Net Tech Final (Business Data Networks and Security)
103) The neighbor advertisement protocol message was created to give the ________ address of the host sending the message. A) IPv6 B) IPv4 C) Both A and B D) Neither A nor B
A
22) T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps
A
24) SONET/SDH lines use ________. A) optical fiber B) high-quality forms of data-grade UTP C) Both A and B D) Neither A nor B
A
26) The highest-level DNS servers are called ________. A) root servers B) top-level servers C) Both A and B D) Neither A nor B
A
33) Which of the following are usually given dynamic IP addresses? A) Clients. B) Servers. C) Both A and B D) Neither A nor B
A
46) In SNMP, the ________ creates commands. A) manager B) agent C) Both A and B D) Neither A nor B
A
49) Which of the following is in Frame Relay's speed range? A) 10 Mps. B) 100 Mbps. C) Both A and B D) Neither A nor B
A
54) In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Neither A nor B
A
55) SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above
A
57) In MPLS, the interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) on the basis of the previous packet going to the packet's IP address. D) None of the above
A
6) A company has more control over its ________ technology. A) LAN B) WAN
A
70) The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. A) protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B
A
74) Client PCs must have digital certificates in ________. A) transport mode B) tunnel mode C) Both A and B D) Neither A nor B
A
76) According to the ITU, which of the following can be advertised as 4G? A) LTE. B) HSPA+. C) Both A and B D) Neither A nor B
A
78) Which of the following standards provides for central management? A) IPsec. B) SSL/TLS. C) Both A and B D) Neither A nor B
A
79) Which is less expensive to implement? A) SSL/TLS. B) IPsec. C) Both cost about the same to implement.
A
84) The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) Both A and B
A
88) The IEEE calls 64-bit interface addresses ________. A) Extended Unique Identifiers B) Interface IDs C) Both A and B
A
98) In stateless autoconfiguration, providing the address of DNS servers is ________. A) unnecessary B) mandatory C) optional D) impossible
A
61) In virtualization, each virtual machine acts like a stand-alone computer to its users. A) True. B) False.
Answer: A
82) In BitTorrent file sharing, you download parts of the file simultaneously from multiple peers. A) True. B) False.
Answer: A
100) The detailed method of Skype's encryption for confidentiality is unknown. A) True. B) False.
Answer: A
2) Users are primarily concerned about the ________ layer. A) application B) transport C) internet D) data link E) physical
Answer: A
26) SIP is a ________ protocol for VoIP. A) signaling B) transport C) Both A and B D) Neither A nor B
Answer: A
27) Which of the following is likely to dominate in VoIP? A) SIP. B) H.323.
Answer: A
3) In terminal—host systems, almost all processing is done on the ________. A) host B) terminal C) Both of the above do a good deal of processing. D) server
Answer: A
36) Which of the following is used to retrieve Web pages? A) HTTP. B) HTML.
Answer: A
4) Terminal—host systems tend to have poor response times compared with client/server processing. A) True. B) False.
Answer: A
45) Cloud computing is a form of computing where the company outsources some combination of servers, server applications, and client PC software to a cloud service provider. A) True. B) False.
Answer: A
47) In cloud ________, the user accesses the software over the Internet, often with a browser. A) SaaS B) utility computing
Answer: A
52) In ________, a company offloads server processing work to another company at a remote site. A) utility computing B) Software as a Service C) None of the above.
Answer: A
53) Utility computing is usually offered as a pay-as-you-go service. A) True. B) False.
Answer: A
55) Which of the following is an attraction of cloud utility computing? A) Flexibility. B) Control over operations. C) Both A and B D) Neither A nor B
Answer: A
59) Virtualization has contributed to the popularity of cloud computing. A) True. B) False.
Answer: A
62) When deciding whether to use cloud computing, a company must consider security risk. A) True. B) False.
Answer: A
68) SOAs are language-independent. A) True. B) False.
