs so they have asked you to come up with two options. You suggest a physical star or the physical mesh. What is the setup cost difference for their WAN between the star and mesh? The router they will need has 3 WAN ports and costs $2000 Each Connection will cost them $5000 For the star network they will use their current headquarters as the central connecting locations so there isn't a need to purchase a 4th router.

$5000

in a Class C network 192.168.1.0 how many hosts are available with a subnet mask of 255.255.255.254?

0

Judy has just sent a ping message from her computer to John's computer using John's computer's IP address to verify that she has connectivity. List the steps that the message takes to get to the other computer and what layer of the network communication process each step relates to. 1st, Judy opens a command prompt and types the command "ping 192.168.0.10". Answer 1 2nd, Judy's computer to create the ping message to send to John's computer. Answer 2 3rd A, The ping message then is encapsulated with the IP addresses of both Judy's computer and John's, which are the source and destination IP addresses. Answer 3 3rd B, Judy's computer also finds out what the MAC address of John's computer is, which will be the destination MAC address. Answer 4 Finally, Judy's computer adds her MAC address and John's MAC address (source and destination MAC addresses) to the package, converts the message into bits, and sends it to the network medium.

1st, Judy opens a command prompt and types the command "ping 192.168.0.10". → application layer 2nd, Judy's computer to create the ping message to send to John's computer. → network software layer 3rd A, The ping message then is encapsulated with the IP addresses of both Judy's computer and John's, which are the source and destination IP addresses. → network protocol layer 3rd B, Judy's computer also finds out what the MAC address of John's computer is, which will be the destination MAC address. → network protocol layer Finally, Judy's computer adds her MAC address and John's MAC address (source and destination MAC addresses) to the package, converts the message into bits, and sends it to the network medium. → network interface step

how many strands of fiber-optic cable are needed for a network connection?

2

A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1—backbone cabling 2—entrance facility 3—equipment room 4—horizontal wiring 5—telecommunications closet 6—work area

2, 1, 3, 1, 5, 4, 6

which of the following represents a valid IPv6 address?

2001:345:abcd::BEEF:44

in a Class C network 192.168.1.0 how many hosts are available with a subnet mask of 255.255.255.0?

254

you have a Class B network 172.16.0.0 that needs to be setup in a way that there are at least two networks and at least 300 computers per network. What subnet mask should you use?

255.255.128.0

Horizontal wiring from the wall jack to the patch panel should be no longer than how many meters?

90 meters

currently you have a class B network 172.16.0.0 Currently you have been having problems with security and network performance. A consultant suggests splitting the network into 32 separate networks to help with security and bandwidth. What subnet mask should you use that will give you the most number of computer stations per subnet but still give you at least 32 subnets? (Answer should look simular to this: 255.255.255.255)

255.255.248.0

what subnet mask does the following network in CIDR notation have? 192.168.2.0/27

255.255.255.224

you have a Class C network with an address 192.168.55.0, what subnet mask will allow you to have 16 subnets? Answer with the full subnet mask (all 4 octets)

255.255.255.240

for the Class C network address 192.168.10.0, what subnet mask provides 32 subnets?

255.255.255.248

you just joined a new company and the network administrator has assigned you a subnet you will be the administrator of. The network is a Class C network 192.168.15.0 and uses a subnet mask of: 255.255.255.224 How many hosts are available on these networks.

30

In a Class C network 192.168.1.0 how many subnets are available with a subnet mask of 255.255.255.248?

32

how many bits must be reallocated from host ID to network ID to create 16 subnets?

4

Which of the following is NOT a component of an Ethernet frame header?

4-byte frame check sequence

At what speed did token ring originally operate?

4Mbps

At what speed did token ring originally operate?

4mbps

What port number is associated with the DNS server service?

53

what address should you ping if you want to test local IPv6 operation but don't want to actually send any packets on the network?

::1

How many host bits are necessary to assign addresses to 62 hosts?

6

how many links (cables) would you need in a full mesh configuration if you had 4 nodes?

6

in a Class C network 192.168.0.0 how many hosts are available with a subnet mask of 255.255.255.192?

62

How many bits are in the interface ID of an IPv6 address?

64

which of the following tunneling protocols requires that the IPv4 address embedded in the tunneling address must be a public address?

6to4

What is the IEEE standard governing wireless networking?

802.11

What is the networking standard for wireless networking

802.11

What is the networking standard for wireless networking (also known as Wireless Fidelity or Wi-Fi)?

802.11

Which Wi-Fi standard can provide the highest bandwidth?

802.11ac

Which Wi-Fi standard uses beamforming to allow an AP to send data to multiple devices simultaneously?

802.11ac

What is the difference between a client and a server, in networking terms? Select one: a. A client can be a workstation that requests network resources from a server. A server provides a network service to client computers. b. A server can be a workstation that requests network resources from a client. A client provides a network service to client computers.

A client can be a workstation that requests network resources from a server. A server provides a network service to client computers.

Which of the following best describes a client? Select one: a. A computer's primary role in the network is to run user applications and access network resources. b. A computer's primary role in the network is to give other computers access to network resources and services. c. The OS installed on a computer is designed mainly to share network resources. d. It's the software that responds to requests for network resources.

A computer's primary role in the network is to run user applications and access network resources.

Which of the following is true of a MAC address?

A destination address of 12 hexadecimal Fs is a broadcast.

Match the description with the type of network? A network where all computers are hierarchically equal to one another. Answer 1 Networks may extend beyond the boundaries of a building but with in the same geographical location. Answer 2 A network that connects two or more different geographically locations. Answer 3 A network with a central computer that controls communication and resource sharing. Answer 4 A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.

