Networking Ch 1-10
WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz
2.3 GHz, 2.5 GHz, and 3.5 GHZ
IEEE 802.11ac runs on which of the following two different frequency spectrums simultaneously? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz
2.4GHz and 5GHz
The typical range of human hearing is: a. 0 to 4,000 Hz b. 0 to 1,200 Hz c. 20 to 14,000 Hz d. 0 to 300 Hz e. 0 to 56,000 Hz
20 to 14,000 Hz
In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36
24
The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________. a. 802.11n b. 802.11a c. 802.3 d. 802.11b e. 802.11g
802.11n
Which of the following standards is backward compatible with IEEE802.11a, b, and g? a. 802.11a b. 802.11b c. 802.11g d. 802.11n e. 802.15
802.11n
Which of the following is not a WLAN standard? a. 802.11ac b. 802.11a c. 802.3 d. 802.11b e. 802.11g
802.3
If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is : a. 890 Hz b. 8900 HZ c. 9100 Hz d. 9Khz e. 890 KHz
9100 Hz
The backbone architecture layer that is closest to the users is the a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Access layer
VLANs prioritize traffic based on the ______. a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics
IEEE 802.1q standard
Which of the following is not true about 10/100 Ethernet? a. It is not a hybrid type of Ethernet. b. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time. c. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client's NIC and use 10 Mbps or 100 Mbps, depending on what the client uses. d. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. e. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term.
It is not a hybrid type of Ethernet.
Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting
It is used in token ring protocol LANs
The network architecture component which contains the organization's servers is called the a. LAN b. building backbone c. data center d. enterprise edge e. WAN
data center
Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles
0.5 to 1.5 miles
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect? a. 01101011 b. 00011011 c. 00100101 d. 10110110 e. 11111110
00011011
A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1
1.5
The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps
1.544 Mbps
________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet
10/100 Ethernet
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a. 256 b. 20 c. 200 d. 512 e. 1024
1024
If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is? a. 128 Kbps b. 64 Kbps c. 12800 bps d. 96 Kbps e. 32000 bps
128 Kbps
The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps
150 Mbps
OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps
159.25 Gbps
When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______. a. 24 b. 16 c. 2 d. 8 e. 4
16
How many channels does 802.11g provide for communication with clients, a. 20 b. 12 c. 10 d. 3 e. 8
3
Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750
400
The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps
44.376 Mbps
The probability of detecting an error, given that one has occurred, using parity checking is about: a. 100% b. 0% c. 50% d. 75% e. 98%
50%
The maximum data rate of a an 802.11ad WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps
54 Mbps
The maximum data rate of an 802.11g WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps
54 Mbps
How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels? a. 64 b. 32 c. 16 d. 8 e. 6
6
How many channels does the 802.11ac standard provide for communication between the access point and clients? a. 4 b. 6 c. 8 d. 11 e. 2
8
When converting analog voice data to digital signals, Pulse Code Modulation typically samples the incoming voice signal _______ times per second. a. 8,000 b. 8 c. 18,000 d. 64 e. 256
8,000
According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20
80
802.11g is backward compatible with which type of LAN? a. 802.11a b. 802.11b c. 802.15 d. 802.3 e. 802.5
802.11b
The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about: a. 75% b. 0% c. exactly 100% d. 50% e. > 99%
> 99%
____________ is one of the most commonly used coding schemes used in data transmission. a. ASCII b. ISDN c. MAU d. ATM e. FDM
ASCII
_____________ is an effective way to prevent attenuation. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuit d. Changing multiplexing techniques e. Shorting a circuit
Adding repeaters or amplifiers to a circuit
Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.
All of the above are true statements.
With respect to converting digital data into analog signals, AM stands for: a. Asynchronous Manchester b. Analog Multimode c. Amplitude Modulation d. Anomaly Multiplexing e. Analytical Mosaic
Amplitude Modulation
___________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control
Amplitude shift keying
Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth.
An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.
BYOD stands for a. Bring Your Own Device b. Bring Your Own Database c. Build Your Own Device d. Build Your Own Database
Bring Your Own Device
The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS
CRTC
Which of the following is not a controlled access method of media access control? a. Token passing b. CSMA/CD c. polling d. roll call polling e. hub polling
CSMA/CD
A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM
CSU/DSU
CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance
Carrier Sense Multiple Access with Collision Avoidance
___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation
Circuit loading
Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors. e. Multimedia applications on networks are becoming common.
Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors.