Answer: A
69) ________ use ________ that provide services to customers using WWW interaction standards. A) Web services, service objects B) Service objects, web services
Answer: A
7) Viewing webpages with a Web browser is an example of a client/server architecture. A) True. B) False.
Answer: A
76) Which of the following is true? A) A Web service is one way to implement a SOA. B) A Web service is one way to implement SOAP. C) Both A and B D) Neither A nor B
Answer: A
78) Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures? A) Underutilized processing capacity of client PCs. B) Potential for essential data/services to become unavailable as a device is turned off. C) Both A and B D) Neither A nor B
Answer: A
79) Transient client presence tends to be a problem in ________. A) P2P applications B) client/server applications C) Both A and B D) Neither A nor B
Answer: A
8) RFC 822 and RFC 2822 standards govern ________. A) plain text content of e-mail messages B) HTTP page contents C) HTML commands and content D) plain text, graphic, and video content of e-mail messages E) HTML commands
Answer: A
81) In ________ file sharing, you always download the entire file from a single host. A) most P2P B) BitTorrent C) Both A and B D) Neither A nor B
Answer: A
84) In BitTorrent, ________ give information about specific files and where they are stored. A) .torrent files B) swarms C) Neither A nor B
Answer: A
86) In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________. A) swarm B) browser C) tracker D) None of the above.
Answer: A
88) The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power. A) BitTorrent B) client/server C) Both A and B D) Neither A nor B
Answer: A
10) SMTP is a standard used at the ________ layer to transfer mail messages. A) physical B) application C) internet D) data link E) transport
Answer: B
101) The Skype protocol is relatively ________ for corporate firewalls to filter. A) easy B) difficult
Answer: B
102) Which of the following is a processor-sharing application? A) BitTorrent. B) SETI@home. C) SIP. D) Skype.
Answer: B
13) ________ depend on the ability of mail servers to store messages. A) Senders B) Receivers
Answer: B
14) The most widely used standard for downloading e-mail to e-mail clients is ________. A) the IMAP standard B) the POP standard C) The IMAP and POP standards are equally popular. D) the SMTP standard
Answer: B
39) How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 1. B) 3. C) 4. D) 88. E) 91.
Answer: C
44) In HTTP response messages, the attached file is preceded by a ________. A) colon (:) B) space C) blank line D) All of the above.
Answer: C
46) SaaS software vendors may make an application available by ________. A) hosting it on their own webservers B) allowing the application to be downloaded to the consumer device C) Both A and B D) Neither A nor B
Answer: C
5) Processing is done only on a centralized machine in the ________ architecture. A) client/server B) P2P C) terminal—host D) None of the above
Answer: C
51) Which of the following services predates cloud computing? A) Software as a Service. B) Utility computing. C) Both A and B D) Neither A nor B
Answer: C
54) If a company runs its own data center, it might face problems with ________. A) overprovisioning B) underprovisioning C) Both A and B D) Neither A nor B
Answer: C
57) Which of the following is not an issue for cloud utility computing? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Very high costs. D) Security concerns. E) Legal complications.
Answer: C
58) Which of the following is a factor that has contributed to the popularity of cloud computing? A) The Internet. B) Web services. C) Both A and B D) Neither A nor B
Answer: C
6) In client/server processing, processing is done on the ________. A) client B) server C) On both of the above. D) host computer
Answer: C
65) SOAs are attractive because of ________ A) reuse B) language independence C) Both A and B D) Neither A nor B
Answer: C
67) In SOA, what language can be used to create service objects? A) Java. B) C++. C) Both A and B D) Neither A nor B
Answer: C
73) The purpose of ________ is to allow a calling program to understand how to use a service object. A) SOAP B) XML C) WDSL D) UDDI
Answer: C
75) Which of the following is true? A) A Web service is one way to implement a SOA. B) SOAP is one way to implement a Web service. C) Both A and B D) Neither A nor B
Answer: C
85) In BitTorrent, a ________ is a server that coordinates the file transfer. A) swarm B) browser C) tracker D) None of the above.