A network where all computers are hierarchically equal to one another. → peer-to-peer, Networks may extend beyond the boundaries of a building but with in the same geographical location. → MAN (metropolitan area network), A network that connects two or more different geographically locations. → WAN (wide area network), A network with a central computer that controls communication and resource sharing. → client/server network, A network of computers and other devices that is confined to a relatively small space, such as one building or even one office. → LAN (local area network)

List the five steps in order that a switch performs for each frame. The switch looks up the destination MAC address in its switching table. Answer 1 The switching table is updated with the source MAC address and port information. Answer 2 The switch receives a frame. Answer 3 The switch reads the source and destination MAC addresses. Answer 4 The switch forwards the frame to the port where the computer owning the MAC address is found. Answer 5

A switch's operation can be summarized in these steps: 1. The switch receives a frame. 2. The switch reads the source and destination MAC addresses. 3. The switch looks up the destination MAC address in its switching table. 4. The switch forwards the frame to the port where the computer owning the MAC address is found. 5. The switching table is updated with the source MAC address and port information.

When a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?

APIPA

type of address that is automatically assigned when no DHCP server can be contacted

APIPA

when a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it?

APIPA

(Ch 5 Rev Q) Which of the following protocols resolves logical addresses to physical addresses?

ARP

Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?

ARP

What protocol is used to resolve a logical IP address to a physical MAC address?

ARP

Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?

ARP

_______ is used to resolve a logical (IP) address to a physical (MAC) address.

ARP

resolves IP address to MAC address

ARP

Match these network types with their description. An internetwork that is confined to a geographic region such as a city or county; uses third-party communication providers to provide connectivity between locations. Answer 1 A small network, limited to a single collection of machines and linked by interconnecting devices in a small geographic area. Answer 2 A private network in which devices and servers are available only to uses connected to the internal network. Answer 3 A networked collection of LANs tied together by devices such as routers. Answer 4 Internetworks that are geographically dispersed and use third-party communication providers to provide connectivity between locations. Answer 5 A worldwide public internetwork that uses standard protocols, such as TCP/IP, DNS, and HTTP, to transfer and view information.

An internetwork that is confined to a geographic region such as a city or county; uses third-party communication providers to provide connectivity between locations. → MAN, A small network, limited to a single collection of machines and linked by interconnecting devices in a small geographic area. → LAN, A private network in which devices and servers are available only to uses connected to the internal network. → intranet, A networked collection of LANs tied together by devices such as routers. → internetwork, Internetworks that are geographically dispersed and use third-party communication providers to provide connectivity between locations. → WAN, A worldwide public internetwork that uses standard protocols, such as TCP/IP, DNS, and HTTP, to transfer and view information. → Internet

which category of UTP is the recommended cabling standard for 1 gbps over copper media?

CAT6

What type of resource record is an alias for another record?

CNAME

The __________ executes instructions provided by computer programs.

CPU

Which component, located on the motherboard, carries out all the instructions provided by computer programs?

CPU

In wireless networks, what type of media access control is used?

CSMA/CA

Which access method does Wi-Fi use?

CSMA/CA

access method used by Wi-Fi

CSMA/CA

What is the media access method used by Ethernet?

CSMA/CD

Which access method uses a "listen before sending" strategy?

CSMA/CD

devices on the network must listen first before they can transmit

CSMA/CD

Which of the following is a characteristic of fiber-optic cabling? (Choose all that apply.) Select one or more: a. Requires only a single strand of fiber for network connections b. Lower bandwidth capability c. Carries data over longer distances than UTP d. Can be used in electrically noisy environments

Can be used in electrically noisy environments, Carries data over longer distances than UTP

what is the name of the media access method used by Ethernet?

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

Which of the following categories of UTP cabling are considered to be data grade as specified by ANSI/TIA/EIA? (Choose Three.)

Cat 4,5,6

which of the five IP Address class ranges are available for host assignment? (choose 3)

Classes A,B,C

Windows 7 and Windows 10 are examples of which of the following?

Client operating system

A network with a central computer that controls communication and resource sharing.

Client/Server network

Which of the following is true about full-duplex Ethernet? (Choose all that apply.) Select one or more: a. Collision detection is turned off. b. It's possible only with switches. c. Stations can transmit and receive but not at the same time. d. It allows a physical bus to operate much faster.

Collision detection is turned off., It's possible only with switches.

Which of the following describe the function of routers? (Choose all that apply.) Select one or more: a. Forward frames from one network to another b. Attach computers to the internetwork c. Work with packets and IP addresses d. Connect LANS

Connect LANS, Work with packets and IP addresses

Which protocol can configure a computer's IP address and subnet mask automatically?

DHCP

dynamically configures IP address

DHCP

What is the correct order of DHCP packets when a computer requests its IP address configuration?

DHCP Discover, Offer, Request Ack

Which of the following is the first packet sent when a computer wants to lease an IP address?

DHCPDiscover

TCP/IP uses _________ to look up a computer's IP address, given its name.

DNS

resolves computer names to IP addresses

DNS

Which of the following Application-layer protocols typically uses the UDP Transport-layer protocol? (Choose all that apply.) a. DHCP b. Root hints c. DNS d. HTTP

DNS, DHCP

Which of the following is a function of the Application layer?

Data formatting and translation

Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.) Select one or more: a. Centralized control b. Inexpensive c. Uses a directory service d. Decentralized data storage e. User-managed resources

Decentralized data storage, Inexpensive, User-managed resources

the subnet mask of an IP address does which of the following?

Defines network and host portions of an IP address

text Which of the following is a function of the Internetwork layer?

Deliver packets efficiently

What is the name given to software that provides the interface between the OS and computer hardware?

Device driver

Why is the use of a switch preferred over a hub?