____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs
Common carriers
The _________ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Core layer
Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva
DEC, Xerox, and Intel
A _________ is an FDM device that splits the physical circuit into three logical circuits (phone, upstream data, downstream data). a. DSL modem b. cable modem c. wireless router d. V.44 modem e. Serial modem
DSL modem
At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge
DSL modem
A DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub
DSL router
At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD
DSLAM
Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM
DSLAM
___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling
Data rate signaling
______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks
Dedicated-circuit networks
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services
Directory Services
The _______ is the part of the backbone that connects the LANs together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Distribution layer
Which of the following is a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. 100 Mbps d. WAN e. SNA
Ethernet
Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps
Ethernet
WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH
Ethernet LANs
____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission. a. Contracted bits b. Polled bits c. Inverse multiplexed bits d. Flipped bits e. Bit delineation
Flipped bits
_____________ can be thought of as dividing the circuit horizontally. a. Frequency division multiplexing b. Statistical frequency division multiplexing c. Statistical time division multiplexing d. Time division multiplexing e. Wavelength division multiplexing
Frequency division multiplexing
______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message. a. Hamming code b. Huffman encoding c. Front end processing d. Wave division multiplexing e. Hub polling
Hamming code
__________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables
Hubs provide a complicated way to connect network cables
The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language
Hypertext Markup Language
WiGig is standardized as a. IEEE 802.11ad b. IEEE 802.11ac c. IEEE 802.11n d. IEEE 802.11g e. IEEE 802.11a
IEEE 802.11ad
The Internet standards organization that will allow anyone to join is __________________. a. ANSI b. ISO c. IETF d. IEEE e. ITU-T
IETF
The network layer of the Internet model uses the _____________ protocol to route messages though the network. a. TCP b. HTTP c. FTP d. SMTP e. IP
IP
Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. a. gigapop b. autonomous system c. ISP d. IXP e. Service provider
IXP
Tier 1 ISPs connect together and exchange data at ___________. a. IXPs b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center
IXPs
__________can obliterate a group of bits, causing a burst error. a. Cross-talk b. Attenuation c. Impulse noise d. Intermodulation noise e. White noise
Impulse noise
Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network
In designing LAN networks, network designers tend to err on the side of building too small a network
The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
Internet Engineering Steering Committee
The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
Internet Engineering Task Force
The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force
Internet Research Task Force
The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society
Internet Society
At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines
Internet service providers
Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. Internet2
Internet2
Which of the following is true with respect to the data link layer? a. It accepts streams of bits from the application layer. b. It is responsible for encoding the bit-stream as a series of electronic voltages. c. It performs error detection. d. It performs routing functions. e. It organizes data from the physical layer and passes these coherent messages directly to the application layer.
It performs error detection.
Which of the following is not a key advantage of digital transmission? a. It permits only low transmission rates. b. It is more efficient. c. It is simpler to integrate voice, video, and data on the same circuit. d. It is more secure. e. It produces fewer errors.
It permits only low transmission rates.
Which of the following is true about roll call polling? a. It can not be modified to increase priority of clients or terminals. b. It does not require a server or host or special device that performs the polling. c. It is also called token passing. d. It is a type of contention approach to media access control. e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
It typically involves some waiting because the server has to wait for a response from the polled client or terminal.
Which of the following is true about the data link protocol, SDLC: a. It is a client-server protocol developed by Compaq in 1996. b. It transmits each character independently of one another and includes start and stop bits for each character sent. c. It uses a special bit pattern called a flag at the beginning and end of every frame (or packet). d. It uses a contention media access control protocol and is used in most LANs today. e. It does not have any error detection capabilities.
It uses a special bit pattern called a flag at the beginning and end of every frame (or packet).
_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP
L2TP
The network architecture component which enables users to access the network is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
LAN
LAN bottlenecks are usually found at the: a. data entry keyboard and client video monitors b. LAN server and network circuit c. hub repeaters and transducer circuit modules d. client operating system and diskette drive e. client hard drive and processor
LAN server and network circuit
__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay
Latency
___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control
Logical topology
With _____________, the AP permits the owner to provide a list of valid addresses that can connect. a. EAP. b. SSID c. WEP d. MAC address filtering e. SWEP
MAC address filtering
Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1
MPLS
_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP
MPLS
The earliest type of fiber optic systems were: a. Graded index multimode b. Attenuated c. Multimode d. Single mode e. Step mode
Multimode
The acronym, MIME, refers to: a. Multimedia Internet Mail Enterprise b. Multiple Internet Media Extension c. Multipurpose Internet Mail Extension d. Media Internet Mail Extension e. Multimedia Internet Mime Extension
Multipurpose Internet Mail Extension
_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System
Network Operating System
In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy
Next Generation Internet
Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.
On a circuit, the shorter the distance, the higher the speed.
Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system
PAD
With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN
PAD
__________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer
Peak circuit traffic
_________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling
Peering
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking
Peering
________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive. a. Contention b. Polling c. Pooling d. Carrier sense e. CRC
Polling
______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission). a. Line-of-sight effect b. Multimode index c. Saturation effect d. Raindrop attenuation e. Propagation delay
Propagation delay
Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access
QoS
Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE
RAID
RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol
Request for Proposal
With which type of digital signaling does the signal always return to zero volts after each bit? a. Non-return-to-zero signaling b. Unipolar signaling c. Return-to-zero signaling d. Data rate signaling e. Huffman encoding signal
Return-to-zero signaling
__________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization's possible changes in product mix c. Understanding the organization's strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization's projections of sales
Reviewing the NFL scores
A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone
Routed backbone
_________ move packets along the backbone based on their network layer address. a. Bridged backbones b. Hubbed backbones c. Multistation access unit backbones d. Routed backbones e. NIC backbones
Routed backbones
_________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet
Securenet
Which of the following statements is correct? a. Parallel transmission is most often used for sending data on a circuit that is made up of one wire. b. Parallel transmission is distinguished from serial transmission by the fact that the transmitting device sends a single bit, then a second bit, and so on, until all the bits are transmitted. c. Parallel transmission is only used for analog data. d. Serial transmission is slower than parallel transmission. e. Parallel transmission is the same as serial transmission.
Serial transmission is slower than parallel transmission.
____ is the process of creating several logically separate servers on the same physical computer. a. Server virtualization b. Server optimization c. Server proliferation d. Server platforming e. Server redundancy
Server virtualization
_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit
Shielding wires
________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users
Simulation
Which of the following is one of the tier 1 ISPs in North America? a. IETF b. IEEE c. IAB d. Sprint e. ISOC
Sprint
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch
Subscriber
A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone
Switched backbone
_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones c. Hubbed backbones d. Bridged backbones e. Multistation access unit backbones
Switched backbones
Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location
T-1 VPN
_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN
T-carrier services
Which of the following is not an application layer standard? a. HTTP b. POP c. T1 d. IMAP e. HTML
T1
Some of the new applications being developed for a high-speed Internet include a.) Tele-immersion b.) Tele-conferencing c.) QoS d.) Broadband e.) Tele-phoning
Tele-immersion
Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.