Answer: C
87) Which of the following is a security risk associated with BitTorrent? A) Danger caused by opening TCP ports on the firewall. B) Danger that an employee may download an infected file. C) Both A and B D) Neither A nor B
Answer: C
89) Skype offers ________. A) free calling among Skype customers B) reduced-cost calling to and from Public Switched Telephone Network customers C) Both A and B D) Neither A nor B
Answer: C
92) Which element of the Skype network is in charge of signaling? A) The login server. B) Host nodes. C) Super nodes.
Answer: C
95) Which of the following steps in Skype is done P2P? A) Signaling. B) Transport. C) Both A and B D) Neither A nor B
Answer: C
1) The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture E) Both b. and c.
Answer: D
11) An e-mail user sending messages to his or her mail server would most likely use ________. A) the IMAP standard B) the POP standard C) either the IMAP or POP standard D) the SMTP standard E) RFC 2822
Answer: D
38) How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1. B) 2. C) 3. D) 4. E) None of the above.
Answer: D
43) ________ is a standard to describe a file's format type. A) RFC 2822 B) SMTP C) HTML D) MIME
Answer: D
48) Which of the following is an attraction of cloud SaaS? A) Potential lowered costs in hardware and personnel. B) Mobility. C) Collaboration. D) All of the above.
Answer: D
64) In SOA, calls are placed to ________. A) programs B) subprograms C) subroutines D) service objects
Answer: D
74) The purpose of ________ is to help someone to find an appropriate service object. A) SOAP B) XML C) WDSL D) UDDI
Answer: D
9) E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE E) None of the above.
Answer: D
96) Login is done P2P (instead of using servers) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B
Answer: D
98) Transport is done using servers (not P2P) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B
Answer: D
12) Mail servers communicate with each other by using ________. A) POP B) IMAP C) either POP or IMAP D) RFC 2822 E) SMTP
Answer: E
31) Variable time delays between successive packets in a transport stream is called ________. A) a timing error B) a warble C) RTP D) a SIP violation E) jitter
Answer: E
53) A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard. A) command B) trap C) alarm D) All of the above
B
58) Frame Relay frames contain ________. A) destination addresses B) virtual circuit numbers C) Both A and B
B
60) Label-switching routers base their decisions on a packet's ________. A) IP address B) label number C) Both A and B D) Neither A nor B
B
61) In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) Both A and B D) Neither A nor B
B
65) IPsec protects ________ layer messages. A) data link B) application C) Both A and B D) Neither A nor B
B
66) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________. A) traditional cellular technology B) CDMA C) Both A and B D) Neither A nor B
B
68) In tunnel mode, IPsec provides protection ________. A) all the way between the two hosts B) only between the IPsec servers C) Both A and B D) Neither A nor B
B
69) When a cellular customer moves from one cell in a city to another cell in the same city, this is ________. A) cell switching B) a handoff C) cell hopping D) roaming
B
7) ________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) None of the above
B
72) Which mode of IPsec is more expensive? A) Transport mode. B) Tunnel mode. C) Both A and B are equally expensive.
B
73) The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________. A) that it provides protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B
B
74) Which of the following offers true 4G speeds? A) LTE. B) LTE Advanced. C) HSPA+. D) All of the above
B
8) In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host
B
80) Which has stronger security? A) SSL/TLS. B) IPsec. C) Both have about equal security.
B
81) If a host to be able to communicate via IPv4 and IPv6, it is said to ________. A) be bilingual B) have a dual stack C) be IPv6 ready D) be fully compliant
B
82) Today, it is problematic to have ________. A) only a single IPv4 stack B) only a single IPv6 stack C) a dual stack D) All of the above
B
85) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits. B) 32 bits. C) 64 bits. D) We cannot say.
B
86) The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) We cannot say.
B
87) In an IPv6 global unicast address, the interface ID is ________ bits long. A) less than 32 B) 64 C) 128 D) We cannot say.