Devices on a hub have to share the available bandwidth. Switches are intelligent; they read the frame and determine where to send it. Switches can operate in full-duplex mode.

If a router receives a packet with a destination network address unknown to the router, what does the router do?

Discard the packet.

which of the following is UTP susceptible to? (choose 2)

EMI, crosstalk

Ping uses ICMP ___________ packets to request a response from another computer to verify whether it's available for communication.

Echo

What is the Ethernet frame type that is used by TCP/IP?

Ethernet II

Which is the correct order of headers, from left to right, in a completed frame?

Frame, IP, UDP

. A multi-port repeater is often referred to as a _________________. Select one: a. Switch b. Hub c. Bridge d. Network Interface Card

HUB

Which of the following is a characteristic of unshielded twisted-pair cabling? (Choose all that apply.) Select one or more: a. Commonly used in physical bus topologies b. Susceptible to electrical interference c. Has a distance limitation of 100 meters d. Consists of four wires

Has a distance limitation of 100 meters, Susceptible to electrical interference

Put the definitions of input output processing in order that they happen within a computer. Information is sent to whatever device is appropriate to perform or display the output. Output devices include, but are not limited to, monitors, printers, and storage devices. Answer 1 The CPU processes information, which means that it examines the information and determines or calculates the results. Answer 2 Input can come from several different devices like a mouse, a keyboard, or storage. Input usually is generated by a user's actions, but not always. Answer 3

Information is sent to whatever device is appropriate to perform or display the output. Output devices include, but are not limited to, monitors, printers, and storage devices. → Step 3, The CPU processes information, which means that it examines the information and determines or calculates the results. → Step 2, Input can come from several different devices like a mouse, a keyboard, or storage. Input usually is generated by a user's actions, but not always. → Step 1

At what layer of the TCP/IP protocol suite are IP addresses defined and verified?

Internetwork

If a protocol is routable, which TCP/IP layer does it operate at?

Internetwork

In which layer does a router operate?

Internetwork

(Ch 2 Review) What's the purpose of an RTS signal in wireless networking?

It allows a client to notify the AP that it's ready to send data.

How does a protocol analyzer capture all frames? Select one: a. It sets the exclusive mode option on the NIC. b. It sets all incoming destination addresses to be broadcasts. c. It captures only multicast frames. d. It configures the NIC to operate in promiscuous mode. e. It configures the NIC to capture only unicast frames.

It configures the NIC to operate in promiscuous mode.

What does a switch do if it doesn't find the destination MAC address in its switching table?

It forwards the frame to all ports

Which of these statements describe a broadcast frame? (Choose 4) a. It is a MAC address with all binary 1s b. in hexadecimal notation reads as FF-FF-FF-FF-FF-FF c. They are intended for all devices on a network d. They are blocked by routers e. They are blocked by switches

It is a MAC address with all binary 1s, in hexadecimal notation reads as FF-FF-FF-FF-FF-FF, They are intended for all devices on a network, They are blocked by routers

What does it usually mean when the activity light on a switch is blinking?

It is communicating with the network

What is the main disadvantage of cable modem networking?

It uses a bus topology.

A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent?

It's the organizationally unique identifier for the manufacturer of the device.

What is the purpose of the default route?

It's where the router sends all packets with destinations of which it has no knowledge.

A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?

LAN

A network of computers and other devices that is confined to a relatively small space, such as one building or even one office.

LAN

A/an ____ is recommended if the network use and security factors don't require using a router.

LAN

which of the following IPv6 features is an enhancement to IPv4? (Choose 2)

Larger address space, Built-in Security

Which of the following IPv6 features is an enhancement to IPv4? (Choose 2.) a. It is a cooler version b. Works at the Internetwork and Transport layers c. Larger address space d. Built-in security e. Connectionless communication

Larger address space, Built-in security

Which of the following is a likely indicator light on a hub? (Choose all that apply.) Select one or more: a. Connection speed b. Activity c. Signal strength d. CRC error e. Link status

Link status, Connection speed, Activity

which IPv6 address type can't be routed and are equivalent to Automatic Private IP Addressing (APIPA) in IPv4?

Link-local address

What does LAN stand for

Local Area Network

The _________ address is composed of two 24-bit numbers.

MAC

What is the name of the address that is part of a NIC?

MAC

(Ch.1 test) Every NIC is embedded with a unique address that consists of a 12-digit hexadecimal value. What is this address called?

MAC address

Every NIC has a unique address that consists of a 12-digit hexadecimal value. What is this address called?

MAC address

Which of these statements are true about a MAC address? (Choose 3) a. MAC address is a number that is burned into the memory of each NIC b. It is a unique number assigned by the manufacturer c. the last 24 bits are a serial number assigned by the manufacturer d. It is 48 bits and is usually expressed in six two-digit hexadecimal numbers e. The first 24 bits are an ID number for the manufacturer, called the OUI

MAC address is a number that is burned into the memory of each NIC, It is a unique number assigned by the manufacturer, It is 48 bits and is usually expressed in six two-digit hexadecimal numbers, The first 24 bits are an ID number for the manufacturer, called the OUI, the last 24 bits are a serial number assigned by the manufacturer

In network communication, the ______________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.) a. IP b. Logical c. MAC d. Physical

MAC, Physical

Networks may extend beyond the boundaries of a building but with in the same geographical location.

MAN

The XYZ company has two offices, one downtown, and a brand new office in the newer section of town. To connect the two offices, they will need a dedicated line, probably leased from the local phone company. What type of network will they be implementing to connect their two offices?

MAN

use WAN technologies to interconnect LAN's in a specific geographic region.

MAN's

an equipment and cabling room that serves as the connecting point for backbone cabling between buildings and between IDFs

MDF

where are you most likely to find backbone cabling? (choose 2)

MDF, between IDFs

which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables?

