Final Exam ISTM 310 (Chapter 1 - Chapter 12)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is not a data link layer standard?

HTTP

Which of the following is a term used to group together the physical and data link layers?

Hardware layers

The acronym, HTML, refers to:

Hypertext Markup Library

Which of the following is not a key advantage of digital transmission?

It permits only low transmission rates.

Which of the following is not an advantage of instant messaging?

It usually takes days for an IM message to be delivered to the recipient.

The acronym, MIME, refers to:

Multipurpose Internet Mail Extension

Which of the following is not true about File Transfer Protocol (FTP)?

The most common type of FTP site is an open FTP site.

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.

intranet

An N-tiered architecture:

is generally more "scalable" than a three-tiered architecture

Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?

phase

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?

transport Layer

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?

transport Layer

The _________ layer performs error checking which is redundant with the function of the _________ layer.

transport, data link

The type of media usually installed on homes and businesses by the telephone company is called ____________.

twisted pair

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.

two

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:

user agent

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.

webcasting

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication.

certificate authority

Which of the following is way to reduce or eliminate crosstalk on a circuit,

changing multiplexing techniques

With QoS routing different __________ are defined, each with different priorities.

classes of service

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.

cloud-based mesh design

Which of the following would not be part of an "ideal" backbone design for the future

coax cabling throughout LANs and BN

A(n) _____________ is not a common type of dedicated server.

collision server

Inverse multiplexing means:

combining several low speed circuits to enable them to be transmitted across one high speed circuit

With contention:

computers wait until the circuit is free before they send data

A star architecture:

connects all computers to one central computer that routes messages to the appropriate computer

Storing other people's Web data closer to your users is referred to as

content caching

With __________ ARQ, the sender immediately sends the next message or packet of data.

continuous

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?

controlled chaos

The integration of voice, video, and data communications is also known as __________.

convergence

________ controls fix a trespass into the network.

corrective

In __________, the network designer considers the relative cost of the technologies

cost assessment

For access to DSL, __________ equipment is installed at the customer location.

customer premises

Which of the following is not a type of intrusion prevention system?

data link-based

A _______ is a connectionless method of sending data packets on a packet switched service.

datagram

Which of the following is not a technology layer that is considered when designing backbone networks?

decentralized layer

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

denial-of-service attack

A star topology is:

dependent upon the capacity of the central computer for its performance

The fastest growing form of videoconferencing is

desktop

An example of _____ of data would be if a computer virus eliminated files on that computer.

destruction

When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:

dialed circuit

Transmission speeds:

differ widely among media

__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.

directional

A tornado that eliminates a network control center would be an example of a natural __________.

disaster

There are some network modeling tools that can ________ the existing network.

discover

Encryption is the process of:

disguising information by the use of mathematical rules, known as algorithms

A network switch failure is an example of a(n) ________ threat.

disruptive

With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.

distance vector

A _________ is a group of related resources.

domain

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information.

dumb

The cheapest time to install network cabling is:

during the construction of the building

Which of the following media has the lowest error rates and the highest transmission speeds?

fiber optic cable

Which of the following media is least susceptible to noise?

fiber optic cable

Which of the following type of media is least susceptible to eavesdropping?

fiber optics

A(n) ____________ allows many users to share the same set of files on a common, shared disk drive.

file server

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

firewall

Which of the following is a way to sell the network proposal to management?

focus on the growth in network use

IP spoofing means to:

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

A switch uses a _____________ that is very similar to a routing table used in a router.

forwarding table

Asymmetric DSL uses ___________ multiplexing to create three separate channels over one local loop circuit.

frequency division

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.

full mesh design

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.

giga, gigabit

Circuit capacity on a backbone network will not be improved by:

going from 100Base-T Ethernet to 10Base-T Ethernet

The two basic types of media are:

guided and wireless (radiated)

Stop-and-wait ARQ uses ___________ type of data flow.

half duplex

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.

half-duplex

A client computer is assigned a data link layer address is by:

hardware manufacturers

The newer form of IP, version 6 (Ipv6) is:

has an increased address size from 32 bits to 128 bits

When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the:

hidden node problem

Another term for cable networks that use both fiber-optic and coaxial cable is __________.

hybrid fiber coax

Dynamic routing:

imposes an overhead cost by increasing network traffic

To get more "bandwidth" in a digital transmission, you must:

increase the range of frequencies available for a transmission

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.

logical network design

Which of the following is a primary advantage of a VPN?

