Chapter 1-2 Quiz
A Wi-Fi device is generally any device based on the IEEE 802.11 standard. A) True B) False
A) True
A knowledge worker is a professional whose job involves the use and manipulation of data. A) True B) False
A) True
An attacker can use The Onion Router (TOR) and other tools to disguise their source locationInternet Protocol (IP) address. A) True B) False
A) True
In 1997, the IEEE 802.11 standard was ratified, specifying the use of the 2.4 GHz band with data rates of up to 2 Gbps. A) True B) False
A) True
In a packet-switched network, packets can take multiple paths from source to destination, so there is no dependence on a single circuit A) True B) False
A) True
On a local area network, Dynamic Host Configuration Protocol (DHCP) automatically assigns IP addresses to devices as needed. A) True B) False
A) True
Regarding the OSI Reference Model, many people lump Layers 5 through 7 together, referring to them as the "Application Layers." A) True B) False
A) True
The 802.11 wireless local area network protocols are defined at Layer 1 in the OSI Reference Model. A) True B) False
A) True
The Data Link Layer of the OSI Reference Model is viewed as the "switching" layer because it is the layer where switching paths are determined in LANs. A) True B) False
A) True
Which layer of the Open Systems Interconnection (OSI) Reference Model connects software applications to the network? A)Application Layer B)Presentation Layer C)Network Layer D)Transport Layer
A)Application Layer
In the late 1980s, which wide area network (WAN) technology became one of the standard methods of connecting business computers and networks over long distances? A)Frame Relay B)DECnet C)AppleTalk D)Token Ring
A)Frame Relay
The Internet of Things (IoT) has great potential for remote management of devices, for example, vending machines could report their status and stock levels. But there are important technical prerequisites before the IoT is viable. What is a technical requirement to deploying a remote management system for 500 vending machines across a region? A)Internet Protocol version 6 (IPv6) support B)Internet Protocol version 4 (IPv4) support C)wired Ethernet D)2G technology
A)Internet Protocol version 6 (IPv6) support
Which layer of the Open Systems Interconnection (OSI) Reference Model represents the signal path over which data is transmitted? This can include copper wires, optical fibers, or radio signals, such as Wi-Fi, WiMAX, and Bluetooth. A)Physical Layer B)Network Layer C)Transport Layer D)Session Layer
A)Physical Layer
Encryption and cryptography primarily support which principle of security? A)confidentiality B)integrity C)availability D)nonrepudiation
A)confidentiality
Which Mobile IP client stack component is a router capable of processing and tracking mobile routing IP updates, tracking mobile node registrations, and forwarding traffic to mobile nodes on visited networks through Internet Protocol (IP) tunnels? A)home agent (HA) B)mobile node (MN) C)foreign agent (FA) D)none of the above
A)home agent (HA)
A media access control (MAC) address is intended to be both unique and temporary. A) True B) False
B) False
Modems convert analog data into a digital signal for transport over the wire. At the other end, the digital signal is demodulated to recover the original analog signal. A) True B) False
B) False
The ARPANET project developed the Integrated Services for Digital Network (ISDN) protocol, which became the protocol of the Internet. A) True B) False
B) False
The IBM personal computer (PC) was launched in the early 2000s. A) True B) False
B) False
The IEEE is the U.S. regulatory body in charge of telecommunication rules. A) True B) False
B) False
What began as the result of a U.S. government project and is the predecessor of the Internet? A)Worldwide Interoperability for Microwave Access (WiMAX) B)ARPANET C)Global System for Mobile (GSM) D)Transmission Control Protocol/Internet Protocol (TCP/IP)
B)ARPANET
Which layer of the Open Systems Interconnection (OSI) Reference Model helps establish the communication path by specifying the media access control (MAC) address of each device? A)Physical Layer B)Data Link Layer C)Network Layer D)Presentation Layer
B)Data Link Layer
Which layer of the Open Systems Interconnection (OSI) Reference Model formats information sent to and from applications? A)Application Layer B)Presentation Layer C)Network Layer D)Transport Layer
B)Presentation Layer
Which two layers of the Open Systems Interconnection (OSI) Reference Model are closely associated due to the use of Transmission Control Protocol/Internet Protocol (TCP/IP)? A)Physical and Data Link (layers 1 and 2) B)Data Link and Network (layers 2 and 3) C)Network and Transport (layers 3 and 4) D)Transport and Presentation (layers 4 and 6)
C)Network and Transport (layers 3 and 4)
Which of the following is true of packet switching A)Packet switching is less resilient than circuit switching. B)Packet switching is more expensive than circuit switching. C)Packet switching is more efficient than circuit switching. D)Packet switching is an analog process.