MT-RJ

What type of record do you need to create so the address of your mail server can be resolved?

MX

(CH. 1 quiz) What is the physical address assigned to NICs called?

Media Access Control

which fiber optic media type uses light-emitting diodes (LEDs) instead of lasers?

Multimode fiber (MMF)

which IP addressing process enables workstations to use private IP addresses to access the Internet?

NAT

What component of the computer provides it with a MAC address?

NIC

Choose the correct order for the process of a user attempting to access network resources: NIC driver Answer 1 Network protocol Answer 2 Network client Answer 3 Application

NIC driver → 4, Network protocol → 3, Network client → 2, Application → 1

In what layer does the NIC operate?

Network Access

In which layer does Ethernet operate?

Network Access

(Ch 6 Rev Q) When using TCP/IP, which of the following must computers on the same logical network have in common? (Choose 2)

Network ID, Subnet Mask

NIC stands for

Network Interface Card

What information is found in a routing table? Select one: a. Computer names and IP addresses b. Network addresses and interfaces c. MAC addresses and ports d. IP addresses and MAC addresses

Network addresses and interfaces

Which of the following requests information stored on another computer? Select one: a. Device driver b. NIC c. Network server d. Network protocol e. Network client

Network client

Which of the following is a reason to subnet? (Choose 2)

Networks can be divided into logical groups., Subnetting can decrease the size of broadcast domains.

What is the best way to eliminate the possibility of collisions in a network?

Only use switches, Use NICs that operate in full-duplex mode.

which type of connection is most likely to require a crossover cable?

PC to router

You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 1GB of memory onboard. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate?

PCI-express

You want to purchase a high-performance graphics card for your computer. Which type of connector should it have?

PCI-express

Which topology is likely to be deployed in a WAN where there's a central office and three branch offices, and you want all traffic from the branch offices to go through the central office network? Select one: a. Point-to-point b. Mesh c. Ring d. PMP

PMP

protocol in which e-mail is downloaded to the host computer

POP3

In a/an ____, every user must also act as a network administrator, controlling access to the resources on their machines.

Peer to Peer

A network where all computers are hierarchically equal to one another.

Peer to peer

You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?

Peer to peer

You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible What type of network should you install?

Peer to peer

Which of the following is a task usually performed by the BIOS? (Choose all that apply.) Select one or more: a. Store the operating system. b. procedure c. Create an interrupt. d. Perform a POST.

Perform a POST., procedure

Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?

Physical ring

(Ch 3 test ) In which topology does a central device communicate with two or more other devices and is used in WANs where a main office has connections to several branch offices via a router?

Point-to-multipoint

What does the Transport layer use to identify source and destination Application-layer protocols?

Port number

Place the following steps of the boot procedure in order. Power is applied Answer 1 The OS is loaded into RAM Answer 2 Boot devices are searched Answer 3 OS services are started Answer 4 The POST is executed Answer 5 CPU starts

Power is applied → 1, The OS is loaded into RAM → 5, Boot devices are searched → 4, OS services are started → 6, The POST is executed → 3, CPU starts → 2

Which of the following is a basic function a computer performs? (Choose all that apply.) Select one or more: a. Graphics b. E-mail c. Internet access d. Output e. Processing f. Input

Processing, Input, Output

Name the three basic tasks all computer perform: Select one or more: a. Input b. Processing c. Hacking d. Output e. Email

Processing, Output, Input

Which of the following is a task performed by a NIC and its driver? (Choose all that apply.) Select one or more: a. Receives packets from the network protocol and creates frames b. Adds a header before sending a frame to the network protocol c. Converts bit signals into frames for transmission on the medium d. Adds error-checking data to the frame e. Provides a connection to the network medium

Provides a connection to the network medium, Receives packets from the network protocol and creates frames, Adds error-checking data to the frame

Which Application-layer protocol provides remote access to a Windows computer via a GUI?

RDP

Which protocol is used to access a Windows computer remotely using the Windows graphical user interface?

RDP

what type of connector is used most commonly with TP network wiring?

RJ-45

Before a computer can transmit data on a wireless network in some cases, it must send What type of signal to the AP?

RTS

Which of the following is true of a repeater? Select one: a. Receives bit signals and strengthens them b. Receives frames and forwards them c. Determines which network to send a packet d. Has a burned-in MAC address for each port

Receives bit signals and strengthens them

Identify which properties is performed by a traditional router or switch works with packets rather Answer 1 works with logical (IP) Answer 2 doesn't forward broadcast traffic Answer 3 connect LANs with different subnet Answer 4 works with frames Answer 5 keeps information about the networks it knows about and which interface that network can be reached from Answer 6 It's tablet contains MAC address and port information. Answer 7 works with physical (MAC) Answer 8

Routers don't forward broadcast packets, but switches do. Routers use routing tables, and switches use switching tables. The correct answer is: works with packets rather → Routers, works with logical (IP) → Routers, doesn't forward broadcast traffic → Routers, connect LANs with different subnet → Routers, works with frames → switches, keeps information about the networks it knows about and which interface that network can be reached from → Routers, It's tablet contains MAC address and port information. → switches, works with physical (MAC) → switches

Which Application layer protocol is used for file-sharing? (Choose 2.) a. SMB b. HTTP c. DNS d. SMTP e. NFS

SMB, NFS

which statement is true about fiber-optic cables?

SMF uses lasers and has a thinner core

Which Application-layer protocol is used to monitor and manage network devices, and what Transport-layer protocol does it use?

SNMP, UDP

What information must you have in order to connect to a wireless network? Select one: a. SSID b. MAC address of the switch c. Al Gore d. MAC address of the router e. Name of the switch

SSID

What is the first segment in the three-way handshake?