The data transmission rates tend to be lower than dial-up or dedicated circuits.
Which of the following is not making the traditional design approach less appropriate for today's networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware
The most expensive part of any network is the hardware
Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to route the packet to the correct circuit/computer. e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily.
The physical topology is the same as the physical topology of shared Ethernet: a ring.
Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.
The switch has a physical bus topology.
Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.
They can only switch messages based on their data link layer addresses.
Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.
They tend to use lower speed circuits than LANs.
_________________ is defined as the total number of information bits divided by the total number of bits in the transmission. a. Asynchronous rate b. Protocol percentage c. Throughput d. Transmission Rate of Information Bits e. Transmission efficiency
Transmission efficiency
TRIB, an acronym that relates to throughput, stands for: a. Throughput Reduction of Information Barriers b. Transmission Rate of Information Bits c. Throughput Rate of Iso-synchronous Bytes d. Transmission Regulation for Inverse-multiplexing Bands e. Trellis-coded Regulation of Information Bits
Transmission Rate of Information Bits
To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library
Uniform Resource Locator
______ is a modem standard that uses Lempel-Ziv encoding to compress data. a. V.22 b. V.44 c. V.32bis d. V.34 e. RS 232
V.44
Which of the following is not a type of synchronous protocol? a. SDLC b. VT100 c. HDLC d. Ethernet e. PPP
VT100
The standards H.320, H.323, and MPEG-2 are commonly used with a. Telnet b. Videoconferencing c. Email d. IM e. Microsoft Office
Videoconferencing
A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone
Virtual LAN
Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone
Virtual LAN
A second type of network that a wireless access point provides is a ______ that is secured by a separate password that is entered on a Web page when you first connect to the network. a. WI-LO network b. guest network c. transient network d. IEEE 802.temp e. IEEE 802.11guest
WI-LO network
To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package
Web browser
Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities
When a variety of devices are used in a network, it takes less time to perform network management activities
ARQ means that: a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c. a sender is using a data link protocol called Asynchronous Repeating reQuest d. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines e. a sender is using a parity scheme called Array Resource Quality
a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error
Using parity, the probability for detecting an error, given that one has occurred, is: a. about 50% for either even or odd parity b. about 70% for even parity and 30% for odd parity c. about 30% for even parity and 70% for odd parity d. about 0% for either even or odd parity e. about 100% for either even or odd parity
about 50% for either even or odd parity
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
access point
____________ is used by IM and other applications that provide voice services over lower-speed digital circuits. a. pulse code modulation b. adaptive differential pulse code modulation c. Voice conversation d. code modulation e. phase modulation
adaptive differential pulse code modulation
Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines
add hidden nodes
Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network
adding new keyboards to the client computers
The large network purchases are done: a. before the vendor(s) are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendor(s) are selected d. after the vendor(s) are selected e. after the network has been implemented
after the vendor(s) are selected
Microwave transmission: a. is a type of high frequency radio communication b. requires a clear line-of-sight path c. is typically used for long distance data transmission d. does not require the laying of any cable e. all of the above
all of the above
10Base-T: a. supports 10 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct
all of the answers are correct
Which of the following is not a potential bottleneck for LAN performance? a. number and speed of hard disks in the server b. amount of memory in the server c. speed of server's CPU d. network interface card e. all of the answers are potential bottlenecks for LAN performance
all of the answers are potential bottlenecks for LAN performance
The height of a sound wave is called its: a. frequency b. phase c. amplitude d. bandwidth e. furlong
amplitude
Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices
an application will have drop down menu choices
In general, older networks and local loops designed to transmit voice data are likely to be ________. a. international b. level 2 c. numeric d. digital e. analog
analog
Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps
are supported with gigabit fiber optic networks in large cities
How can a set of 802.11b access points be configured to operate without interference? a. assigning each access point a different channel to communicate with clients b. separate each access point by more than 10 meters c. assign the same channel to no more than two access points d. use omnidirectional antennas on some access points and directional on others. e. none of the above
assigning each access point a different channel to communicate with clients
Another term for the weakening of a signal over distance is: a. turnaround time b. propagation delay c. dispersion d. insulation e. attenuation
attenuation
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is: a. white noise b. spiking c. attenuation d. intermodulation noise e. echo
attenuation
The _____________ of a circuit determines a circuit's capacity. a. frequency b. bandwidth c. phase d. amplitude e. loudness
bandwidth
Which of the following statements is true? a. the longer the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire b. the shorter the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire c. bandwidth is constant across any wire, therefore distance is not relevant to its capacity d. the longer the distance of a telephone wire between sender and recipient, the higher the bandwidth across that wire e. bandwidth is not a term that can be used when discussing telephone transmissions
bandwidth is constant across any wire, therefore distance is not relevant to its capacity
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP
baseline
Errors on a network can occur: a. only on dial-up type of circuits b. because of noise on the line c. only on poorly maintained networks d. only due to Gaussian noise e. only due to lightning strikes
because of noise on the line
Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal
bipolar
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) a. bottleneck b. building backbone c. breakneck d. congested network e. e-commerce edge
bottleneck
Which of the following is a function of the transport layer? a. linking the physical layer to the network layer b. formatting messages by indicating where they start and end c. deciding which route the message should take d. breaking long messages into several smaller messages e. specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it
breaking long messages into several smaller messages
Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband
broadband
The network architecture component that is sometimes referred to as the distribution layer is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN
building backbone
Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network
building-block
In a _________ , more than one data bit is changed by the error-causing condition. a. burst error b. data rate shift c. Trellis-coded modulation d. uniform distribution e. amplitude key shift
burst error
The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected
bus
Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh
bus
A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet
cable modem
A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system
cable modem termination system
1000 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 1000Base-SLCX
can run at either full- or half-duplex
Estimating the size and type of the "standard" and "advanced" network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs
capacity planning
_________ is the basic physical layout of the circuit. a. point-to-point configuration b. configuration c. circuit configuration d. circuit design e. circuit plan
circuit configuration
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design
cloud-based mesh design
Which of the following would not be part of an "ideal" backbone design for the future? a. access layer composed of 10/100 layer 2 Ethernet switches b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T c. redundant switches d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber e. coax cabling throughout LANs and BN
coax cabling throughout LANs and BN
Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator
codec
A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server
collision server
In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS
combiner
Calculating the actual throughput of a data communication network is: a. not normally required for synchronous networks because they are so fast b. complex because many factors affect throughput c. simple because packet size is the primary factor affecting throughput d. not needed for satellite-based networks e. far less complicated if the system operates on a contention basis
complex because many factors affect throughput
With contention: a. computers wait until the circuit is free before they send data b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media c. the front end processor must wait for a response from the polled client or terminal d. one computer starts the poll and passes it to the next computer on the multipoint circuit e. there is never a chance for "collision," or two computers trying to send data at the same time
computers wait until the circuit is free before they send data
Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards
connecting optical-electrical converters
Which of the following is not a property of a WAN: a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses leased lines from IXCs like ATT, MCI, and Sprint.
