Data Communication and Networks, Final Exam: Question Bank
There are six basic forms of a classful IPv4 address: Class A, B, C, D, E, and F. T/F
?False
____________________ mean that as a person speaks into a telephd, the system can digitize the voice and store it on a hard disk drive as computer data.
?IVR
Windows Server 2000 incorporated Microsoft's answer to the highly popular NetWare NDS directory system: ____. inode iPrint X.509 Active Directory
Active Directory
____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive. Antispam Backup Antispyware Crash protection
Antispyware
The most popular protocol that handles dynamic assignment of IP addresses is ________________________________________.
DHCP page 284
1000BaseT is capable of using only the Category 7 cable specification. T/F
False
A trunk has a unique telephone number associated with it. T/F
False
ATM clearly dominates in the local area network arena. T/F
False
ATM transfer rates are as fast as 311 Mbps. T/F
False
All Uniform Resource Locators consist of six parts. T/F
False
CSMA/CD is the only network technology that successfully supports connection admission control and quality of service. T/F
False
H.323 was originally designed for TCP/IP networks. T/F
False
IP is the protocol used by most networks and network applications to create an error-free, end-to-end network connection. T/F
False
Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers. T/F
False
POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection. T/F
False
The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. T/F
False
The more information you wish to send over a medium, the lower the frequency of the signal you need to represent that information. T/F
False
The price of the PVC is inversely proportional to the CIR level. T/F
False
Three of the most popular local area network systems are Ethernet, IBM Token Ring, and Wireless Ethernet. T/F
False
Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet. T/F
False
____________________ states that each node takes the incoming packet and retransmits it onto every outgoing link.
Flooding
If the circuit cards are ____________________, it is possible to insert and remove cards while the power to the unit is still on.
Hot swappable
To promote acceptance, the ____________________ suite of protocols was created to support the many different types of wireless local area networks in existence.
IEEE 802 ??? Page 211
____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer. SLIP PPTP IPsec PPP
IPsec
A(n) _________________________ is a communications network that interconnects a variety of data communications devices within a small geographic area and broadcasts data at high data transfer rates.
LAN
______________________________ protocol is a link state algorithm and is still used today by many Internet routers.
OSPF
_____ technique is also known as disk mirroring. RAID-1 RAID-3 RAID-5 RAID-0
RAID-1
The ______________________________ paved the way for anybody to offer a local telephone service to homes and businesses.
Telecommunications Act of 1996
_____ are permanent direct connections between two specified points. Centrex The lines PBX IPX
The lines
All bus networks share a major disadvantage: In general, it is difficult to add a new workstation if no tap currently exists. T/F
True
An asymmetric service is useful for an Internet connection in which the bulk of the traffic comes down from the Internet to the workstation. T/F
True
Circuit-switched networks were designed primarily for voice signals. T/F
True
Convergence has had a particularly noticeable impact on the telecommunications market. T/F
True
Home and small business local area networks often use NAT to conserve IP addresses. T/F
True
IP multicasting suffers from a lack of security. T/F
True
In reality, a multitasking operating system runs only one program at a time. T/F
True
MPLS on Internet routers and VPNs (virtual private networks) are gaining in popularity in the data network market. T/F
True
The design of a tree should ideally be similar to a pyramid. T/F
True
The hub, in most applications, has been replaced with the switch. T/F
True
You can assign many meanings to the weights in a weighted network graph. T/F
True
A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet. File Transfer Protocol (FTP) Internet Protocol (IP) Domain Name Service (DNS) Uniform Resource Locator (URL)
Uniform Resource Locator (URL)
____ software works with the user to locate and remove applications that are no longer desired. Backup Remote access Network monitoring Uninstall
Uninstall
A(n) ____________________ is a collection of computers and computer-related equipment interconnected to perform a given function or functions and typically using local and long-distance telecommunications systems
WRONG! Network
The ____________________ allows for a CSMA/CD network to simultaneously transmit and receive data to and from a workstation.
WRONG! full duplex
IP ____________________ is essentially another name for a data packet.
WRONG! packet
A ____ is a device that interconnects two segments of local area networks and acts as a filter. satellite hub switch router
WRONG! router switch??
A network that is connected in a _____ is one in which neighbors are connected only to neighbors. bus star-bus mesh star
WRONG! star
____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged. Connection-oriented FTP Reliable service Connectionless
WRONG!!! Connection-oriented
The basic telephone system, or ________________________________________, has been in existence since the early 1900s.