B
93) Access to a router is needed to create a ________. A) link local IPv6 address B) global unicast IPv6 address C) Both A and B D) Neither A nor B
B
94) The router advertisement protocol may ________. A) give the client an IPv6 address B) forbid the use of stateless autoconfiguration C) Both A and B D) Neither A nor B
B
101) Stateless autoconfiguration can be used to ________. A) change all subnet IDs in a network B) change all routing prefixes in a network C) Both A and B D) Neither A nor B
C
11) LANs are ________. A) single networks B) internets C) Either A or B D) Neither A nor B
C
12) WANs are ________. A) single networks B) internets C) Either A or B D) Neither A nor B
C
14) Which of the following can be used within a firm? A) Private IP addresses. B) Public IP addresses. C) Both A and B D) Neither A nor B
C
15) Low-speed leased lines use ________ transmission lines to the customer premises. A) one-pair voice-grade UTP B) one-pair data-grade UTP C) two-pair data-grade UTP D) four-pair UTP
C
16) Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) Both A and B D) Neither A nor B
C
18) The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) Both A and B D) Neither A nor B
C
29) A company receives its domain name from ________. A) the IETF B) its ISP C) a domain registrar D) None of the above
C
30) What transmission medium do ALL DSL services use? A) One-pair data-grade UTP. B) Two-pair data-grade UTP. C) One-pair voice-grade UTP. D) Two-pair voice-grade UTP.
C
36) In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) Both A and B D) Neither A nor B
C
41) For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP
C
43) The management information base (MIB) is a(n) ________. A) schema B) actual database C) Either A or B D) Neither A nor B
C
45) Leased line switched WANs typically use ________. A) leased lines B) a router at each site C) Both A and B D) Neither A nor B
C
45) Which of the following would be an SNMP object? A) Number of rows in routing table. B) System uptime (since last reboot). C) Both A and B D) Neither A nor B
C
46) A firm uses a PSDN. It has four sites. How many leased lines will it need? A) None B) 1 C) 4 D) None of the above
C
47) In a PSDN, companies connect to the network core at ________. A) NAPs B) Public/Private access points C) POPs D) DSLAMs
C
48) The PSDN transport core normally is drawn as a cloud ________. A) because it has no internal structure B) for security reasons C) because customers do not need to care about what is inside it D) All of the above
C
54) Why is metro Ethernet popular? A) Familiarity. B) Rapid reprovisioning. C) Both A and B D) Neither A nor B
C
56) SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above
C
58) In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path
C
62) Label-switching routers provide ________. A) lower cost B) the ability to do traffic engineering C) Both A and B D) Neither A nor B
C
63) IPsec is a(n) ________ layer standard. A) physical B) data link C) internet D) All of the above
C
75) IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) Both A and B D) Neither A nor B
C
83) Which is not one of the three parts of a public IPv6 unicast address? A) Subnet ID. B) Routing prefix. C) Host part. D) All of the above ARE parts in a public IPv6 unicast address.
C
89) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000
C
90) To configure itself, a client PC running IPv6 can configure itself using ________. A) DHCP B) stateless autoconfiguration C) Both A and B D) Neither A nor B
C
95) The router advertisement protocol may ________. A) give the client a routing prefix B) give the client a subnet ID C) Both A and B D) Neither A nor B
C
96) Stateless autoconfiguration makes more sense for ________. A) single-stack IPv4 hosts B) single-stack IPv6 hosts C) dual-stack hosts D) It makes equal sense for all of the above.
C
77) In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations
D
18) UTP transmission is normally limited to about 100 meters.
FALSE
24) ".UK" is a generic top-level domain.
FALSE
27) In the Domain Name System, there is a single root server.
FALSE
29) The slowest offered SONET/SDH leased lines run at about 50 Mbps.
FALSE
31) Servers are normally given dynamic IP addresses.
FALSE
34) ADSL offers symmetric service.
