Final Study (ALL Quiz) NETWORK CNET 56 Spring

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix. a. underscore ( _ ) b. backward slash ( \ ) c. forward slash ( / ) d. dash ( - )

c. forward slash (/)

A complex combination of topologies is known as a ____ topology. a. compound b. mixed c. hybrid d. mulitpart

c. hybrid

If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit. a. incorrect antenna placement b. SSID mismatch c. interference d. incorrect encryption

c. interference

Clients are able to exchange signals with satellites as long as they have a ____ path. a. proprietary b. directional c. line-of-sight d. view

c. line-of-sight

Security auditing is handled by ____. a. communication services b. access services c. network management services d. Internet services

c. network management service

A program similar to mtr, ____, is available as a command-line utility in Windows operating systems. a. route b. dig c. pathping d. nbstat

c. pathping

A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data. a. destination b. application c. port d. source

c. port

The ____ utility allows you to view a host's routing table. a. dig b. nbstat c. route d. pathping

c. route

The data transmission characteristic most frequently discussed and analyzed by networking professionals is ____. a. noise b. cost c. throughput d. scalability

c. throughput

The distance between corresponding points on a wave's cycle is called its ____. a. phase b. frequency c. wavelength d. amplitude

c. wavelength

____ is the least popular WLAN standard. a. 802.11n b. 802.11g c. 802.11b d. 802.11a

d. 802.11a

____ services allow remote users to connect to the network. a. Remote b. Management c. Connection d. Access

d. Access

Which OSI model layer initiates the flow of information? a. Physical b. Presentation c. Session d. Application

d. Application

The phenomenon of offering multiple types of communications services on the same network is known as ____. a. multi-communications b. divergence c. unified communications d. convergence

d. Convergence

Upon creation, each vNIC is automatically assigned a ____. a. reference address b. switch address c. block address d. MAC address

d. MAC address

An example of a popular client email software is ____. a. MIME b. Sendmail c. Microsoft Exchange Server d. Microsoft Outlook

d. Microsoft Outlook

A directional antenna issues wireless signals along a(n) ____ direction. a. narrow b. wide c. open d. single

d. Single

In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address. a. limited b. subnet c. stateful d. classful

d. classful

A physical topology ____. a. specifies addressing schemes b. specifies connectivity methods c. specifies device types d. depicts a network in broad scope

d. depicts a network in broad scope

To establish a satellite Internet connection, each subscriber must have a ____. a. line-of-sight antenna b. dish pathway c. source pathway d. dish antenna

d. dish antenna

In classful addressing, the Class B IPv4 address network ID is located in the ____. a. first 8 bits b. last 8 bits c. last 16 bits d. first 16 bits

d. first 16 bits

Standards define the ____ performance of a product or service. a. maximum acceptable b. most acceptable c. ideal d. minimum acceptable

d. minimum acceptable

Transport layer protocols break large data units into ____. a. PDUs b. block IDs c. frames d. segments

d. segments

A ____ uses very little hard disk space or processing power from the workstation on which it is installed. a. thick client b. virtual client c. fat client d. thin client

d. thin client

To connect to a network, a virtual machine requires a ____. a. virtual MAC address b. virtual switch c. physical switch d. virtual adapter

d. virtual adapter

The most popular method for connecting nodes on a network is circuit switching. True or False

False

The simplest form of a network is a client/server network. True or False

False

The strength of an electrical signal is directly proportional to its frequency. True or False

False

WiMAX is defined by the IEEE 802.11 standard. True or False

False

A serial backbone is the simplest kind of backbone. True or False

True

ATM is a WAN technology that functions in the Data Link layer. True or False

True

Advances in NIC technology are making this hardware smarter than ever. True or False

True

Bridges are protocol independent. True or False

True

For greater network efficiency, segmentation is preferred. True or False

True

Hands-on experience to improve networking hardware and software skills is important when attempting to enter the networking field. True or False

True

ICMP (Internet Control Message Protocol) reports on the success or failure of data delivery. True or False

True

Modern Ethernet networks are based on the star topology. True or False

True

Modulation can be used to make a signal conform to a specific pathway. True or False

True

Not all Transport layer protocols are concerned with reliability. True or False

True

On a network using TCP/IP, some nodes may use multiple IP addresses. True or False

True

POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time. True or False

True

SONET specifies framing and multiplexing techniques at the Physical layer. True or False

True

Spread spectrum is a popular way of making wireless transmissions more secure. True or False

True

The maximum distance a signal can travel and still be interpreted accurately is equal to a segment's maximum length. True or False

True

Wireless signals experience attenuation. True or False

True

The most common 1-Gigabit Ethernet standard in use today is ____. a. 1000Base-LX b. 10GBase-SR c. 1000Base-SX d. 1000Base-T

a. , b. or d.

1000Base-SX has a maximum throughput of ____. a. 1 Gbps b. 100 Gbps c. 1000 Gbps d. 10 Gbps

a. 1 Gbps

The default subnet mask for a Class B network is ____. a. 255.255.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.255.255

a. 255.255.0.0

The most common logical topologies are ____ and ring. a. bus b. hybrid c. star d. wired

a. Bus

In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ____ network. a. C b. D c. A d. B

a. C

In wireless communication, to exchange information, two antennas must be tuned to the same ____. a. frequency b. variance c. attenuation speed d. port

a. Frequency

The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations. a. OC (Optical Carrier) level b. BRI (Basic Rate Interface) c. CIR (committed information rate) d. DS0 (digital signal, level 0)

a. OC (optical Carrier) level

In which OSI model layer do hubs operate? a. Physical b. Physical and Data Link c. Data Link d. Network

a. Physical

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____. a. RAM b. CMOS c. ROM d. EEPROM

a. RAM

To eliminate the possibility of a broadcast storm, switches and bridges implement the ____ a. STP (Spanning Tree Protocol) b. OSPF (Open Shortest Path First) protocol c. BGP (Border Gateway Protocol) d. RIP (Routing Information Protocol)

a. STP (Spanning Tree Protocol)

Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput. a. security b. costs c. noise d. access

a. Security

In which OSI model layer does TCP operate? a. Transport b. Physical c. Network d. Data Link

a. Transport

Most cloud service providers use virtualization software to supply multiple platforms to multiple users. a. True b. False

a. True

TCP is a(n) ____ subprotocol. a. connection-oriented b. open-ended c. connectionless d. indiscriminating

a. connection-oriented

A ____ is a specialized device that allows multiple networks or multiple parts of one network to connect and exchange data. a. connectivity device b. node c. host d. segment

a. connectivity device

Which network model ensures that no computer on the network has more authority than another? a. peer-to-peer b. stand alone c. distributed d. client/server

a. peer-to-peer

In the case of dial-up networking, the term ____ refers to a modem. a. serial connection b. virtual connection c. POTS connection d. physical connection

a. serial connection

A digital signal composed of a pulse of positive voltage represents a(n) ____. a. 4 b. 1 c. 8 d. 0

b. 1

Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information. a. last eight b. 1 c. first eight d. 0

b. 1

1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable. a. 100 b. 10 c. 2 d. 5

b. 10

Which IEEE standard describes specifications for wireless transmissions? a. 802.5 b. 802.11 c. 802.3 d. 802.1

b. 802.11

Which connector is used in RS-232 transmissions? a. ST b. DB-25 c. BNC d. Cat-5

b. DB-25

A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO. a. terminal adapter b. DSLAM c. terminator d. smart jack

b. DSLAM

____ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table. a. Static b. Dynamic c. Temporary d. On-demand

b. Dynaming

A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on. a. True b. False

b. False

The software required to establish VPNs is usually expensive. a. True b. False

b. False

____ satellites are the type used by the most popular satellite data service providers. a. Medium earth orbiting b. Geosynchronous earth orbiting c. Transponder d. Low earth orbiting

b. Geosynchronous earth orbiting

In which OSI model layer does IP operate? a. Physical b. Network c. Data Link d. Transport

b. Network

Collectively, MPLS labels are sometimes called a ____. a. title b. shim c. header d. frame

b. Shim

The speed of a T-carrier depends on its ____ level. a. channel b. signal c. traffic d. hierarchy

b. Signal

At its most primitive, a ____ is a repeater with more than one output port. a. base b. hub c. switch d. bridge

b. hub

ISDN PRI uses ____ B channels and one 64-Kbps D channel. a. 10 b. 32 c. 23 d. 12

c. 23

The serial interface on the back of the connectivity device is often labeled "____." a. Board b. Port c. Console d. Connector

c. Console

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches. a. STP b. multiport c. content d. peripheral

c. Content

A VPN tunneling protocol operates at the ____ layer. a. Session b. Network c. Data Link d. Application

c. Data Link

____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network. a. Virtual networking b. Traditional networking c. Dial-up networking d. Dialed networking

c. Dial-up networking

____ describes a popular serial data transmission method. a. EIA/TIA 568BA standard b. EIA/TIA 568A standard c. EIA/TIA RS-232 (Recommended Standard 232) d. EIA/TIA Commercial Building Wiring Standard

c. EIA/TIA RS-232 (Recommend Standard 232)

____ means that a telephone company connects residential users to its network with fiber-optic cable. a. OLT b. PON c. FITH d. FITL

c. FITH

____ services refer to the capability of a server to share data files, applications, and disk storage space. a. Management b. Access c. File d. Data

c. File

A common way of sharing resources on a peer-to-peer network is by modifying the ____ controls using the computer's operating system. a. resource-sharing b. file-serving c. file-sharing d. resource-monitoring

c. File-Sharing

____ describes wiring that connects workstations to the closest telecommunications closet. a. Simple wiring b. Backbone wiring c. Horizontal wiring d. Work area

c. Horizontal wiring

____ operates at the Network layer and manages multicasting. a. ICMP b. IP c. IGMP d. UDP

c. IGMP

In addition to viewing its LEDs and using a loopback plug to test a NIC's functionality, you can also check a NIC's connectivity with ____. a. special switches b. special clients c. simple commands d. special software

c. Simple commands

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes. a. Dynamic b. Best path c. Static d. Link-state

c. Static

___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. a. FTP b. NTP c. Telnet d. NNTP

c. Telnet

____ connect vNICs with a network, whether virtual or physical. a. Virtual duplexers b. Virtual crossovers c. Virtual bridges d. Virtual routers

c. Virtual bridges

A ____ connection is one in which a user connects her computer, via a modem, to a distant network and stays connected for a finite period of time. a. direct b. virtual c. dial-up d. remote

c. dial-up

All protocols are routable. True or False

False

Clients on a client/server network share their resources directly with each other. True or False

False

If your network does not need or use APIPA, it must be uninstalled to avoid conflicts. True or False

False

In a star topology, a single connection failure will halt all traffic between all sites. True or False

False

It is best to perform connectivity tests on a computer connected to a live network. True or False

False

The Application layer includes software applications. True or False

False

The MIME standard replaces SMTP. True or False

False


संबंधित स्टडी सेट्स

Quality, Six Sigma, ISO & Lean Glossary of Terms

View Set

Economics - 3.3.4 - Normal profits, supernormal profits and losses - A Level

View Set