WRONG!!! old plain telephone service plain old telephone service (POTS)??
_____ area networks can cover large geographic distances, including the entire Earth. Local Universal Personal Wide
Wide
With _____________________________________________, the frame relay router experiencing congestion sends a signal back to the originating station, which then slows down its transmission.
backward explicit congestion notification
After the Telecommunication Act of 1996, new providers of local telephone services were called _____________________________________________.
competitive local exchange carriers CLECs
A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites. corporate single-user-single-station network server site
corporate
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. switch hub router repeater
hub
The switch operates in place of a ____. hub router repeater bridge
hub
When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control. explicit backward explicit forward explicit implicit
implicit
A(n) ____________________ license, operating system user license, and controlled number of concurrent users license all refer to essentially the same situation.
interactive user
The ____________________ is the telephone line that leaves your house or business.
local loop
A(n) ______________________________ is a large, complex program that can manage the common resources on most local area networks.
network operating system (NOS)
The tap is a(n) ____________________, as it does not alter the signal and does not require electricity to operate.
passive device
A(n) ____________________ may not have any servers but allows communications between workstations, as if the workstations were all equals.
peer-to-peer network
The ____________________ design refers to the pattern formed by the locations of the elements of the network, as it would appear if drawn on a sheet of paper.
physical
The SONET network topology is a ____. star ring star-bus bus
ring
A modern operating system must provide various levels of operating system _____, including directory and file security, memory security, and resource security. memory size security space
security
A(n) ____________________ is a single unit or box that supports many networking functions.
server appliance
In ____________________ segment networks, a switch may be connected to a hub (or several hubs), which then connects multiple workstations.
shared
A(n) ____________________ is a device that a user interacts with to access a network, and it contains the software application that allows someone to use the network for a particular purpose.
station
In a network graph, the edge between each pair of nodes can be assigned a weight or associated cost to form a structure called a(n) _________________________.
weighted network graph
____ is a popular format that transmits the downstream data at a faster rate than the upstream rate. High bit-rate DSL (HDSL) Asymmetric digital subscriber line (ADSL) DSL Lite Consumer DSL (CDSL)
Asymmetric digital subscriber line (ADSL)
____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data. Explicit congestion control Implicit congestion control Buffer preallocation Connection admission control
Connection admission control
____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video). H.323 H.232 H.121 H.256
H.323
____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information. Integrated voice recognition and response Unified messaging Fax-backç Third-party call control
Integrated voice recognition and response
There is a newer, very high-speed network that will cover the United States, interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new high-speed network is called ____. Internet6 Internet2 FastEthernet IPv6
Internet2
Active Directory is built around the ____. X.500 standard 802.11 protocol Ethernet standard Lightweight Directory Access Protocol (LDAP)
Lightweight Directory Access Protocol (LDAP)
____ software incorporates a fairly large number of network support tools. Antispam Crash protection Network-monitoring Backup
Network-monitoring
____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer. DNS Remote login FTP ARP
Remote login
The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection. Source Port Sequence Number Padding Window
Sequence Number
____ means that users have the ability to control a call—for example, set up a conference call—without being a part of it. Fax-back Unified messaging Integrated voice recognition and response Third-party call control
Third-party call control
____ cabling has become the preferred medium for star-wired bus topologies. Coaxial Fiber-optic Twisted pair FDDI
Twisted pair
____ is a no-frills transport protocol that does not establish connections, does not attempt to keep data packets in sequence, and does not watch for datagrams that have existed for too long. Internet Control Message Protocol (ICMP) User Datagram Protocol (UDP) Network Address Translation (NAT) Transport Control Protocol (TCP)
User Datagram Protocol (UDP)
In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets. implicit congestion control connection admission control explicit congestion control buffer preallocation
buffer preallocation
The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit. network monitoring antivirus crash protection sniffer
crash protection
The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit. network monitoring antivirus crash protection sniffer
crash protection
The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information. logical link control (LLC) medium physical control (MPC) medium access control (MAC) physical access control (PAC)
logical link control (LLC)
A(n) ____ handles all in-house calls and places calls onto outside telephone lines. private branch exchange (PBXs) local exchange carriers (LECs) interexchange carriers (IECs or IXCs) local access transport area (LATA)
private branch exchange (PBXs)
A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home. site interactive user single-user-multiple-station single-user-single-station
single-user-multiple-station
The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____. server sub-network station client
sub-network
A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. NAT network DHCP virtual private network (VPN) TCP network
virtual private network (VPN)