SYN

Which of the following is considered a property of Ethernet? (Choose all that apply.) Select one or more: a. Scalable b. Obsolete technology c. Guaranteed delivery system d. Best-effort delivery system

Scalable, Best-effort delivery system

which of the following protocols is used by Windows file and printer services to share resources between Windows computers?

Server Message Block

What purpose does the timestamp serve in a switching table

Tells the switch when to delete an entry

What does a switch use to create its switching table?

Source MAC adress

Which of the following is NOT a reason to prefer a switch over a hub?

Switches can operate at 10 Mbps or 100 Mbps.

Transport layer protocol that is connection-oriented and reliable

TCP

Which of the following is not an Application layer protocol?

TCP

Which protocol is connection-oriented?

TCP

Which tool measures cable length by transmitting a signal on one end and measuring the time it takes for the reflection to reach the end of the cable?

TDR

which of the following is a wiring standard for twisted-pair cable connections? (choose 2)

TIA/EIA 568A, TIA/EIA 568B

What field of the IP header does the tracert program use to get the IP address of routers in the path?

TTL

What is a default gateway? (Choose 2) a. The Gatekeeper portion of a NIC b. The IP address packets are sent when the destination network is unknown c. The IP address used to do name to IP address lookups d. A router e. A Switch

The correct answers are: A router, The IP address packets are sent when the destination network is unknown

Under which circumstances does a NIC allow inbound communications to pass through the interface? (Choose all that apply.) Select one or more: a. The destination MAC address is all binary 1s. b. The source MAC address is the broadcast address. c. The destination MAC address matches the built-in MAC address. d. The NIC is operating in exclusive mode.

The destination MAC address matches the built-in MAC address., The destination MAC address is all binary 1s.

How does a switch "learn" MAC addresses?

The switch reads each frame and makes a note of where each MAC address came from.

Which of the following is true about collisions?

They can occur on Ethernet half-duplex networks

Which of the following is the term for identifying packets used by TCP to establish a connection?

Three-Way Handshake

Which of the following is not found in a connectionless Transport-layer protocol? (Choose 2.) a. Checksum b. Three-Way Handshake c. Acknowledgements d. Port numbers

Three-Way Handshake, Acknowledgements

Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (Choose all that apply.) Select one or more: a. Total number of computers that could be connected b. The processing speed of the computers connected c. Cable length d. No Internet access

Total number of computers that could be connected, Cable length

Which of the following is true of a hub? (Choose all that apply.) Select one or more: a. Works with MAC addresses b. Usually has four or more ports c. Usually has just two ports d. Transmits regenerated signals to all connected ports

Transmits regenerated signals to all connected ports, Usually has four or more ports

The four layers of the TCP/IP protocol suite are Application, __________, Internetwork, and Network Access.

Transport

Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments?

Transport

T/F: If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.

True

T/F: A network's logical topology often depends on the central device's electronics.

True

T/F: A network's physical topology refers to the arrangement of the cabling and how the devices connect to each other.

True

T/F: A point-to-point topology is typically used for WAN connections.

True

T/F: Routers do not forward broadcast packets.

True

T/F: The Internetwork layer includes ICMP and ARP, among other protocols within the TCP/IP suite.

True

T/F: The Internetwork layer is the layer that handles network configuration and is considered the heart of the TCP/IP protocol suite.

True

T/F: The Transport layer uses port numbers to identify the source and destination Application-layer protocol of the data that it contains.

True

T/F: The function of a repeater is to extend the range of an existing network.

True

How do you enter BIOS?

Turn on your computer and immediately press the button corresponding to BIOS

Which of the following best describes a MAC address? Select one: a. A 24-bit number expressed as 12 decimal digits b. A dotted decimal number burned into the NIC c. A 48-bit number composed of 12 octal digits d. Two 24-bit numbers, in which one is the OUI

Two 24-bit numbers, in which one is the OUI

A network that connects two or more different geographically locations.

WAN

Which of the following is considered long-term storage? (Choose all that apply.) Select one or more: a. USB or Flash Drive b. Working Storage c. RAM d. Hard Drive

USB or Flash Drive, Hard Drive

Which of the following is true about routers? (Choose all that apply.) Select one or more: a. Forward unicasts b. Use default routes for unknown network addresses c. Forward broadcasts d. Used primarily to connect workstations

Use default routes for unknown network addresses, Forward unicasts

You have a server with two NICs, each attached to a different IP network. You're having problems communicating with devices on remote networks that send packets to one of the interfaces. The server receives the packets fine, but the server's replies never reach the intended destination network. Replies to packets that come in through the other interface seem to reach their destination without any problems. What can you do that will most likely solve the problem?

Use the route command to add routes to the networks that aren't receiving replies.

Which of the following is true about infrastructure mode in wireless networks? (Choose all that apply.) Select one or more: a. Best used for temporary networks b. Resembles a physical bus and logical ring c. Uses a central device d. It is most like a logical bus and physical star

Uses a central device, It is most like a logical bus and physical star

Which of the following is a task performed by the Network access layer? (Choose 2). a. Defines and verifies IP addresses b. Delivers packets efficiently c. Verifies that incoming frames have the correct destination MAC address d. Resolves MAC addresses by using IP addresses e. Transmits and receives bit signals

Verifies that incoming frames have the correct destination MAC address, Transmits and receives bit signals

What is the main difference between a wireless access point and a hub? Select one: a. With access points signals are send only to the device they were designated for b. With hubs signals are send only to the device they were designated for c. With access points signals don't travel through a physical medium; they travel through the airwaves as radio signals. d. Hubs use the channel 802.11AC to send signals while Access Points use channels 802.11 (a,b,g,n) to send signals

With access points signals don't travel through a physical medium; they travel through the airwaves as radio signals.