FALSE
40) In SNMP, the manager communicates directly with the managed device.
FALSE
41) In SNMP, "object" is another name for "managed device."
FALSE
44) Human interface functionality is defined by the SNMP standard.
FALSE
47) In SNMP, the agent can create commands.
FALSE
49) In SNMP, the manager creates both commands and responses.
FALSE
64) IPsec operates at the data link layer.
FALSE
67) To be protected by IPsec, applications must be IPsec-aware.
FALSE
69) In tunnel mode, IPsec provides protection all the way between the two hosts.
FALSE
72) "Handoff" means the same thing in cellular and 802.11 networks.
FALSE
97) Stateless autoconfiguration will give an IPv6 host most or all of the configuration information it needs to operate effectively.
FALSE
10) NAT provides security.
TRUE
100) Stateless autoconfiguration can be used to change all routing prefixes and subnet IDs in a network.
TRUE
12) NAT can multiply the number of IP addresses available to the firm by over a thousand.
TRUE
13) Private IP address ranges are only used within a firm.
TRUE
23) ".edu" is a generic top-level domain.
TRUE
28) All SONET/SDH leased lines run faster than 50 Mbps.
TRUE
32) Servers have static IP addresses so that clients can find them easily.
TRUE
36) Clients can send a DHCP request message to multiple DHCP servers.
TRUE
39) DSL throughput is typically sensitive to distance from the nearest switching building.
TRUE
42) In SNMP, the time-to-live value for a router interface is the value for an object.
TRUE
42) To deliver signals to individual residences, cable television companies primarily use coaxial cable.
TRUE
5) The general name for a company that is given rights of way to lay wires through public areas is carrier.
TRUE
52) In SNMP, Set commands tell the agent to change a parameter on the managed device.
TRUE
59) Label-switching routers do NOT look at the IP address of each arriving packet.
TRUE
65) Cellular technology was created to support more customers in a single area.
TRUE
66) IPsec protects all layers above the internet layer.
TRUE
71) In transport mode, IPsec provides security over the internal networks.
TRUE
76) IPsec is used for site-to-site VPNs.
TRUE
82) Some smart phones can act as wireless access points.
TRUE
91) The first stage in IPv6 stateless autoconfiguration is to create an address that can only be used on the host's single network.
TRUE
92) After creating a link local IPv6 address, a host doing IPv6 stateless autoconfiguration should use the neighbor discovery protocol.
TRUE
99) IPv6 has a number of known security weaknesses.
TRUE
41) In HTTP, keywords usually are followed by ________. A) a colon (:) B) a space C) a carriage return
line feed D) a blank line E) All of the above. /Answer: A
40) In HTTP, fields normally are ended by ________. A) a colon (:) B) a space C) a carriage return
line feed D) a blank line E) All of the above. /Answer: C
1) A network that runs on the customer premises is a ________. A) LAN B) WAN C) Both A and B D) Neither A nor B
A
10) Which of the following usually offers higher speeds? A) MANs. B) WANs. C) Both A and B are about equal in typical speeds.
A
11) NAT enhances security by preventing ________. A) sniffers from learning internal IP addresses B) encryption C) Both A and B D) Neither A nor B
A
15) Which of the following is a private IP address range? A) 10.x.x.x. B) 128.171.x.x. C) Both A and B D) Neither A nor B
A
17) Carrier access lines to residential buildings typically use ________. A) one-pair voice-grade UTP B) two-pair voice-grade UTP C) two-pair data-grade UTP D) four-pair UTP
A
20) Leased lines are ________. A) point-to-point lines between two premises B) always on C) Both A and B D) Neither A nor B
A
21) Leased lines standards are most different around the world at speeds ________. A) below about 50 Mbps B) above about 50 Mbps C) Leased line speeds around the world are about equally different in both speed ranges.
A
25) Which of the following is a fractional T1 line speed? A) 128 kbps. B) 1 Mbps. C) Both A and B D) Neither A nor B
A
27) Which of the following are more widely used? A) T1 lines. B) SONET lines. C) Both are used about equally.