low cost

Associated with a switched backbone, MDF is an acronym for:

main distribution facility

A security hole is a(n):

malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

A central database called the _____________, has an agent that collects information about a device and makes this information available to the network management station.

management information base

Routers:

may also be called TCP/IP gateways

1. In a ring design WAN,

messages can take a long time to travel from the sender to the receiver

_________ are smaller versions of NAPs that link a set of regional ISPs.

metropolitan area exchanges

A(n) ____________, is an information system that is critical to the survival of an organization.

mission critical application

The acronym, Modem, stands for _________________.

modulator/demodulator

Which of the following is not a way to reduce network demand?

moving data further from the applications and people who use them

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.

much more

A special type of message that is used when sending the same message to a specific group of computers is called a:

multicast message

One disadvantage of the ____________ architecture is that places a greater load on the network.

n-tier

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.

needs analysis

The _________ layer is responsible for routing of messages from the sender to the final destination.

network layer

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems.

network operations center

A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.

network profile

Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?

newer version permits jumbo frames

Cross-talk:

occurs when one circuit picks up signals in another

__________ antennas transmit the signal in all directions.

omnidirectional

Switched Ethernet:

operates at about 95% of capacity before performance becomes a problem.

Frequency division multiplexing:

operates by dividing the signal into different frequencies

In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins?

phase modulation

Data is physically transmitted from one computer or terminal to another in the ________ layer.

physical

A _________ is the place at which the ISP provides services to its customers.

point-of-presence

Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.

point-to-point

In the three tier architecture the software on the client computer is responsible for____________.

presentation logic

________ controls discover unwanted events.

preventive

_________ controls stop a person from acting.

preventive

Basic rate interface:

provides a communications circuit with two 64 Kbps B channels, plus one D channel

10/100 Ethernet:

provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server

Which is not a function of the physical layer:

providing error-free transmission of data.

____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.

quadrature amplitude modulation

Which of the following is not an example of a building block used in technology design?

specifications for a particular lighting fixture in the network operating center

Another term for impulse noise is:

spikes

What percentage of overlap in coverage by access points (AP) is needed to provide smooth and transparent roaming from AP to AP.

15 %

IPv6 will be based upon _________ -byte addresses.

16

Bluetooth operate in the ________ band.

2.4 GHz

In the U.S. 802.11g WLANs operate in the ________ band.

2.4 GHz

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

255.255.0.0

How many channels does 802.11g provide for communication with clients?

3

How many distinct communication channels (don't overlap) does the 802.11b standard provide between the access point and clients?

3

IPv4 uses ________ bytes per Internet address.

4

The data rate for a T-3 circuit in North America is:

44.376 Mbps

The probability of detecting an error, given that one has occurred, using parity checking is about:

50%

The maximum data rate of a an 802.11a WLAN is

54 Mbps

The maximum data rate of an 802.11g WLAN is

54 Mbps

How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels?

6

When converting analog voice data to digital signals, Pulse Code Modulation typically samples the incoming voice signal _______ times per second.

8,000

802.11g is backward compatible with which type of LAN?

802.11b

The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________.

802.11n

Which of the following standards is backward compatible with IEEE802.11a, b, and g?

802.11n

Which wireless standard is becoming the dominant standard of all the current standards?

802.11n

Which IEEE standard inserts a 16-byte VLAN tag into a normal Ethernet packet?

802.1q

Which of the following is not a WLAN standard?

802.3

Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total computer processing power now resides on microcomputer-based LANs.

90

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:

> 99%

Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:

splits the communication circuit vertically (with time slots) instead of horizontally

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.

star design

With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.

stop and wait

A brute force attack against an encryption system

tries to gain access by trying every possible key

Which of the following is a mode that is used by IPSec?

tunnel

With a virtual private network, users create permanent virtual circuits through the Internet called:

tunnels

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.

turnpike effect

A type of message that is used when sending a message from one computer to another computer is called a:

unicast message

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

uninterruptible power supply

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

unlocked wiring closet for network

To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can:

upgrade to a bigger circuit

The performance of MANs and WANs can be improved by:

upgrading the circuits between the computers

Switched backbone networks:

use a star topology with one device, usually a switch

Switched Ethernet:

usually enables all attached circuits to send or receive packets simultaneously

Hubs:

usually incorporate repeaters or amplifiers

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

virtual private network

_____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN.

warchalking

The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:

wavelength division multiplexer

The source destination port identifier tells the destination station _____________.

which application layer process the packet is from.