Why would you need to use a repeater?

You need to add a group of computers to your network, and the distance is too far for normal means of communication.

Which of the following is not a function of the Network Access layer?

delivers packets efficiently

In a token ring network, what is the central device called?

multistation access unit

The SSID is configured on which of the following so that it can be distinguished from other available wireless networks?

access point

device that connects wireless computers

access point

When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode?

ad hoc

Which Wi-Fi mode of operation is typically used in small or temporary installations, where data travels from one device to another in a line?

ad hoc mode

which Wi-Fi mode of operation is typically used in small or temporary installations, where data travels from one device to another in a line?

ad hoc mode

you have just changed the IP address on a computer named computer5 in your domain from 172.31.1.10/24 to 172.31.1.110/24. You were communicating with this computer from your workstation fine right before you changed the address. Now when you try the command ping computer5 from your workstation, you don't get a successful reply. Other computers on the network aren't having a problem communicating with the computer. Which commands might help solve the problem? (2)

arp -d, ipconfig /flushdns

Each cable type can transport data at a particular speed only so far before its signals begin to weaken past the point that a receiving station can read them accurately What is the term for this phenomenon?

attenuation

What is a result of absorption on Wi-Fi signals?

attenuation

When a signal travels across network medium, it signal loses strength the further it gets from the transmitting station, to the point where the receiving station can no longer interpret the signals correctly. What is the term for this phenomenon?

attenuation

which of the following conditions requires cables not to exceed a recommended maximum length?

attenuation

which wireless LAN technology is also called "single frequency radio"?

narrowband radio

A(n) ______________ message is used to determine whether a computer is listening on the network.

ping

What is the term used that defines network cabling between the IDF and MDF?

backbone cabling

interconnects telecommunications closets and equipment rooms

backbone cabling

The network ________ is a measurement of the amount of data that can pass through a network in a certain period of time.

bandwidth

which of the following is a common characteristic of a networking medium? (Choose 3)

bandwidth rating, interference susceptibility, maximum segment length

how devices connected to a hub use network bandwidth

bandwidth sharing

Which UTP limitations can be solved by fiber-optic cable? (choose 3)

bandwidth, EMI susceptibility, segment length

sends a digital signal using the entire bandwidth

baseband

What really determines the bandwidth of a cabling type is how fast a transmitting device, such as a NIC, can generate ___________________ signals on the medium

bit

When referring to network bandwidth, what is the basic unit of measurement?

bits per second

Which of the following is the unit of measurement by which a hub's bandwidth is usually specified? Select one: a. Bytes per second b. Bits per second c. Bytes per minute d. Packets per second

bits per second

A wireless __________ using line-of-sight or broadcast transmissions can extend a wired network over a short distance that would normally require a dedicated communication line from a communications carrier.

bridge

uses an analog signal to send multiple signals simultaneously

broadband

A ______________ frame is a message that is intended to be processed by all devices on the LAN

broadcast

(Ch 2 quiz) A frame with a destination MAC address composed of all binary 1s or FF-FF-FF-FF-FF-FF in hexadecimal is known as which of the following?

broadcast frame

The physical _________ topology is a continuous length of cable connecting one computer to another in daisy-chain fashion and terminated at both ends.

bus

(Ch 2 Test) Which of the following are features of a router? (Choose Two) a. connects computers to the LAN b. connects LANs to one another c. works with MAC addresses d. forwards broadcast packets e. works with packets instead of frames

connects LANs to one another, works with packets instead of frames

When a CPU has two or more processors, each one is referred to as a(n) ________.

core

When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called?

crosstalk

Which type of interference is caused by wires in the same cabling bundle?

crosstalk

What does the frame trailer consist of in an Ethernet frame?

cyclic redundancy check

What are all of the connections in a network considered, including the cables and their connectors?

cable plant

all the cables and connectors that tie a network together

cable plant

which of the following is a tool needed to make a patch cable? (Choose 21)

cable stripper, crimping tool

A device used to test data flow and between pairs of wires

cable tester

which of the following is a characteristic of fiber-optic cabling? (choose 2)

can be used in electrically noisy environments, carries data over longer distances than UTP does

The physical star topology uses a ___________________ to interconnect computers in a LAN.

central device

Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?

chipset

can occur when two devices on the same medium transmit simultaneously

collision

Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated?

collision domain

when using a ______________ protocol, no lasting connection is made from source to destination

connectionless

Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data?

dedicated bandwidth

how devices connected to a switch use network bandwidth

dedicated bandwitdh

In a computer's IP address settings, the _____________ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own.

default

What is the main advantage of a point-to-point topology?

data travels on a dedicated link

What is an advantage of a point-to-point topology?

data travels on dedicated link

When using UDP, what name is given to the unit of information the Transport Layer works with?

datagram

the unit of information used by UDP in the Transport layer

datagram

caused by motors, transformers, and fluorescent lights

electromagnetic interference

what are the two types of interference often encountered when using copper media?

electromagnetic interference, radio frequency interference

Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?

encapsulation

When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?

encapsulations

What is the way in which bit signals are represented on the network medium?

encoding

the method used to represent bits on a medium

encoding

what is the process called that determines how bits are represented on the medium?

encoding

which of the following is the process for representing bit signals on the medium?

encoding

connects a corporate network to third-party telecommunications provider

entrance facilities

In a large network, in which several switches need to be connected together, usually one device is placed at the center, forming a(n) ___________ star

extended

what is the name of the most widely used physical topology in networks today?

extended star

A company has just made an agreement with another organization to share their two networks' resources by using TCP/IP protocols. What best describes this arrangement?

extranet

Each component of a computer is designed to perform only one specific task-either input, processing, or output.

