Data Comm Test 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____. a.sub-network c.server b.station d.client

A. sub-network

One of the more interesting applications for a dedicated segment network and a switch is creating a ____. a.virtual LAN c.shared LAN b.dedicated LAN d.local LAN

A. virtual LAN

Early local area networks transmitted data at only ____ million bits per second. a.1 b.10 c.100 d.1000

B. 10

The ____ standard was one of the first Ethernet standards approved. a.10Broad36 c.100BaseTX b.10Base5 d.100BaseT4

B. 10Base5

Active Directory is built around the ____. a.X.500 standard b.Lightweight Directory Access Protocol (LDAP) c.802.11 protocol d.Ethernet standard

B. Lightweight Directory Access Protocol (LDAP)

The first version of NetWare to gain widespread popularity was ____. a.Version 1 c.Version 5 b.Version 3 d.Version 6

B. Version 3

NDS is based on a well-known standard for directory services called ____. a.X.300 c.X.600 b.X.500 d.X.700

B. X.500

A local area network works as a ____ network in that clusters of workstations are connected to a central point (hub or switch) through which workstations can transmit messages to one another. a.star-based c.ring-based b.bus-based d.star-ring-based

B. bus-based

In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub. a.shared c.distributed b.dedicated d.remote

B. dedicated

The SONET network topology is a ____. a.star c.bus b.ring d.star-bus

B. ring

The most popular contention-based protocol is ____. a.token ring b.round-robin c.carrier sense multiple access with collision avoidance (CSMA/CA) d.carrier sense multiple access with collision detection (CSMA/CD)

B. round-robin

When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control. a.explicit c.forward explicit b.implicit d.backward explicit

B.implicit

The wireless LAN standards call a single-cell wireless LAN a(n) ______.

Basic Service Set (BSS)

____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur. a.Broadcast c.Circuit-switched b.Wireless d.Datagram

C. Circuit-switched

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data. a.Explicit congestion control c.Connection admission control b.Implicit congestion control d.Buffer preallocation

C. Connection admission control

The wireless LAN term for a collection of multiple Basic Service Sets is ____. a.Multiple Service Set (MSS) c.Extended Service Set (ESS) b.Basic Service Set (BSS) d.Complex Service Set (CSS)

C. Extended Service Set (ESS)

The IEEE 802.3z standards are also known as ____ Ethernet. a.Switch c.Gigabit b.Fast d.Terabit

C. Gigabit

A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand. a.PANs c.MANs b.LANs d.WANs

C. MANs

In a bus/tree topology, connecting to the cable requires a simple device called a(n) ____. a.hub c.tap b.router d.echo suppressor

C. Tap

NetWare ____ introduced NetWare Directory Services (NDS). a.Version 2 c.Version 4 b.Version 3 d.Version 6

C. Version 4

A transparent bridge creates the internal port table by using a form of ____. a.forward learning c.backward learning b.backward correction d.forward correction

C. backward learning

A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites. a.site c.corporate b.network server d.single-user-single-station

C. corporate

In a ____ architecture, the data frame begins to exit the switch almost as soon as it begins to enter the switch. a.forward c.cut-through b.backward d.random-propagation

C. cut-through

One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information. a.centralized c.distributed b.focalized d.local

C. distributed

To distinguish between a piece of data processed at the data link layer and a piece of data processed at the network layer, the term "____" is used at the data link layer, and the term "packet" is used at the network layer. a.load c.frame b.product d.payload

C. frame

In CSMA/CA, the amount of time a device is made to wait before it can transmit is called the ____. a.frame space (FS) c.interframe space (IFS) b.frame time (FT) d.intraframe time (IFT)

C. interframe space (IFS)

A(n) ____ protocol is the software that allows a workstation to place data onto a local area network. a.error control c.medium access control b.noise control d.flow control

C. medium access control

A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network. a.bus c.mesh b.star d.ring

C. mesh

A ____ is a server that has no cabinet or box, but resides on a single printed circuit card. a.peer-to-peer server c.server blade b.server appliance d.print server

C. server blade

An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user. a.login process c.user interface b.logout process d.loading process

C. user interface

The type of algorithm that tries to avoid collisions is called ______.