The familiar background static on radios and telephones is called:

white noise

When devices operate as fast as the circuits they connect and add virtually no delays, we say that the device operates at _______________.

wire speed

____________ is not a function of a data link protocol.

Amplitude shift keying

A (n) ______ is a special type of virus that spreads itself without human intervention.

worm

An application layer address using TCP/Ipv4 looks like:

www.cba.uga.edu

Which of the following is not true a dumb terminal:

you can install your latest application software on it.

The _____________ is an operating system based on a version of UNIX that is more secure than the Windows Server operating system.

Apple Mac Operating System

_____________ is the percentage of time the network is usable by users.

Availability

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users.

Charge-back

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.

Common carriers

The _________ is the part of the backbone that connects the different backbones together.

Core layer

____________ is also called automatic software distribution.

Electronic Software Distribution

Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?

Ethernet

_________ is being pioneered by Yipes.com.

Ethernet to the home

__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software.

Fault management

____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.

Flipped bits

_____________ is used in Bluetooth in which the 2.4 GHz frequency range is divided into 79 separate channels.

Frequency-hopping spread spectrum

Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type?

Gateway

________________ separate channels to reduce interference between channels in frequency division multiplexing.

Guardbands

UDP is not commonly used for:

HTTP requests

__________ is not true with respect to network hubs.

Hubs provide a complicated way to connect network cables

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.

Hypertext Transfer Protocol

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

IP

__________can obliterate a group of bits, causing a burst error.

Impulse noise

The ping command uses the most basic interior routing protocol on the Internet, which is the:

Internet Control Message Protocol

At the top of the Internet structure are national ___________, such as AT&T and Sprint.

Internet service providers

Which of the following is not true about X.25?

It is a type of circuit switched service.

Which of the following is true with respect to the data link layer?

It is responsible for getting a message from one computer to another (one node to another) without errors.

Which of the following is not true about CSMA/CD?

It is used in token ring protocol LANs

Which of the following is true about the data link protocol, SDLC:

It uses a special bit pattern called a flag at the beginning and end of every frame (or packet)

Which of the following is not a critical software component in a dedicated server LAN?

LAN metering software

LAN bottlenecks are usually found at the:

LAN server and network circuit

_______________ is a type of dynamic routing.

Link state

___________ is how the network works conceptually.

Logical topology

With _____________, the AP permits the owner to provide a list of valid addresses that can connect.

MAC address filtering

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails.

MTBF

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure.

MTTDiagnose

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site.

MTTFix

_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions.

Managed devices

_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it.

Managed devices

Which of the following is not a user agent package?

Microsoft Word

The earliest type of fiber optic systems were:

Multimode

____________ routers can understand different network layer protocols.

Multiprotocol

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.

NAT proxy server

National ISPs connect together and exchange data at ___________.

Network Access Points

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.

Network address translation

_____________ are used by many large and small organizations to monitor and control their networks today.

Network management software packages

____________ refers to keeping track of the operation of network circuits to make sure they are working properly.

Network monitoring

Which of the following statements is true?

On a circuit, the shorter the distance, the higher the speed.

__________ is an estimate of the highest data volume on a link.

Peak circuit traffic

__________ has led to the belief that the Internet is "free".

Peering

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.

Peering

___________ ensures that the network is operating as efficiently as possible.

Performance management

A Bluetooth network is called ____________.

Piconet

_____________ helps ensure that critical problems get priority over less important ones.

Problem prioritizing

___________ allows the network manager to determine who is responsible for correcting any outstanding problems.

Problem tracking

______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).

Propagation delay

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.

TCP connection

_______ is the dominant network protocol today.

TCP/IP

Which of the following is not a benefit of packet switched services?

The data transmission rates tend to be lower than dial-up or dedicated circuits.

Which is true about bandwidth?

The greater the bandwidth, the faster we can transmit data.

One reason that there are technical network integration management issues is the fact that:

The more different types of network technology used, the more complex network management becomes.

Which of the following is not true about layer-2 switched Ethernet?

The physical topology is the same as the physical topology of shared Ethernet: a ring.

Which of the following is not true about switched Ethernet?

The switch has a physical bus topology.

One drawback to dynamic routing is:

The transmission of status information "wastes" network capacity that could be used to send user messages

Which of the following is not true about Layer-3 switches

They can only switch messages based on their data link layer addresses.

Which of the following is not true about one-time passwords?

They create a packet level firewall on the system.

