Computer Science 108: Introduction to Networking Practice Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In MPLS switching, the routing decision is made _____.

by the first routing device and forms the predefined path for subsequent routers

A computer can be a web server if it:

services web page requests by clients connecting to it

Which layer is the network layer in the OSI 7 layer model

3

The OSI Model is used to:

describe how communications happen across a network

Which of the following is true about half-duplex mode?

Data is transmitted in both directions but not at the same time.

In WANs, what advantage does the ring topology have over the bus topology?

Data transmission is multidirectional

If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?

DLP

In order to check the nodes that are connected to a system, one can use the command

netstat

A typical communication network may consist of __________.

servers, internet connectivity devices, computers, routers and smart devices

What makes the symmetric DSL network type so different from the asymmetric type?

It has an equal balance between download and upload speeds.

What type of standards are built by the officials and network professionals in organizations?

Formal standards

What is the approximate distance between devices when establishing a connection using short-range wireless communication?

From a few centimeters to several meters

What are two common WAN (Wide Area Network) design types?

Hub and spoke; Full mesh topology

The organization that currently regulates and manages the Internet is _____.

ICANN

Which of the following wireless communication technologies has the shortest range?

Near Field Communication

What organization sets the rules as to how credit card data is handled?

PCI

Which internet protocol is responsible for re transmitting lost or erroneous data packets?

TCP

Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?

TCP/IP

How many nodes for a network would a /23 be good for address space in IPv4?

Up to 512

IMAP can allow a user with multiple devices to _____

access their emails simultaneously from any of the devices.

Which application operates in the frequency range 87.5 - 108 MHz?

FM Radio

When are guest accounts most likely necessary?

a doctor's office in the waiting room

Which of the following statements is true?

Authoritative name servers respond to queries from recursive name servers

IPv4 represents a _____-bit integer and IPv6 represents a _____-bit alphanumeric string.

32, 128

An office operates on 3 floors of a building. It comprises 4 different departments. Which of the following network implementation will most suit the office needs?

4 VLANs on 4 switches with trunk link connections

Which two protocols are NOT backward compatible?

802.11a Protocol 802.11b

If you didn't have access to a highly-skilled IT network team, what would be a good option for a WAN (Wide Area Network)?

A fully carrier managed WAN.

How does the use of a router differ from a bridge in telecommunication?

A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.

What is Address Translation(AT)?

AT is mapping private IP addresses to public IP addresses

SIP signaling protocol for VoIP and Video-over-IP allows for a connection to be modified. Which of these is an example of a session modification?

Adding an additional participant.

In a _____ topology network, all the devices are connected back to a central hub or switch.

Star

Frequency Division Multiplexing is not used in _____.

Air band radio

What is an IP address?

An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment

Apart from allowing a variety of media formats and sending multiple attachments at once, what other primary benefit did MIME bring to the world of email?

An unlimited number of characters in the body of the message.

Which of the following is a transmission mode that transmits in two directions, but only in one direction at a time?

Asynchronous

Which network topology uses a central hub or controller?

Star

How does RIP route payloads?

By advertising a connected table to all neighbors every 30 seconds.

UDP is what type of protocol?

Connectionless

What part of an optical fiber cable reflects light back into the core as the cable bends?

Cladding

Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?

Coaxial

Which of the following statements about a VLAN environment is TRUE?

Computers or nodes by default are not VLAN aware

The Frame Check Sequence (FCS) within an Ethernet frame serves to _____

Detect corrupted data

Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?

Encryption

Crosstalk and attenuation are NOT a problem in which of the following media?

Fiber optic cable

What is the maximum number of zones that can be associated to a firewall?

Firewalls can have many zones associated to them.

The software or hardware used to connect two different networks is known as _____

Gateway

Which of the following devices can be used to interface computer networks that use different communication protocols?

Gateway

The command tracert is used for which of the following purpose?

Identifying the route that a packet travels in the network before reaching the destination

In what way is a peer-to-peer network different from client/server networks?

In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.