C)Packet switching is more efficient than circuit switching.
Redundant and fault tolerant security devices primarily support which principle of security? A)confidentiality B)integrity C)availability D)nonrepudiation
C)availability
You are a networking specialist supporting a client's IPv4 network. You want to protect the client's servers that host sensitive and important information, such as the HR and Finance servers, from network sniffing and the spread of malware. What configuration change could you make to the network router to protect the servers in this way? A)Segment the network using VLANs. B)Segment the network using subnets. C)Use device firewalls. D)Configure access control lists on the router.
B)Segment the network using subnets.
In which of the following models does the company buy the device and pay for all the operational charges associated with it, but the employee is free to use the device for personal business? A)bring your own device (BYOD) B)corporate owned, personally enabled (COPE) C)Common Operating Environment (COE) D)none of the above
B)corporate owned, personally enabled (COPE)
A mathematical message-digest (or hashing) algorithm primarily supports which principle of security? A)confidentiality B)integrity C)availability D)nonrepudiation
B)integrity
Which mobile technology was the first to facilitate high-speed, packet-switched Internet access suitable for browsing high-resolution Web pages? A)1G B)2G C)3G D)4G
C)3G
________ refers to a wide range of illegal activities performed on a network, and has existed since the earliest forms of electronic technology came on the scene in the 1960s. A)Wardriving B)Phishing C)Cybercrime D)Spam
C)Cybercrime
Which of the following is a 2G digital technology that was established in Europe? A)Advanced Mobile Phone System (AMPS) B)Code Division Multiple Access (CDMA) C)Global System for Mobile (GSM) D)Worldwide Interoperability for Microwave Access (WiMAX)
C)Global System for Mobile (GSM)
Which layer of the Open Systems Interconnection (OSI) Reference Model handles communication paths between local area networks (LANs)? Internet Protocol (IP) exists at this layer as well. A)Physical Layer B)Data Link Layer C)Network Layer D)Session Layer
C)Network Layer
________ is a method that allows the seamless transfer of an Internet Protocol (IP) address from one network to another without losing IP sessions, which facilitates roaming. A)Network effect B)Packet switching C)Wi-Fi D)IP mobility
D)IP mobility
You are a networking specialist who has been asked to look into some network-related problems for a small business. The company began experiencing problems after moving into new premises and hiring additional employees. You find the network consists of a single asymmetric digital subscriber line (ADSL) router. Some employees have no network connection problems, while others cannot connect to the network using either the wireless or fixed Ethernet cables. What is the most likely cause of the problems? A)Physical layer connectivity issues B)Transport layer issues C)incorrect PC configuration D)Internet Protocol (IP) addressing issues
D)Internet Protocol (IP) addressing issues
Initially proposed in 1984, __________________ was a solution to issues created by proprietary data networking and equipment development at the dawn of the networking era. A)Transmission Control Protocol/Internet Protocol (TCP/IP) B)International Organization for Standardization (ISO) C)media access control (MAC) address D)Open Systems Interconnection (OSI) Reference Model
D)Open Systems Interconnection (OSI) Reference Model
Which of the following is considered to be a "killer app"? A)Wi-Fi B)Wi-Fi Protected Access 2 (WPA2) C)Subscriber identification module (SIM) D)Short Message Service (SMS)
D)Short Message Service (SMS)
Which layer of the Open Systems Interconnection (OSI) Reference Model is the bridge between the network and the application-processing software on devices? At this layer, data from applications is broken down into packets that are suitable for transport from the sending device, and then reassembled on the receiving device. A)Network Layer B)Application Layer C)Data Link Layer D)Transport Layer
D)Transport Layer
Which of the following is NOT an advantage of digital communications versus analog communications? A)more efficient use of bandwidth B)fewer rates C)less susceptibility to noise and interference D)decreased throughput E)support for additional services such as caller ID
D)decreased throughput
Communication at the Data Link Layer of the Open Systems Interconnection (OSI) Reference Model is achieved through a logical addressing scheme that enables routers to move packets across the network to the correct destination. A) True B) False
b) False