CSMA/CA

SONET rings typically have a failover time of ____ milliseconds. a.20 c.40 b.30 d.50

D. 50

The IEEE ____ standard is said to be capable of 100 Mbps wireless transmissions. a.802.11a c.802.11g b.802.11b d.802.11n

D. 802.11n

The ____ is essentially the interface device between the wireless user device and the wired local area network. a.wireless server c.NIC b.wireless workstation d.access point

D. Access Point

On most network operating systems, the client workstation must be loaded with a substantial set of software. With ____, all a user needs on his or her client workstation is a Web browser. a.NetWare 3 c.NetWare 5 b.NetWare 4 d.NetWare 6

D. NetWare 6

The ____ of NetWare version 3 holds information about other services provided by the server to the client, such as printer, modem, and switch/router access information. a.iPrint c.Remote Manager b.iClient d.bindery

D. bindery

In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets. a.explicit congestion control c.connection admission control b.implicit congestion control d.buffer preallocation

D. buffer preallocation

All wide area networks are collections of at least two basic types of equipment: a station and a ____. a.link c.workstation b.server d.node

D. node

A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home. a.single-user-single-station c.site b.interactive user d.single-user-multiple-station

D. single-user-multiple-station

The two types of packet-switched networks are the datagram and the ____. a.static circuit c.standard circuit b.fixed circuit d.virtual circuit

D. virtual circuit

The ability to reroute in the event of a failure is called ______.

Failover

A common example of a connection-oriented network application is DNS. (T/F)

False

A network server requires at least three connections to the network in the form of a network interface card. (T/F)

False

Baseband signaling typically uses multiple digital signals to transmit data over the bus. (T/F)

False

Broadcast networks are as common as circuit-switched and packet-switched networks. (T/F)

False

CSMA/CA is the most popular LAN protocol. (T/F)

False

CSMA/CD is the only network technology that successfully supports connection admission control and quality of service. (T/F)

False

Compared to Dijkstra's least-cost routing algorithm, the flooding technique seems more complex. (T/F)

False

In a shared segment network, each workstation then has a private or dedicated connection. (T/F)

False

In the case of CSMA/CD local area networks, as the networks grow in size, their performance increases. (T/F)

False

Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers. (T/F)

False

Local area network Ethernet allows users to set their own data transfer rates. (T/F)

False

Most MANs are supported by Ethernet ring technology. (T/F)

False

NetWare 5 dropped the NDS distributed database of network resources. (T/F)

False

Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language. (T/F)

False

The 802.11 specification defined six different types of physical layer connections. (T/F)

False

The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. (T/F)

False

The local area network first appeared in the 1950s. (T/F)

False

The logical link control sublayer defines the layout or format of the data frame, simply called the frame. (T/F)

False

The most popular example of a contention-based protocol is the token-passing protocol. (T/F)

False

The path in a circuit-switched network exists only in the software. (T/F)

False

The sub-network of a wide area network is the logical infrastructure and thus consists of nodes and various types of interconnecting media. (T/F)

False

The underlying sub-network of a connectionless application cannot be a circuit-switched network. (T/F)

False

Unlike NetWare's NDS, Active Directory creates a hierarchical structure of resources. (T/F)

False

When a software package is installed on a multiuser system, it is not possible for multiple users to execute multiple copies of the single program. (T/F)

False

When all the routing information is in one place, it is difficult to make updates to the routing information. (T/F)

False

Wireless local area networks are typically found in seven basic configurations. (T/F)

False

Wireless sniffers cannot detect how far wireless signals reach. (T/F)

False

_____ objects are not composed of any objects and are usually entities such as the users, peripherals, servers, printers, queues, and other network resources.