connects a group of computers in a small geographic area such as room, floor, building or campus.
A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above
connects all computers to one central computer that routes messages to the appropriate computer
With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR)
continuous
Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider
controlling access to a media by more than one computer in a LAN
The biggest drawbacks to VLANs are their_________________. a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size
cost and management complexity
In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
cost assessment
Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system
cost of advertising brochures for new products to be offered by an organization
For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point
customer premises
In general, tier 3 ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs
customers
With the two-tier client-server architecture, the server is responsible for the ________ logic. a. application b. presentation c. data access d. session e. physical
data access
The ___________ is where the organization housing its primary servers. a. MDF b. guest house c. SOHO network d. data center e. load balancer
data center
_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
data storage
A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit
datagram
Which of the following is not a technology layer that is considered when designing backbone networks? a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options
decentralized layer
A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails
dependent upon the capacity of the central computer for its performance
Transmission speeds: a. are the same among all media b. are not a factor in selecting a media because all media have more than enough speed to serve current communication demands c. are a constant, 56Kbps, for all media types d. differ widely among media e. always have a direct correlation with security
differ widely among media
In general, networks designed to transmit primarily computer data are likely to be ________. a. international b. level 1 c. numeric d. analog e. digital
digital
Two fundamentally different types of data are: a. DSL and ADSL b. asymmetric and symmetric c. Microsoft and IBM d. digital and analog e. local area and wide area
digital and analog
The representation of the character A by the group of 8 bits, 01000001, is an example of: a. digital coding b. phase modulation c. binary modulation d. analog transmission e. pitch variation
digital coding
__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical
directional
There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement
discover
___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination. a. turnaround time b. propagation delay c. dispersion d. insulation e. attenuation
dispersion
A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node
distribution hub
A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint
domain
Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used
dumb terminals
The cheapest time to install network cabling is: a. during the construction of the building b. as soon as the building is completed c. as soon as the building is occupied d. about five years after the building is occupied so that the exact office locations for each network computer is known e. any time that a network needs to be installed
during the construction of the building
The _____ contains the servers that are designed to serve data to customers and suppliers. a. e-commerce edge b. SAN c. LAN d. domain controller e. bottleneck
e-commerce edge
The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the a. LAN b. building backbone c. data center d. enterprise edge e. e-commerce edge
e-commerce edge
Another term for a mail user agent is: a. message transfer agent b. router agent c. e-mail client d. Webcast package e. Web client
e-mail client
Asynchronous transmission: a. is used to transmit each character simultaneously with all other characters b. has a pre-determined, fixed time between sending characters c. is typically used on multipoint half duplex circuits d. uses a continuous series of start bits as an idle signal e. each character is transmitted independently of all other characters
each character is transmitted independently of all other characters
When a signal is reflected back to the transmitting equipment, it is called a(n) _________. a. white noise b. echo c. crosstalk d. attenuation e. impulse noise
echo
Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia
encouraging the use of applications such as medical imaging
Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers
ergonomic chairs for users
In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic
failure in one circuit means that the network can most likely continue to function
Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair
fiber
Which of the following is the most secure wired media? a. coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared
fiber optic cable
Which of the following media can best withstand harsh environmental conditions? a. shielded twisted pair b. unshielded twisted pair c. Cat 5 twisted pair d. coaxial cable e. fiber optic cable
fiber optic cable
Which of the following media has the lowest error rates and the highest transmission speeds? a. Coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared
fiber optic cable
Which of the following media is least susceptible to noise? a. fiber optic cable b. coaxial cable c. twisted pair d. unshielded twisted pair e. shielded twisted pair
fiber optic cable
A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server
file server
Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on the growth in network use e. discuss SNA architecture
focus on the growth in network use
A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________. a. ADS b. domain c. forest d. tree e. NDS
forest
A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion
forwarding table
Which of the following is a mode in which a switch operates: a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching
fragment-free switching
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design
full mesh design
Having a conversation with someone using a cellular phone is an example of _________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital
full-duplex
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit
giga, gigabit
Circuit capacity on a backbone network will not be improved by: a. going from 100Base-T Ethernet to 10Base-T Ethernet b. going from 100Base-T Ethernet to gigabit Ethernet c. adding additional circuits alongside heavily used ones d. replacing a shared circuit backbone with a switched circuit backbone e. providing a faster circuit to the server
going from 100Base-T Ethernet to 10Base-T Ethernet
The two basic types of media are: a. statistical and frequency b. guided and wireless (radiated) c. local and wide area d. attenuator and Gaussian e. duplexed and non-duplexed
guided and wireless (radiated)
Stop-and-wait ARQ uses ___________ type of data flow. a. full simplex b. half complex c. full duplex d. half duplex e. full complex
half duplex
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital
half-duplex
When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: a. out of range problem b. collision problem c. hidden node problem d. controlled access problem e. media access problem
hidden node problem
Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax
hybrid fiber coax
Which of the following is not a step used in newer types of network design processes? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer
implementation
Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs
imposes an overhead cost by increasing network traffic
To get more "bandwidth" in a digital transmission, you must: a. increase the range of frequencies available for a transmission b. increase the loudness per transmission c. decrease the bits per second transmission speed d. increase the phase shifts per transmission e. decrease the baud rate per transmission
increase the range of frequencies available for a transmission
In communication protocols, _________ are used to convey the user's meaning. a. information bits b. overhead bits c. stop bits d. start bits e. flag bits
information bits
If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of: a. intermodulation noise b. attenuation c. echo d. white noise e. cross-talk
intermodulation noise
A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. a. WAN b. BN c. extranet d. intranet e. MAN