Which of the following is true regarding switched backbones?

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

Which of the following is not true about backbone networks?

They tend to use lower speed circuits than LANs.

________ is a measure of how much it costs per year to keep one computer operating.

Total cost of ownership

_________________ is defined as the total number of information bits divided by the total number of bits in the transmission.

Transmission efficiency

Spyware, adware and DDOS agents are three types of:

Trojans

____________ are reports produced by numerous network software packages for recording fault information.

Trouble tickets

___________ refers to managing and documenting the network's hardware and software configuration.

Troubleshooting

Which of the following is not a problem with dialed circuits?

Use of these circuits is very simple.

A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware.

Virtual LAN

Which of the following is a fundamental backbone network architecture?

Virtual LAN

A ____________ translates a wireless application request to HTTP and sends it over the Internet to the desired Web server.

WAP proxy

Which of the following is not an advantage of a WLAN?

WLANs allow users to work more securely than a wired LAN.

A major difference between Wi-Fi Protected Access (WPA) and WEP or EAP is

WPA keys are longer than WEP keys.

Which of the following is the most secure for wireless networks?

WPA2

Which of the following is false about staff costs for a network?

When a variety of devices are used in a network, it takes less time to perform network management activities

_______ is the commercial name for a set of standards by the IEEE 802.16 standards group.

WiMAX

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office.

a DSLAM

A local area network is:

a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.

A backbone network is:

a high speed central network that connects other networks in a distance spanning up to several miles.

A metropolitan area network is:

a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.

A sniffer program is a:

a program that records all LAN messages received for later (unauthorized)

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?

application layer address

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.

application level firewall

Ethernet/IP packet networks:

are supported with gigabit fiber optic networks in large cities

How can a set of 802.11b access points be configured to operate without interference?

assigning each access point a different channel to communicate with clients

The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:

attenuation

Electronic software distribution:

automatically produces documentation of software installed on each client computer

__________ refers to the range of frequencies available.

bandwidth

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

____________ refers to the transmission characteristics of the circuit.

logical circuit

Which of the following is not a type of hardware device that can be used to interconnect networks?

'dumb' terminals

With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?

00011011

Depending on the Bluetooth version, the maximum data rate of Bluetooth today is around

1-3 Mbps

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps.

1.5

The data rate for a T-1 circuit in North America is:

1.544 Mbps

In passive optical networking, the optical signal has a maximum length of about __________.

10 miles

________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.

10/100 Ethernet

Which of the following is a type of protocol that needs to be considered in technology design?

100 Mbps

____________ is a newer type of packet switching technology.

ATM

Which of the following is not a difference between ATM and X.25?

ATM provides packet switched service.

It appears that the use of _____ is decreasing in backbones while the use of ____ is increasing.

ATM, Ethernet

The backbone architecture layer that is closest to the users is the

Access layer

_____________ is an effective way to prevent attenuation.

Adding repeaters or amplifiers to a circuit

_________ is a specially formatted request used to perform IP address to data link address resolution.

Address Resolution Protocol

Which of the following is not true about multi-switch VLANs?

All of the above are true statements.

_____ is standardized as IEEE 802.15

Bluetooth

Which of the following is not a controlled access method of media access control?

CSMA/CD

CSMA/CA is an acronym for:

Carrier Sense Multiple Access with Collision Avoidance

Which of the following is not an application layer standard?

T1

When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.

DNS request packet

___________ is not a type of digital signaling technique.

Data rate signaling

________ is a type of WAN connection that uses the normal voice telephone network.

Dial-up service

__________ provide authentication which can legally prove who sent a message over a network.

Digital signatures

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.

Directory Services

The _______ is the part of the backbone that connects the LANs together

Distribution layer

Server name resolution is done using the:

Domain Name Service

Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages.

QoS

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates

Quality control chart

Which of the following can provide fault tolerance for the storage space on a server?

RAID

RFP stands for:

Request for Proposal

With which type of digital signaling does the signal always return to zero volts after each bit?

Return-to-zero signaling

_________ move packets along the backbone based on their network layer address.

Routed backbones

___________ is the process of determining the path that a message will travel from sending computer to receiving computer.

Routing

_________ is not a type of Ethernet specification.

Securenet

___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept.

Service level agreements

________ is used to model the behavior of the planned communication network once the proposed network map is complete.

Simulation

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.

Static routing

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

Subscriber

A __________ type of BN has a star topology with one device, such as a switch, at its center.