Leaf

The ______ is an electronic device that performs the necessary signal conversions and protocol operations that allow the workstation to send and receive data on the network.

Network Interface Card (NIC)

_____ is a collection of techniques for interfacing multiple hard disk drives to a computer.

RAID

A bindery contains the data that pertains only to the server it resides in. (T/F)

True

A cut-through switch does not store a data frame and then forward it. (T/F)

True

A rule known as the 5-4-3 rule helps guide the design of a shared-access Ethernet. (T/F)

True

A virtual circuit breaks a large amount of data into n packets. (T/F)

True

Every software company may create its own brand of user licenses and may name them something unique. (T/F)

True

In reality, a multitasking operating system runs only one program at a time. (T/F)

True

NetWare 6 was the last version of Novell's network operating system. (T/F)

True

SONET was designed to support multiple streams of voice channels. (T/F)

True

The bus/tree topology was the first physical design used when local area networks became commercially available in the late 1970s. (T/F)

True

The first routing algorithm used within the Internet was called a distance vector routing algorithm. (T/F)

True

When peer-to-peer networks first appeared roughly 30 years ago, they were serverless networks. (T/F)

True

With the CSMA/CD protocol, only one workstation at a time can transmit. (T/F)

True

Even after an application starts and is being executed, the application makes use of the operating system by making service requests through a defined _____.

application program interface (API)

A(n) ______ examines the destination address of a frame and either forwards or does not forward the frame, depending on some address information stored within the bridge.

filter

A(n) _____ is a large, complex program that can manage the common resources on most local area networks.

network operating system (NOS)

A(n) _____ is an object that is further composed of additional objects (examples of which include servers, printers, users, or groups of users).

organizational unit (OU)

A network limit, called the ____, can be placed on how many times any packet is copied. a.hop limit c.time to live b.hop count d.time to hop

A. hop limit

The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals. a.network c.print b.file d.operating system

A. network

With a system-based or ____ license, there is rarely a software counter controlling the current number of users. a.network server c.site b.interactive user d.corporate

A. network server

A(n) ____ sends messages to applications, an interactive user, or a system operator about the status of the current operation. a.operating system c.hub b.router d.switch

A. operating system

Depending on user requirements, a switch can interconnect two different types of CSMA/CD network segments: ____ segments and dedicated segments. a.shared c.local b.remote d.distributed

A. shared

A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository, or ____ server. a. file c.database b.printer d.application

A. File

____ is an intelligent system that authenticates users and includes a distributed database of information about every application, user, server, and resource on a network. a.NetWare Directory Services (NDS) c.LDAP b.Active Directory d.X.509

A. NetWare Directory Services (NDS)

____ software incorporates a fairly large number of network support tools. a.Network-monitoring c.Antispam b.Crash protection d.Backup

A. Network-monitoring

____ is a popular operating system that can be found on single-user workstations but primarily functions well on mainframe computers and network servers. a.Unix c.Windows Me b.Linux d.Windows 95

A. Unix

A ____ profile describes various characteristics about the connection, such as basic data transfer rates, basic burst rates, excess data transfer rates, and excess burst rates. a.bandwidth c.client b.server d.router

A. bandwidth

One of NetWare Version 3's main features is the ____. a.bindery c.X.509 b.LDAP d.iPrint

A. bindery

MANs are almost exclusively ____ networks, and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second. a.fiber-optic c.twisted-paired b.copper-wired d.coaxial-cabled

A. fiber-optic

____ was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today. a.Ethernet c.FDDI b.IBM Token Ring d.Wireless Ethernet

A. Ethernet


Set pelajaran terkait

Ch #14 Violence, Abuse, and Harassment

View Set

Mental Health Final Exam Review 325

View Set

Is Anything Wrong With This Picture?

View Set

The Fundamental Theorem of Algebra

View Set

Pharmacology II - RN Pharmacology Online Practice 2019 A

View Set