intranet
Media access control: a. is not very important in point-to-point with full duplex configuration b. is not very important in local area networks c. is not very important in a point-to-point with a half duplex configuration d. is not very important in a multipoint configuration e. does not control when computers transmit
is not very important in point-to-point with full duplex configuration
In ARQ, a NAK: a. is sent by the recipient if the message was received without error b. is sent by the sender at the same time as it sends a data packet c. is sent by the recipient if the message contains an error d. refers to non-asynchronous Kermit technique e. means that the sender should continue with sending the next message
is sent by the recipient if the message contains an error
Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only
is typically offered only to commercial customers
Synchronous transmission: a. cannot be used on multipoint circuits b. is used to send one character at a time c. uses start bits before each character to be sent d. uses stop bits after each character to be sent e. is used to transmit a "frame" or "packet" of data at a time
is used to transmit a "frame" or "packet" of data at a time
To estimate costs for large network purchases, organizations often: a. purchase all network purchases 'off the shelf' b. obtain 'book value' information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors
issue an RFP to vendors
Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media
it has a very low capacity
Which of the following is true about the data link protocol, PPP? a. it is commonly used in WANs b. it is a bit-oriented protocol c. it uses block check characters for error detection d. it was developed in the 1960s e. it uses parity bits for error detection
it is commonly used in WANs
Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches
learn addresses by reading the source and destination addresses
Wired Ethernet is a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. . a. host b. legacy c. caching d. hub e. peak
legacy
Optical media is: a. more likely to suffer from noise than electrical media b. has about the same likelihood of suffering from noise as electrical media c. has about the same likelihood of suffering from noise as coaxial cable d. less likely to suffer from noise than electrical media e. more prone to noise than twisted pair media
less likely to suffer from noise than electrical media
A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point
line splitter
Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice
list of wish list requirements
The ________ acts as a router at the front of the server farm. a. load router b. MDF c. Layer 2 switch d. front-end loader e. load balancer
load balancer
The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3
local loop
____________ refers to the transmission characteristics of the circuit. a. handshaking b. virtual circuit c. bonding d. logical circuit e. physical circuit
logical circuit
The two sublayers of the data link layer consist of the media access control sublayer and the________ . a. logical link control sublayer b. network control sublayer c. session sublayer d. physical sublayer e. transport sublayer
logical link control sublayer
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design
logical network design
Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user
low cost
In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack
main distribution center
Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility
main distribution facility
Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer
may also be called TCP/IP gateways
In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver
messages can take a long time to travel from the sender to the receiver
Which of the following would be considered a type of wireless media? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. microwave e. fiber optics
microwave
__________ is a line-of-sight type of wireless media. a. coaxial cable b. microwave c. radio d. twisted pair e. fiber optic
microwave
In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer
middleware
____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0. a. digitizing. b. sampling c. modulation d. demodulation e. shaping
modulation
The acronym, Modem, stands for _________________. a. multiplexing/demultiplexing b. more/demote c. Mode-M technique d. modulator/demodulator e. Mod emulation technique
modulator/demodulator
Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times
moving data further from the applications and people who use them
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more
much more
A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal
multiplexer
One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered
n-tier
The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat
narrow and deep
In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
needs analysis
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list
network profile
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)? a. it is not very popular b. it is a bit-oriented protocol c. it uses block check characters for error detection d. newer version permits jumbo frames e. it uses parity bits for error detection
newer version permits jumbo frames
Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer
non-necessary requirements
Cross-talk: a. occurs when one circuit picks up signals in another b. is always bothersome because it has a high signal strength c. decreases with increased proximity of two wires d. decreases during wet or damp weather e. increases with lower frequency signals
occurs when one circuit picks up signals in another
__________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical
omnidirectional
Frequency division multiplexing: a. operates by statistically time slicing the signal b. operates by dividing the signal into different frequencies c. uses a codec that divides signals into different channels d. operates by time slicing the signal e. operates by light dividing the signal
operates by dividing the signal into different frequencies
A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter
optical-electrical converter
Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________. a. overlay networks b. Bluetooth c. cellular networks d. mobile networks e. Ethernet networks
overlay networks
A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device
packet assembly/disassembly device
Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network
packet switched network
Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches
patch cables
A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network
permanent virtual circuit
A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
The direction in which the sound wave begins is known as: a. amplitude, which our ears detect as loudness b. frequency, which our ears detect as pitch c. phase d. bandwidth e. furlong
phase
Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals? a. phase b. attenuation c. bipolar d. bandwidth e. codec
phase
In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins? a. bandwidth modulation b. amplitude modulation c. frequency modulation d. phase modulation e. codec modulation
phase modulation
Another name for distributed coordination function (DCF) is __________. a. distributed carrier sense method b. physical carrier sense method c. physical carrier sense mode d. distributed carrier sense mode e. distributed coordination mode
physical carrier sense method
Computers can be assigned to a VLAN based on the ________. a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer
physical port on the switch
Which of the following is way to reduce or eliminate crosstalk on a circuit? a. physically separating the cables from other communication cables b. adding repeaters or amplifiers to a circuit c. reducing the length of the cable d. adding fluorescent lights e. shorting a circuit
physically separating the cables from other communication cables
A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange
point-of-presence
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star
point-to-point
Which is not true about point-to-point circuits? a. point-to-point circuits are dedicated to the use of the two computers. b. point-to-point circuits are more expensive than multipoint circuits. c. point-to-point circuits are called dedicated circuits. d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits. e. point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit.