false

The length of cable between the wall jack and a patch panel is called vertical cabling.

false

True or False: A client/server network is the simplest network model.

false

True or False: A switch operates just like a hub?

false

True or False: Random access memory (RAM) is considered long-term storage

false

t/f: The IP address 10.240.0.0/8 can't be assigned to a host

false

t/f: cable modem networking is a broadband technology used to deliver Internet access to homes and businesses over CAT7.

false

t/f: Compared to SMF, MMF cable costs more and generally works with laser-based emitters but spans the longest distances and is used in higher-bandwidth applications.

false

t/f: he differences between TCP/IPv4 and TCP/IPv6 are limited to the TCP part of the protocol.

false

t/f: physical topology is how the data travels between computers

false

t/f: the connectors and test equipment required for fiber termination are considerably less expensive than their copper counterparts?

false

t/f: token ring originally operated at 5 Mbps

false

true of False: Switched Ethernet can be implemented over a physical bus topology.

false

​An extranet is a private network, such as a school or company network, in which the devices and servers are available only to users connected to the internal network.

false

you have been hired to install a network at a large government agency that wants to reduce the likelihood of electronic eavesdropping on its network. what type of cable is most resistant to eavesdropping?

fiber optic

You're preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install? (choose 2)

fiber optic, cat 6

What type of wiring should be used for a high-speed connection between two buildings?

fiber-optic cabling

The unit of information containing MAC addresses and an error-checking code that's processed by the network interface layer is called a _______________.

frame

Match each item with a statement below: information added to the front end of a chunk of data Answer 1 a network model in which all computers can function as clients or servers as needed Answer 2 the software defining the rules and formats a computer must use when sending information across the network Answer 3 an instance of a processor inside a single CPU chip Answer 4 a networked collection of LANs tied together by devices such as routers Answer 5 a collection of users and computers in a server-based network Answer 6 network that is geographically dispersed Answer 7 a chunk of data with source and destination IP addresses Answer 8 the term used to describe an OS designed mainly to share network resources Answer 9 network that connects devices in a small geographic area

information added to the front end of a chunk of data → header, a network model in which all computers can function as clients or servers as needed → peer-to-peer network, the software defining the rules and formats a computer must use when sending information across the network → network protocols, an instance of a processor inside a single CPU chip → core, a networked collection of LANs tied together by devices such as routers → internetwork, a collection of users and computers in a server-based network → domain, network that is geographically dispersed → WAN, a chunk of data with source and destination IP addresses → packet, the term used to describe an OS designed mainly to share network resources → server, network that connects devices in a small geographic area → LAN

A type of wireless network that uses light beams to send signals between two devices and is highly susceptible to visible light sources is called ___________.

infrared

When a wireless computer connects with an AP before it connects with other devices, it is operating in __________ mode

infrastructure

You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?

inter-network

A/an ____ is a network of networks or a networked collection of LANs tied together by devices such as routers.

internetwork

You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?

internetwork

is a networked collection of LANs tied together by devices such as route

internetwork

which of the following is not a type of infrared LAN technology

laser networks

Question text Which of the following describes a hub-based Ethernet network?

logical bus

What type of logical topology does a Wireless LAN use?

logical bus

What type of logical topology is at work when using an Ethernet hub?

logical bus

Which best describes a typical wireless LAN?

logical bus topology

how the data travels from one device to another

logical topology

(Ch 6 Quiz) the IP address 127.0.0.1 is a reserved address because it used for troubleshooting and is known as what?

loopback address

rules governing how media is transmitted and received

media access control

A ______________ topology is fully redundant and is the most expensive to implement.

mesh

connects every device to every other device

mesh topology

Terrestrial and satellite systems are two types of which wireless networking technology?

microwave

Which of the following are examples of output devices? (Choose all that apply.) Select one or more: speakers CPU keyboard printer monitor

monitor, printer, speakers

Which of the following are examples of input devices? (Choose all that apply.) Select one or more: mouse monitor DVD scanner printer

mouse, DVD, scanner

You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?

multicore

Match the advantages and disadvantages with the type of network (server vs peer-to-peer). need for administrative personnel to maintain network resources Answer 1 network is a network that has certain computers that take on the role of servers, and all the other computers act as clients. Answer 2 relatively inexpensive to implement Answer 3 advantages: no limitations to the number of users Answer 4 higher costs for equipment and software Answer 5 include lack of security, Answer 6 advantages: easy expandable Answer 7 advantages: better security, Answer 8 limitation on the number of users Answer 9 doesn't require extensive training or special staff Answer 10 Is a collection of computers in which each computer can act as a client or a server, or both, and each has equal authority Answer 11 Loss of a single machine will not cripple the network. Answer 12 easy to install Answer 13 advantages: centralized control over network resources, Answer 14 Difficult to locate resources Answer 15 single computer could cause the entire network to fail

need for administrative personnel to maintain network resources → server-based, network is a network that has certain computers that take on the role of servers, and all the other computers act as clients. → server-based, relatively inexpensive to implement → peer-to-peer network, advantages: no limitations to the number of users → server-based, higher costs for equipment and software → server-based, include lack of security, → peer-to-peer network, advantages: easy expandable → server-based, advantages: better security, → server-based, limitation on the number of users → peer-to-peer network, doesn't require extensive training or special staff → peer-to-peer network, Is a collection of computers in which each computer can act as a client or a server, or both, and each has equal authority → peer-to-peer network, Loss of a single machine will not cripple the network. → peer-to-peer network, easy to install → peer-to-peer network, advantages: centralized control over network resources, → server-based, Difficult to locate resources → peer-to-peer network, single computer could cause the entire network to fail → server-based