Switched backbone

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today.

T-carrier services

Using parity, the probability for detecting an error, given that one has occurred, is:

about 50% for either even or odd parity

A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.

access point

Which of the following is not an effective way to reduce LAN network demand:

add hidden nodes

Which of the following would be least effective in improving backbone performance?

adding new keyboards to the client computers

The large network purchases are done:

after the vendor(s) are selected

A symmetric encryption system has two parts: the key and the ____________.

algorithm

With a client-based network, one fundamental problem is that:

all data on the server must travel to the client for processing

10Base-T:

all of the above

Digital Subscriber Line:

all of the above

Microwave transmission:

all of the above

Which of the following is not a potential bottleneck for LAN performance?

all of the above are potential bottlenecks for LAN performance

At the physical layer, 802.11b uses radio waves which are a form of:

analog transmission

A fundamental technique to determine if an intrusion is in progress in a stable network is:

anomaly detection

Estimating the size and type of the "standard" and "advanced" network circuits is called _________.

capacity planning

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.

baseline

Errors on a network can occur:

because of noise on the line

Threat of intrusion comes from ____________.

both inside and outside of the organization

Which of the following is a function of the transport layer?

breaking long messages into several smaller messages

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies.

broadband

The term ______________ refers to high speed communication circuits such as DSL.

broadband communications

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:

broadcast message

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.

broadcast message

Nowadays, most organizations use a simpler approach to network design called the ___________ approach.

building-block

In a _________ , more than one data bit is changed by the error-causing condition.

burst error

The type of logical topology that Ethernet uses is a:

bus

Which of the following is not a basic architecture for dedicated circuit networks?

bus

A digital service offered by cable companies is the _________.

cable modem

1000 Base-T:

can run at either full- or half-duplex

Gateways:

can translate one network protocol into another

Another term for a user agent is:

e-mail client

The effective data range is up to 6 miles with a line of sight to the access point or 2.5 miles without line of sight. This describes ____________.

e.) IEEE 802.16e

When a signal is reflected back to the transmitting equipment, it is called a(n) _________.

echo

Network demand will not be reduced by:

encouraging the use of applications such as medical imaging

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

A _____connects all networks within a company, regardless of whether it crosses state, national, or international boundaries.

enterprise network

To snare intruders, many organizations now use _________ techniques.

entrapment

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution.

escalated

One advantage of _____________ is that no conversations between LAN and WAN protocols are needed.

ethernet to the home

A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet.

extranet

2. In a ring design WAN,

failure in one circuit means that the network can most likely continue to function

Which of the following type of media is most commonly used in backbone networks because of its high capacity?

fiber

Which of the following media can best withstand harsh environmental conditions?

fiber optic cable

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.

intrusion

Often, incidents of ___________ involve employees of the organization, surprisingly enough.

intrusion

Asynchronous transmission:

is also known as start-stop transmission

A peer-to-peer LAN:

is generally cheaper in hardware and software than a dedicated server

Documentation for network and application software:

is important for monitoring adherence to software license rules

Media access control:

is not very important in point-to-point with full duplex configuration

In ARQ, a NAK:

is sent by the recipient if the message contains an error

Primary rate interface:

is typically offered only to commercial customers

Synchronous transmission:

is used to transmit a "frame" or "packet" of data at a time

To estimate costs for large network purchases, organizations often:

issue an RFP to vendors

Of the following, which is not true about fiber optic cable?

it has a very low capacity

Switches:

learn addresses by reading the source and destination addresses

Optical media is:

less likely to suffer from noise than electrical media

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL.

line splitter

Which of the following is not a key deliverable for the cost assessment step

list of wish list requirements

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side.

optical-electrical converter

A(n) ____________ examines the source and destination address of every network packet that passes through it.

packet level firewall

Which of the following type of networks permit packets from separate messages to be interleaved?

packet switched network

The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.

packets

Devices in a rack are connected together using ___________.

patch cables

Networks that are designed to connect similar computers that share data and software with each other are called:

peer-to-peer networks

Which of the following is not a method for deterring intrusion?

performing social engineering

TCP/IP:

performs packetizing, as well as routing and addressing functions

IP:

performs routing functions

A _________ is a connection-oriented approach to sending packets on a packet switched service.

permanent virtual circuit

IMAP (Internet Message Access Protocol):

permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

A logical bus topology:

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

With a switched backbone network, the equipment is usually placed in a ______.

rack

The traditional network design approach does not work well for _________ networks.