point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.
The ____________ layer of the OSI model is responsible for data format translation. a. session b. presentation c. physical d. application e. transport
presentation
With the two-tier client-server architecture, the client is responsible for the ________ logic. a. session b. presentation c. data access d. data storage e. networking
presentation
In the three tier architecture, the software on the client computer is responsible for the ____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage
presentation logic
________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
presentation logic
Which of the following is not an important factor to consider when selecting media to be used in a network? a. prestige value of the type of media b. type of network c. cost d. transmission distance e. security
prestige value of the type of media
Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability
prestige value of using a particular common carrier
The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system
provide the software that performs the functions associated with the physical layer
Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only
provides a communications circuit with two 64 Kbps B channels, plus one D channel
10/100 Ethernet: a. uses 100 Mbps throughout the entire network b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use c. uses 10 Mbps throughout 100% of the entire network d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server e. uses 10 Gbps throughout 100% of the entire network
provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
Which is not a function of the physical layer: a. transmission of bits. b. defining the rules by which one and zeroes are transmitted. c. providing error-free transmission of data. d. providing the physical connection between sender and receiver. e. specifying the type of connection and type of signals, waves or pulses that pass though it.
providing error-free transmission of data.
Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT
public utilities commission
Which of the following is not an error detection method used in the data link layer? a. parity checking b. cyclic redundancy checking c. CRC-32 d. pulse code checking e. odd parity
pulse code checking
____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol. a. quadrature amplitude modulation b. time division multiplexing c. synchronous digital line control d. pulse code modulation e. baseband signaling
quadrature amplitude modulation
_____________ refers to the difference between the original analog data and the approximation of that data using the techniques for translating from analog data to digital signals. a. quantizing error b. handshaking phase c. modulating frequency d. POTS anomaly e. amplitude Trellis effect
quantizing error
With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack
rack
The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing
rapidly growing
A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server
remote-access server.
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. a. amplifiers b. repeaters c. multiplexers d. digitizers e. modems
repeaters
If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)? a. adding one or more additional servers b. upgrading the server's CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable
replacing the cable with fiber optic cable
There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body
request line, request header, request body
Routers: a. require more management than switches b. are not susceptible to time delays c. use data link layer addresses to move packets that leave the subnet d. require only a few set of TCP/IP addresses e. don't need much time to establish separate subnet addresses for each LAN
require more management than switches
Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded
require more processing by each computer in the network than in star or ring networks
There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header
response status, response header, response body
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design
ring design
A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone
routed backbone
Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet
routers can connect two or more networks that use the same data link protocol
Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber)
security (relative to fiber)
Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation
segmentation
When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex
serial
A(n) __________ circuit is another name for a multipoint configuration. a. analog b. dedicated c. point-to-point d. shared e. simplex
shared
Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network
specific routers that have been chosen to implement the proposed network
Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center
specifications for a particular lighting fixture in the network operating center
Another term for impulse noise is: a. Gaussian noise b. spikes c. attenuation d. cross-talk e. intermodulation noise
spikes
The primary source of error in data communications is: a. echoes b. intermodulation noise c. spikes d. attenuation e. cross-talk
spikes
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it: a. does not share a communication circuit b. splits the communication circuit vertically (with time slots) instead of horizontally c. increases the wavelength and phase angles of the baseband frequency used for transmission d. moves the baseband of a circuit by shifting it to a higher frequency e. reduces baseband signal velocity more than frequency division multiplexing
splits the communication circuit vertically (with time slots) instead of horizontally
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design
star design
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. a. open window b. halt and be recognized (HBR) c. sliding window d. stop and wait e. continuous
stop and wait
A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network. a. wide area network b. local area network c. storage area network d. storage server e. local area storage WAN
storage area network
When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe. a. submarine cables b. satellites c. telephone lines d. boats e. modems
submarine cables
Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11
sufficient memory
_____________ is not a form of modulation used to transform digital data into analog signals. a. synchronous time division b. amplitude shift keying c. amplitude modulation d. frequency modulation e. phase modulation
synchronous time division
In __________, the network designer examines the available technologies and assesses which options will meet the users' needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering
technology design
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. technology design d. turnpike design e. backplane design
technology design
The room that contains the cable termination points and the distribution frames is referred to as a. telecommunications closet b. equipment room c. building entrance d. backbone room e. work area
telecommunications closet
In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage
the decisions for fundamental technology/protocols and circuit capacity are interrelated
In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue
the goal is to understand what users and applications the network will support
As part of the five-layer network model used in this textbook, the data link layer sits directly between: a. the physical and the application layers b. the network and the application layers c. the network and transport layers d. the physical and the application layers e. the physical and the network layers
the physical and the network layers
Which of the following is not determined by a site survey? a. feasibility of the desired coverage b. potential sources of interference c. the security of the WLAN d. estimated number of access points needed to provide coverage e. current locations of the wired network into which the WLAN will connect.