What command would you issue from a command prompt to see a listing of the computers in your workgroup?

net view

which command should you use to configure the primary DNS server on your computer?

netsh

At what layer of the TCP/IP protocol suite are packets received and encapsulated to create frames?

network access

What type of indicator lights would you find on a hub (choose three)? a. network activity b. link status c. signal strength d. hub/switch mode e. collision

network activity, link status, collision

The amount of data that can be transferred on a network during a specific interval is called the ________________________________. Select one: a. Duplexing speed b. Line speed rating c. Network speed rating d. Network bandwidth

network bandwidth

amount of data that can be transferred on a network

network bandwidth

In Windows 10, which of the following displays information about currently installed NICs? Select one: a. NICs and Drivers b. Computers and Devices c. Network Connections d. Local Area Networks

network connections

Which part of the network communication process is responsible for sending and receiving data to and from the network media?

network interface

device that connects a computer with the network medium

network interface card

Air waves are an example of what type of network component?

network medium

TCP/IP is an example of which of the following? Select one: a. Network server b. Device driver c. Network protocol d. NIC e. Network client

network protocol

__________________ is the term used to describe the method a network interface uses to access the medium and send data frames and the structure of these frames.

network technology

what's the term for each grouping of 8 bits in an IP address?

octet

With which kind of Wi-Fi antennas does the signal radiate out with equal strength in all directions?

omnidirectional

In which type of Wi-Fi antenna do signals radiate out from the antenna with equal strength in all directions?

omnidirectional antenna

in which type of Wi-Fi antenna do signals radiate out from the antenna with equal strength in all directions?

omnidirectional antenna

Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?

operates in half-duplex only

Which of the following is true of IEEE 802.3an?

operates only in full duplex mode

Which of the following is a top-level domain name?

org

components include devices such as printers, disk drives, network cards, and monitors.

output

After the Internetwork layer places its header on a datagram, what is the unit of information is referred to?

packet

Before data is transmitted, it is broken into chunks of data and then encapsulated with the source and destination IP addresses to create a _______.

packet

What is the more well-known term for chunks of data sent across the network?

packet

Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack?

patch cable

connects a patch panel port to a switch or hub

patch cable

which is the name of the cable is a short cable for connecting a computer to an RJ-45 jack or connecting a patch panel port to a switch or hub?

patch cable

which of the following is a component of a structured cabling system? (Choose 2)

patch cables, horizontal wiring

Which topology most likely uses coaxial cabling?

physical bus

(ch. 3 review) Which of the following describes the arrangement of network cabling between devices?

physical topology

how the cables connect one device to another

physical topology

Put the boot process in order The CPU gets the configuration information from the BIOS and carries out the startup routines, which include performing the POST. power is supplied to the motherboard. the CPU starts. The OS is loaded into RAM The BIOS searches the boot devices for an OS. The OS services are started.

power is supplied to the motherboard. → 1 the CPU starts. → 2, The CPU gets the configuration information from the BIOS and carries out the startup routines, which include performing the POST. → 3 The BIOS searches the boot devices for an OS. → 4 The OS is loaded into RAM → 5, , The OS services are started. → 6

(Ch 5 Quiz) When a set of protocols work together cooperatively it is called a ________.

protocol suite/ protocol stack

_________ are sets of rules and procedures that dictate communication and behavior.

protocols

Which of the following is NOT an advantage of a physical star?

provides redundancy and fault tolerance

Which of the following is not a form of electromagnetic interference, or EMI?

rain/fog

What does a repeater do? Select one: a. It listens on a network for collisions and informs the sending and computer to resend their data again. b. receives bit signals generated by NICs and other devices, rebuilds the reads the MAC address, and then sends them to the correct port. c. receives bit signals generated by NICs and other devices, strengthens them, and then sends them along or repeating them to other parts of the network. d. receives bit signals generated by NICs and other devices, strengthens them, and then sends them to all devices connected to the LAN.

receives bit signals generated by NICs and other devices, strengthens them, and then sends them along or repeating them to other parts of the network.

device that only regenerates incoming signals

repeater

which command should you use with a dual-homed server to make sure the server sends packets out the correct interface?

route

device that connects LANs

router

which of the following is needed if a computer with the IP address 172.31.210.10/24 wants to communicate with a computer with the IP address 172.31.209.122/24?

router

Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals from sender to receiver and is often used with TV remotes?

scatter infrared

Which type of Wi-Fi signal interference is most likely to be caused by leaves on trees?

scattering

(CH.1 review questions) The time it takes for read/write heads to move to the correct spot on the platter is the ____________

seek time

The Transport layer deals with which unit of information?

segment

Which of the following is a feature of TCP? (Choose 3.) a. segments data into chunks b. converts signals into bits c. provides data-formatting services d. ensures flow control e. establishes a connection

segments data into chunks, ensures flow control, establishes a connection

The client/server networking model may also be known by which of the following terms? Select one: a. Peer-to-peer b. Server-based c. Intranet d. Workgroup

server based

In a physical bus topology, both ends of the medium must be terminated in order to prevent what?

signal bounce

name the two main types of fiber optic cable

single-mode, multimode

What type of wireless technology is used for 802.11b /g /n networks?

spread-spectrum radio

which type of fiber connector locks onto the jack when twisted?

straight tip (ST)

What is the term used that defines network cabling in the work area and between telecommunications closets and equipment rooms?

structured cabling

what is the name of the process of dividing a single network address into two or more subnetwork addresses, each with fewer available host IDs than the original network address.

subnetting


संबंधित स्टडी सेट्स

QUIZ 1.6 Unity, Variety, and Balance

View Set

Science - Q3 - Destructive & Constructive Forces

View Set

Chapter 16 discovering our past a history of the United States

View Set