A
3) A WAN is a network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) All of the above
A
35) Which of the following DSL services does not offer QoS guarantees? A) Residential. B) Business. C) Both A and B D) Neither A nor B
A
38) For ADSL service, which of the following typically must be added to the telephone system? A) A DSLAM. B) A transmission line to the customer premises. C) Both A and B D) Neither A nor B
A
4) Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) Both A and B D) Neither A nor B
A
40) Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) Both A and B D) Neither A nor B
A
50) Which of the following offers speeds that match speed range of greatest corporate demand for WAN transmission? A) Frame Relay. B) ATM. C) Both A and B D) Neither A nor B
A
52) Metropolitan area Ethernet is used primarily ________. A) in MANs B) to link sites in distant cities C) Both A and B D) Neither A nor B
A
56) The use of virtual circuits ________. A) reduces costs B) improves reliability C) Both A and B D) Neither A nor B
A
57) In ________, switching decisions are based on destination addresses. A) Ethernet B) PSDNs that use virtual circuits C) Both A and B D) Neither A nor B
A
59) Using the Internet as a WAN is attractive because of ________. A) the Internet's low cost per bit B) the Internet's service quality C) Both A and B D) Neither A nor B
A
60) Service quality issues with the Internet can be addressed by using ________. A) a single ISP B) multiple ISPs
A
61) In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) Both A and B D) Neither A nor B
A
64) Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater speed D) All of the above
A
7) LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) the slow corporate adoption of newer WAN technologies D) economics
A
70) When a cellular customer moves from one city to another, this is ________. A) roaming B) a handoff C) Both A and B D) Neither A nor B
A
44) Two-way amplifiers are needed for cable ________ service. A) television B) data C) Both A and B D) Neither A nor B
B
71) Which of the following is true? A) "Roaming" means the same thing in cellular and 802.11 networks. B) "Handoff" means the same thing in cellular and 802.11 networks. C) Both A and B are true. D) Neither A nor B is true.
B
78) On what full 4G standard are carriers converging? A) LTE. B) LTE Advanced. C) HSPA+. D) None of the above
B
9) Which of the following has more diversity in technologies? A) LANs. B) WANs. C) Both A and B are about equal in diversity of technologies.
B
19) Which of the following go from one customer site to another customer site? A) Leased lines. B) Access lines. C) Both A and B
C
2) A LAN is a network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) All of the above
C
26) In the United States, to get a leased line of at least 2.5 Mbps. Your access line would be ________. A) T1 B) Fractional T1 C) Bonded T1s D) None of the above
C
55) Why is metro Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) Both A and B D) Neither A nor B
C
63) An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B D) Neither A nor B
C
73) For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access? A) 1G. B) 2G. C) 3G. D) 4G.
C
77) HSPA+ is a ________ service. A) 1G B) 2G C) 3G D) 4G
C
84) Combining multiple WAN technologies into a collectively managed system is called having ________. A) SNMP B) network visibility C) a virtual WAN D) WAN optimization
C
75) According to the ITU, which of the following offers true 4G speeds? A) LTE. B) HSPA+. C) Both A and B D) Neither A nor B
D
1) In IP subnet planning, having a large subnet part allows more hosts per subnet.
FALSE
17) NAT works automatically with all protocols.
FALSE
62) In cellular technology, a cellsite is a small geographical area.
FALSE
67) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology.
FALSE
68) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with CDMA cellular technology.
FALSE
79) By regulation, cellular systems must give almost the same throughput at different times during the day.
FALSE
8) WAN prices are closely related to carrier costs.
FALSE
80) By regulation, cellular systems must give almost the same throughput at different places in their service areas.
FALSE
2) When the subnet part is made larger, the host part must be smaller.
TRUE
53) Metro Ethernet offers relatively high speeds and low costs.
TRUE
81) Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network.