the security of the WLAN
Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable
there are many more networking devices in a switched backbone network
Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above
to act as a communications server
To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node
total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options
translating packets from one protocol to another as they enter the BN
With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds
tunnels
A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan
turnpike effect
The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire
twisted pair
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n
two
To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can: a. increase the CPU of the server b. upgrade to a bigger circuit c. increase the number of hard disks on the server d. increase the amount of disk capacity of the server e. increase the amount of memory of the server
upgrade to a bigger circuit
The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic
upgrading the circuits between the computers
Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building c. use a star topology with one device, usually a switch d. have a great deal of cable in their backbones e. tend to have less cable, but more network devices
use a star topology with one device, usually a switch
SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities
uses inverse multiplexing above the OC-1 level
Switch-based Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously
usually enables all attached circuits to send or receive packets simultaneously
Hubs: a. usually incorporate repeaters or amplifiers b. have connection points called handles c. limit the distance of a network to a few meters in length d. are a difficult method to connect network cables e. operate at the application layer
usually incorporate repeaters or amplifiers
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network
virtual private network
_____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. a. wardriving b. chalking c. warchalking d. marking e. identifying
warchalking
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer
wavelength division multiplexer
Fiber to the Home uses a. frequency division multiplexing b. wavelength division multiplexing c. time division multiplexing d. statistical time division multiplexing e. all of the above
wavelength division multiplexing
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above
web server
The familiar background static on radios and telephones is called: a. echoes b. intermodulation noise c. impulse noise d. cross-talk e. white noise
white noise
A(n) _____________ is used in a computer to connect it to a WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub
wireless NIC
In general, controlled approaches: a. work better than contention approaches for small networks that have low usage b. work better than contention approaches for large networks that have high usage c. work better than contention approaches for all sizes of networks d. do not require a host, server, or active monitor to assign media access control e. have many collisions
work better than contention approaches for large networks that have high usage
A ________ is a group of computers linked together so that they act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal
server farm
In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model. a. data link and network b. session, presentation and application c. application layer d. application and presentation e. network, transport and presentation
session, presentation and application
Which of the following is true about ISO: a. It makes technical recommendations about data communications interfaces b. Its name stands for International Organization for Standardization c. It is based in Geneva, Switzerland d. It is one of the most important standards-making bodies e. All of the above
All of the above
____________ is not an important middleware standard. a. CORBA (Common Object Request Broker Architecture b. Distributed Computed Environment (DCE) c. Asynchronous Transfer Mode (ATM) d. Open Database Connectivity (ODBC) e. none of the above is an appropriate answer
Asynchronous Transfer Mode (ATM)
Which of the following would be a standard used at the Data Link layer of the Internet or OSI model? a. IP b. TCP c. Ethernet d. HTTP e. FTP
Ethernet
Which of the following is not a data link layer standard? a. HTTP b. Ethernet c. T1 d. PPP e. Frame Relay
HTTP
Taken together, the physical and data link layers are called the ____________________. a. Internet layer b. Hardware layer c. Internetwork layer d. Application layer
Hardware layer
Which of the following is a term used to group together the physical and data link layers? a. Internetwork layers b. Hardware layers c. Software layers d. Middleware layers e. Application layers
Hardware layers
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. Hypertext Transfer Protocol b. File Transfer Protocol c. Simple Mail Transfer Protocol d. Internet Message Access Protocol e. Hyperlink Transfer Protocol.
Hypertext Transfer Protocol
Which standards body is responsible for the development of local area network (LAN) standards? a. ANSI b. ISO c. IETF d. IEEE e. ITU-T
IEEE
With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a. private clouds b. hardware clouds c. storage services d. IaaS
IaaS
Which of the following is not an advantage of instant messaging? a. It usually takes days for an IM message to be delivered to the recipient. b. It allows real time typed messages to be exchanged. c. Some products are ICQ and AOL Instant Messenger. d. It is generally faster than snail-mail. e. It helps people avoid telephone tag.
It usually takes days for an IM message to be delivered to the recipient.
Which of the following is not true about ITU-T: a. It is the technical standards-setting organization of the United Nations International Telecommunications Union b. It is the International Telecommunications Union - Telecommunications Group c. Its membership is limited to U.S. telephone companies d. It is based in Geneva, Switzerland e. Its membership is comprised of representatives from over 200 member countries
Its membership is limited to U.S. telephone companies
In a host-based system with a mainframe, upgrades to the host are _____________. a. Small b. Cheap c. Lumpy d. Never going to happen e. Always performed annually
Lumpy
The software that runs on the mail server is referred to as the ____________ a. Mail transfer agent b. Mail user agent c. Microsoft Outlook d. Web server e. SMTP
Mail transfer agent
Which of the following is not an example of a mail user agent software package? a. Outlook Express b. Microsoft Word c. Eudora d. Microsoft Outlook e. All of these are mail user agent packages
Microsoft Word
Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla
Mosaic
In a ___________ architecture, computers are both client and server, thus sharing the work. a. Host-based b. Client-based c. Client-server d. Peer-to-peer e. Network
Peer-to-peer
One of the most frequently used Telnet applications is a. WS-FTP b. PuTTY c. Outlook d. Word e. FTP
PuTTY
___________ is an orderly close to a dialogue between end users. a. Session termination b. Physical bits c. Frame overhead d. Packet encapsulation e. Message encryption
Session termination
The most commonly used e-mail standard is: a. Simple Mail Transfer Protocol b. X.400 c. CMC d. Post Office Protocol e. Telnet
Simple Mail Transfer Protocol
Which of the following is not a function of the data link layer? a. deciding when to transmit messages over the media b. formatting the message by indicating where messages start and end, and which part is the address c. detecting and correcting any errors that have occurred in the transmission of the message d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it e. controlling the physical layer by determining when to transmit
Specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it
__________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets
Standards
Which of the following is not true about Telnet? a. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b. Telnet poses no security threat. c. Telnet was designed in the early days of the Internet. d. Keystrokes are sent over the network in clear text. e. One program that conforms to the Telnet standard is PuTTY.