rapidly growing

The key principle in preventing disruption, destruction and disaster is ___________.

redundancy

On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.

repeaters

If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)?

replacing the cable with fiber optic cable

Routed backbones:

require a lot of management

Mesh networks:

require more processing by each computer in the network than in star or ring networks

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.

ring design

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

risk assessment

Correlating the individual error messages into a pattern to find the true cause of the problem is referred to as_______

root cause analysis

__________ is not an important function of the transport layer.

routing

An advantage of centralized routing is:

routing decisions are simple

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.

routing table

The _____________ is used by a computer to determine how messages will travel through the network.

routing table

Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?

security (relative to fiber)

TCP uses _____________ so that the destination station can reassemble the packets into the correct order.

sequence numbers

In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.

technology design

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.

technology design

Internet 2 is also known as:

the Abilene network

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data.

the DSLAM

Another major high-speed network experimenting with long distance Ethernet over fiber is _____________.

the National Lambda Rail

In needs analysis:

the goal is to understand what users and applications the network will support

As part of the five-layer network model used in this textbook, the data link layer sits directly between:

the physical and the network layers

Which of the following is not true about switched backbones?

there are many more networking devices in a switched backbone network

Which of the following is not a purpose for using hubs in a network?

to act as a communications server

Device performance on a backbone network will not be improved by:

translating packets from one protocol to another as they enter the BN

In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.

transport

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.

transport

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.

1024

When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______.

16

The typical range of human hearing is:

20 to 14,000 Hz

If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is:

9100 Hz

With respect to converting digital data into analog signals, AM stands for:

Amplitude Modulation

With respect to costs for a client-server network, which of the following is true?

Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.

With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic.

Presentation; data access

Which of the following statements is correct?

Serial transmission is slower than parallel transmission.

___________ is an orderly close to a dialogue between end users.

Session termination

The most commonly used e-mail standard is:

Simple Mail Transfer Protocol

Which of the following is not true about Telnet?

Telnet poses no security threat.

The idea for a special hypertext network, called the World Wide Web, was conceived of by:

Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989

The height of a sound wave is called its:

amplitude

In which layer of the Internet model would the HTTP standard be used?

application

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.

application logic

Another term for the weakening of a signal over distance is:

attenuation

The _____________ of a circuit determines a circuit's capacity.

bandwidth

Client-server architectures:

can use middleware to provide a standard way of communicating between software from more than one vendor

Which of the following is not a property of a WAN:

connects a group of computers in a small geographic area such as room, floor, building or campus.

An application program function is __________, or the processing required to access data.

data access logic

_________ is an application program function that deals with storing and retrieving data.

data storage

___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination.

dispersion

Which of the following media is the least secure?

infrared

____________ transmission is prone to interference from smoke, heavy rain and fog and requires line-of-sight.

infrared

A _____________ , a mailing list of users who discuss some topic, has two parts: a processor and a mailer.

listserv

A _____________ is the type of computer you use in your home and is the most common type of client today.

microcomputer

Which of the following would be considered a type of wireless media?

microwave

__________ is a line-of-sight type of wireless media.

microwave

____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0.

modulation

The direction in which the sound wave begins is known as:

phase

A "thick client" architecture approach:

places all or almost all of the application logic on the client

A "thin client" architecture approach:

places all or almost all of the application logic on the server

The ____________ layer of the OSI model is responsible for data format translation.

presentation

________ is the presentation of information to the user and the acceptance of the user's commands.

presentation logic

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.

protocol

There are optional and required parts of an HTTP request. They are:

request line, request header, request body

There are required and optional parts of an HTTP response. They are:

response status, response header, response body

When all bits of a character are transferred one after another, the bits are transferred in ___________ mode.

serial

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.

server

In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.

session, presentation and application

Which of the following is not a function of the data link layer?

specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

The function of the file server is to:

store data and software programs that can be used by client computers on the network.

_____________ is not a form of modulation used to transform digital data into analog signals.

synchronous time division

One underlying problem with a host-based network is that:

the server can get overloaded since it must process all messages

The fourth layer of the OSI model is called the __________ layer.

transport


संबंधित स्टडी सेट्स

Kei te pēhea? - Asking how someone is feeling

View Set

Insurance Terms and Related Concepts

View Set

NURS 3325 Leading and Managing in Nursing

View Set

Noahs Financial Accounting vocab Ch 1-3

View Set

Chemistry Lab Equipment Definitions

View Set