TRUE
83) To use your smartphone as a wireless access point today generally will require you to pay a larger monthly fee.
TRUE
9) NAT operates transparently to the two hosts.
TRUE
35) HTTP is used at the ________ layer. A) physical B) data link C) application D) internet E) transport
Answer: C
15) If you are using a Web-enabled e-mail system ________. A) you have to install a special Web-enabled e-mail client to access your e-mail B) you access and send mail by using a Web browser C) you are more likely to be susceptible to viruses being introduced on your computer D) you are unable to send/receive e-mail messages containing information other than letters or numbers
Answer: B
16) Which of the following allows you to read your e-mail easily at Internet cafés? A) POP. B) Web-enabled e-mail. C) Both A and B D) Neither A nor B
Answer: B
18) If companies place antivirus software on all of their client PCs, this will stop almost all virus infections. A) True. B) False.
Answer: B
19) Which of the following offers more reliable antivirus protection? A) Antivirus software on user PCs. B) Antivirus software on the mail server. C) Both A and B are about equally reliable.
Answer: B
20) According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s). A) 1 B) 2 C) 3
Answer: B
21) VoIP is the transmission of telephone signals over circuit-switched networks. A) True. B) False.
Answer: B
22) VoIP uses ________ switching. A) circuit B) packet C) Either A or B
Answer: B
23) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software. A) True. B) False.
Answer: B
24) A media gateway connects a client computer or VoIP phone to the VoIP network. A) True. B) False.
Answer: B
28) VoIP users often have ________ in their phones or on their computers. A) media gateways B) codecs C) Both A and B D) Neither A nor B
Answer: B
30) For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) codec standards D) IP E) Ethernet
Answer: B
32) RTP supports ________. A) faster transmission speed B) jitter control C) Both A and B D) Neither A nor B
Answer: B
33) Which header comes SECOND in a VoIP transport packet? A) RTP. B) UDP. C) IP. D) Application.
Answer: B
34) Codec data comes after the ________ header in VoIP transport frames. A) IP B) RTP C) UDP D) Ethernet E) TCP
Answer: B
37) Which of the following is used in webpage bodies? A) HTTP. B) HTML. C) Both A and B D) Neither A nor B
Answer: B
42) The code "200" may be found in HTTP ________ messages. A) request B) response C) Both A and B D) Neither A nor B
Answer: B
50) Utility computing is a new phenomenon. A) True. B) False.
Answer: B
60) In virtualization, the real computer's capacity is divided among a number of ________. A) hypervisors B) virtual machines C) Neither A nor B
Answer: B
63) A service-oriented architecture is an application architecture in which a few large programs interact to provide a unified service. A) True. B) False.
Answer: B
66) In SOA, access to service objects is ________. A) ad hoc B) standardized C) Either a. not b. D) Neither A nor B
Answer: B
70) The terms SOA and Web services mean the same thing. A) True. B) False.
Answer: B
71) By definition, Web services are implemented using SOAP. A) True. B) False.
Answer: B
72) In SOA, SOAP messages are encoded in ________. A) HTML B) XML C) Both A and B D) Neither A nor B
Answer: B
77) To be considered a peer-to-peer application architecture, there can be no dedicated servers included on the network. A) True. B) False.
Answer: B
80) In ________ file retrieval, your computer downloads a file from a server. A) P2P B) client/server C) BitTorrent D) None of the above.
Answer: B
83) In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files. A) swarm B) index C) tracker D) None of the above.
Answer: B
90) Which of the following is not one of the main elements of the Skype network? A) Login server. B) Proxy server. C) Host node. D) Super node.
Answer: B
91) In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact. A) login B) directory search C) transport D) signaling
Answer: B
93) Which element of the Skype network is in charge of transport? A) The login server. B) Host nodes. C) Super nodes.
Answer: B
94) Which of the following steps in Skype is done P2P? A) Login. B) Signaling. C) Both A and B D) Neither A nor B
Answer: B
97) Signaling is done using servers (not P2P) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B
Answer: B
99) Skype's security protocols have been publicly studied and approved. A) True. B) False.