Science and engineering orbital data are made accessible to the general public by use of the _____

Internet-to-orbit

Why is the role of RTCP important in VoIP communications?

It allows adjustments to be made to fine-tune transmissions.

What is the purpose of load balancing in a network?

It distributes traffic to allow for a balance in the network keeping services available

Which of the following problems would the OSI Model solve?

It would allow a Mac and a PC to be used on the same network.

An advantage of optical fiber over traditional copper wiring is:

Less bulk

The network layer converts:

Logical addresses into physical addresses

Which of the following statements is true?

MAC and IP addresses need to work in parallel for effective communication.

_____ was the reason why our emails and our web browsing experiences are more flexible with a wide variety of functions.

MIME

Why did the first version of WPA use TKIP?

Many old devices still used WEP and TKIP was intended to make it easy to upgrade.

Where does the cloud concept originate?

Network diagram

Which protocol downloads a copy of an email and deletes the original email from the server?

POP3

When internet service providers use fiber optic cables, which cable type are they most likely to use for home networks?

Plastic optical cable

PSTN stands for:

Public Switched Telephone Network

What are the reasons for the degradation of a wireless signal?

Reflection Diffraction ScatteringAll of the above

What service does a VPN solution provide?

Remote access to private network resources

Which of the following is NOT a basic component of a telecommunication network?

Remote control unit

Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?

Ring

When a user tries to access a web page, what does the system do first?

Searches the domain name in DNS.

A _____ network cannot be applied at enterprise level due to its high susceptibility to faults.

Serial backbone

MPLS makes use of _____ to make a faster and more efficient network.

Short path labels

The type of fiber used typically for long distance runs is:

Single-mode

Which type of network transmission mode transmits data in both directions simultaneously?

Synchronous

What main use does Telnet have in modern IT?

Telnet is often used for embedded devices.

Why is Telnet discouraged as an access method?

Telnet is unsecure.

The presentation layer of the OSI model translates data into an acceptable format usable by which layer?

The application layer

Which of the following is NOT true with respect to a band pass filter?

The band pass filter is present at the sender's side.

How do clients communicate with the server?

The network

At the 'receiving' computer, the transport layer provides input to which OSI layer?

The session layer

Which of these is NOT true about cloud computing?

There are no privacy concerns.

Why are addresses important in networking?

They are used to identify both the network to which the device is connected to as well as the device itself.

In the OSI model, what does the application layer do?

This layer actively interacts with the operating system or application when the user decides to transfer files, read messages, or perform network-related activities.

Although security is important, why is there a need to use Wireless Access Point as a pass-through set-up which allows any server to get connected to the network?

To enable the peer devices to exchange data without much difficulty.

A remote employee needs to be able to access corporate email and file sharing but doesn't necessarily have a lot of technical knowledge. What is the best access method?

VPN

What type of video-over-IP service relies on two-way communication?

Video conferencing

VOIP stands for:

Voice Over Internet Protocol

What are WLAN Protocols?

WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.

_____ is a simplified setup procedure available on some wireless routers and access points.

WPS

Let's say you're at home trying to make an important video call for work and your family is on the same network streaming other things at the same time. Your network was never the best to begin with, but good enough. What might happen if you did not have a proper QoS policy set up?

Your video stream could suffer, making your experience subpar

Which of these would most likely benefit from registering its MAC addresses.

a small investment firm

What factors should you consider in selecting a WAN (Wide Area Network) service provider?

all of these

What networking organizations set the standards for network communication?

all of these answers are correct

Wireless transmission happens when wireless equipment converts _____.

an electric current to electromagnetic waves

A specially built server:

is built with redundant power supplies to maintain constant availability

According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.

not likely

A specially designed server operating system can serve:

numerous concurrent clients connections

In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.

permissions

The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.

physical


Set pelajaran terkait

Test 2: Presuppositions and Assumptions/ Foundations for Living

View Set

Honors 2018: Bible Science and Humanities Exam 2

View Set

A&P 1 CH 5: INTEGUMENTARY SYSTEM (QUESTIONS)

View Set

Ch. 1 - International System of Units - SI units

View Set