Telnet poses no security threat.
Which of the following is not true about de jure standards? a. They are always developed before de facto standards. b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body.
They are always developed before de facto standards.
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software
server
Which of the following is not true about de facto standards? a. They never evolve into de jure standards. b. They are those standards that emerge in the marketplace. c. They tend not to be developed by an official industry or government body. d. They are generally supported by more than one vendor but de facto standards have no official standing. e. They tend to emerge based upon the needs/response of the marketplace.
They never evolve into de jure standards.
The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher
Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
Data communications and networking can be considered as a global area of study because: a. new technologies and applications emerge from a variety of countries and spread around the world b. the technologies enable global communication c. the political and regulatory issues are exactly the same in every country d. a and b e. none of the above
a and b
When a user accesses an application via a web browser on their mobile device, this is referred to as a. a browser-based approach b. a native app c. Internet Explorer d. BYOD
a browser-based approach
A local area network is: a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.
a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings.
A backbone network is: a. a high speed central network that connects other networks in a distance spanning up to several miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 200 miles with common carrier circuits.
a high speed central network that connects other networks in a distance spanning up to several miles.
With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic
all data on the server must travel to the client for processing
A network administrator has received several reports from users of the network that the intranet website on one of company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link
application
In which layer of the Internet model would the HTTP standard be used? a. physical b. application c. transport d. network e. data link
application
Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
application access storage
A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture
application architecture
______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
application logic
Which of the following is not true about a server? a. stores data and software that can be accessed by the client. b. may be a personal computer or a mainframe on the network. c. in client/server computing they work together over the network with client computers to support the business application. d. can only perform one function on a network. e. stores documents and graphics that can be accessed from any Web browser.
can only perform one function on a network.
Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures
can use middleware to provide a standard way of communicating between software from more than one vendor
A _____________ is the input-output hardware device at the end user's end of a communication circuit in a client-server network. a. server b. circuit c. client d. host
client
The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer. a. private b. public c. community d. hybrid
community
What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a. hashing b. encryption c. authentication d. identification e. compression
compression
An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage
data access logic
Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks
development of online batch systems
The primary reason for networking standards is to: a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor
ensure that hardware and software produced by different vendors can work together
A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet. a. WAN b. BN c. extranet d. intranet e. MAN
extranet
A(n) ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users outside the organization. a. intranet b. Usenet c. Wide Area Network d. extranet
extranet
An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers
is generally more "scalable" than a three-tiered architecture
The American National Standards Institute: a. is the coordinating organization for the United States' national system of standards b. is a professional society in the U.S. whose standards committees focus on local area network standards c. sets the standards that govern how much of the Internet will operate d. is an agency that develops federal information processing standards for the federal government e. makes technical recommendations about global telephone rates
is the coordinating organization for the United States' national system of standards
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent
mail user agent
A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a. workstation b. transaction terminal c. cluster d. mainframe e. personal computer
mainframe
A MOOC is an example of a(n) a. BYOD b. massively online technology c. native app d. browser-based technology
massively online technology
The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer
network layer
Networks that are designed to connect similar computers that share data and software with each other are called: a. client/server networks b. peer-to-peer networks c. host networks d. client networks e. local area networks
peer-to-peer networks
IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link
physical
Data is physically transmitted from one computer or terminal to another in the ________ layer. a. physical b. transport c. application d. terminal e. data link
physical
Which of the following correctly represents order of the seven layers of the OSI model from layer 1 to layer 7? a. physical, network, data link, session, transport, application, presentation b. physical, data link, network, transport, session, application, presentation c. physical, data link, network, transport, session, presentation, application d. data link, physical, network, session, transport, application, presentation e. data link, physical, network, transport, session, presentation, application
physical, data link, network, transport, session, presentation, application
A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the client
A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network
places all or almost all of the application logic on the server
The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private b. public c. community d. hybrid
private
A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand. a. agreement b. standard c. protocol d. regulations e. policy
protocol
The three stages of the de jure standardization process are ______________________. a. specification, identification of choices and acceptance. b. planning, implementing and acceptance. c. brainstorming, identification and implementing. d. specification, formalization, and acceptance. e. none of the above.
specification, identification of choices and acceptance.
The function of the file server is to : a. store data and software programs that can be used by client computers on the network. b. manage all printing requests from clients on the network. c. transfer e-mail messages to other servers on the network. d. store HTML documents for an Internet or intranet web site. e. coordinate the communication of client and servers on the network.
store data and software programs that can be used by client computers on the network.
How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server
the presentation logic is on the client, while the data storage and data access logic are on the server
A response status code of 404 means: a. the requested page was not found b. the server is currently unavailable c. the sever is currently busy d. your browser is incompatible with the Web server software. e. your browser needs to be updated to the latest version.
the requested page was not found
One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture
the server can get overloaded since it must process all messages
The fourth layer of the OSI model is called the __________ layer. a. network b. transport c. session d. data link e. presentation
transport
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation b. transport c. physical d. session e. application
transport
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation b. transport c. physical d. session e. application
transport
The _________ layer performs error checking which is redundant to some extent with the function of the _________ layer. a. application, presentation b. physical, data link c. transport, data link d. presentation, transport e. network, physical
transport, data link
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. broadcasting b. instant messaging c. webcasting d. H.323 e. Net Meeting.
webcasting