Answer: B
103) If most P2P applications use facilitating servers, why do we still call them peer-to-peer? A) We accept sloppy terminology. B) We do NOT still call them peer-to-peer. C) User computers do most of the work. D) P2P applications do NOT use servers.
Answer: C
17) Antivirus software checks e-mail attachments for ________. A) viruses B) Trojan horses C) Both A and B D) Neither A nor B
Answer: C
25) A media gateway translates ________ transmissions. A) signaling B) transport C) Both A and B D) Neither A nor B
Answer: C
29) Speech codecs vary with respect to ________. A) compression B) voice quality C) Both A and B D) Neither A nor B
Answer: C
49) Which of the following is not an issue for cloud Software as a Service? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Security concerns. D) Legal complications. E) All of the above are issues for cloud Software as a Service.
Answer: E
56) Which of the following is not an issue for cloud utility computing? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Security concerns. D) Legal complications. E) All of the above are issues for cloud utility computing.
Answer: E
13) The Internet is a ________. A) LAN B) WAN C) Both A and B D) Neither A nor B
B
14) Which of the following does the carrier NOT own? A) The network core. B) Customer premises equipment. C) Both A and B D) Neither A nor B
B
16) Local loop access lines to business use which of the following transmission media? A) 1-pair data-grade UTP. B) Optical fiber. C) Both A and B D) Neither A nor B
B
19) ________ is a general naming system for the Internet. A) NAT B) DNS C) Both A and B D) Neither A nor B
B
21) ".com" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above
B
22) ".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above
B
23) E1 leased lines run at a speed of about ________. A) 250 kbps B) 2 Mbps C) 34 Mbps D) 45 Mbps
B
25) Corporations most wish to have ________ domain names. A) top-level B) second-level C) third-level D) None of the above
B
30) Servers are normally given ________ IP addresses. A) well-known B) static C) dynamic D) None of the above
B
31) Which of the following already runs to nearly all customer premises? A) 4-pair UTP. B) 1-pair VG UTP. C) 1-pair DG UTP. D) None of the above
B
32) Which of the following DSL services tend to be symmetric in speed? A) Residential. B) Business. C) Both A and B D) Neither A nor B
B
33) Which of the following DSL services usually offers QoS guarantees? A) Residential. B) Business. C) Both A and B D) Neither A nor B
B
34) Clients normally get their IP addresses from ________. A) DNS servers B) DHCP servers C) directory servers D) identity servers
B
37) DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve. A) ranges B) scopes C) spans D) domains
B
37) In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) Both A and B D) Neither A nor B
B
39) In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) Both A and B D) Neither A nor B
B
4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) None of the above
B
48) In SNMP, the ________ creates responses. A) manager B) agent C) Both A and B D) Neither A nor B
B
50) In SNMP, the ________ creates traps. A) manager B) agent C) Both A and B D) Neither A nor B
B
51) In SNMP, the manager can create ________. A) traps B) GET commands C) Both A and B D) Neither A nor B
B
102) In DNS servers, the IPv6 address of a host is contained in the ________ record. A) IPv6 B) IPv4+ C) A D) None of the above
D
20) In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain
D
28) How many DNS root servers are there? A) 1. B) 2. C) 10. D) 13.
D
3) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) None of the above
D
35) ________ servers provide ________ IP addresses to clients. A) DNS, static B) DNS, dynamic C) DHCP, static D) DHCP, dynamic
D
38) Which of the above is NOT an element in a network management system? A) The manager. B) Agents. C) Objects. D) All of the above ARE elements in network management systems.
D
43) In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) Both A and B D) Neither A nor B
D
5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 65,534
D
51) ATM ________. A) offers speeds in the range of greatest corporate demand B) is relatively inexpensive C) Both A and B D) Neither A nor B
D
6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 14 B) 16 C) 256 D) None of the above
D