IT Test 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A(n) ________ address is the address that external entities use when communicating with your network. A) ALU B) WAP C) MAC D) IP

MAC

A large network designed to provide access to a specific geographic area, such as a large city, is a ________. A) PAN B) MAN C) LAN D) HAN

MAN

A ________ uses the Internet communications infrastructure to build a secure and private network. A) HAN B) VPN C) WAN D) PAN

VPN

On a network, a(n) ________ helps prevent data packets from colliding with each other. A) adapter B) switch C) router D) access point

switch

Which of the following was created for the transfer of hypertext documents across the Internet? A) SSL B) FTP C) AJAX D) HTTP

HTTP

The ________ is responsible for the Internet's domain name system and the allocation of IP addresses. A) IAB B) ISOC C) W3C D) ICANN

ICANN

A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet. A) SMTP B) NetBIOS C) TCP D) IP

IP

The physical address assigned to each network adapter is called its ________ address. A) network access control (NAC) B) physical address control (PAC) C) network physical address (NPA) D) media access control (MAC)

Media access control (MAC)

Which protocol is used when sending files as attachments by e-mail? A) JavaScript Object Notation (JSON) B) Post Office Protocol (POP) C) User Datagram Protocol (UDP) D) Multipurpose Internet Mail Extensions (MIME)

Multipurpose Internet Mail Extensions (MIME)

A(n) ________ device facilitates file sharing and data backup. A) WAN B) NOS C) UTP D) NAS

NAS

Which of the following refers to the name of your wireless network? A) HTML B) SSID C) WEP D) WPA

SSID

The main suite of protocols used for transmitting data on the Internet is ________. A) SMTP B) TCP/IP C) FTP D) POP

TCP/IP

________ describes the website content in terms of the data that is being described rather than how it is to be displayed. A) CGI B) JavaScript C) XML D) HTML

XML

In public-key encryption, the two keys, one for coding and one for decoding, are known as ________. A) a key pair B) linked keys C) key tags D) code keys

a key pair

A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer. A) JavaScript B) applet C) SSL D) CGI script

applet

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. A) dedicated B) application C) file D) authentication

authentication

The main path of the Internet along which data travels the fastest is known as the Internet ________. A) cache B) highway C) backbone D) protocol

backbone

________ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A) Infusion B) Bandwidth C) Data capacity D) Scalability

bandwidth

A ________ sends data from one collision domain to another. A) bridge B) router C) link D) switch

bridge

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable. A) hierarchical B) star C) cluster D) bus

bus

Which of the following is not a major factor to consider when selecting network cabling? A) Bandwidth B) Maximum run length C) Cable diameter D) Interference

cable diameter

A client/server network is an example of ________ administration. A) wide area B) local C) central D) remote

central

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. A) An open circuit B) Circuit switching C) A closed circuit D) Packet switching

circuit switching

You can find out which network adapters are installed in your system by using the Windows ________ Manager utility. A) Device B) Setup C) Hardware D) Network

device

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. A) assigned B) dynamic C) transition D) static

dynamic

________ is the standard communications protocol used on most client/server networks. A) NOS B) Ethernet C) VPN D) Mac

ethernet

________ cable is not subject to electromagnetic interference or radio frequency interference. A) Twisted-pair B) Coaxial C) Polycarbonate D) Fiber-optic

fiber-optic

Which transmission medium transmits data the fastest? A) Fiber-optic cable B) Coaxial cable C) Twisted-pair cable D) Wireless

fiber-optic cable

A(n) ________ server is a server that stores and manages files for network users. A) file B) authentication C) e-mail D) print

file

The current standard for wired Ethernet networks is IEEE 802.3, also known as ________ Ethernet. A) gigabit B) megabyte C) gigabyte D) megabit

gigabit

A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent? A) dotted quad B) binary digit C) hexadecimal digit D) decimal digit

hexadecimal digit

Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________. A) information assurance B) data integrity C) referential integrity D) multi-factor authentication

information assurance

________ permits two or more people to communicate over the Internet in real time. A) Flickr B) E-mail C) Snapfish D) Instant messaging

instant messaging

A peer-to-peer (P2P) network is an example of ________ administration. A) local B) central C) corporate D) wide area

local

Routers and switches are example of network ________ devices. A) provider B) storage C) navigation D) access

navigation

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. A) network B) switch C) node D) broadband

network

Client/server networks are controlled by a central server that runs specialized software called a(n) ________. A) network operating system (NOS) B) central operating system (COS) C) central server operating system (CCOS) D) multipersonnel operating system (MPOS)

network operating system (NOS)

IPv6 was introduced when IPv4 ________. A) was revoked B) no longer had enough unique addresses C) became too old D) was eliminated

no longer had enough unique addresses

A ________ is any device connected to a network such as a computer, printer, or game console. A) NIC B) node C) NOS D) packet

node

________ is the communications methodology where data are broken into smaller chunks to be sent over various routes at the same time.

packet switching

Data are sent through a network in bundles called ________. A) packets B) pouches C) packages D) nodes

packets

To transfer data packets between two networks, a ________ is used. A) hub B) router C) firewall D) switch

router

A print server uses a print ________ as a software holding area for jobs waiting to be printed. A) stack B) logger C) spooler D) heap

spooler

Which of the following is the most commonly used client/server network topology? A) Cluster B) Ring C) Hierarchical D) Star

star

An IP address that does not change and is usually assigned manually by a network administrator or an ISP is called a ________ address. A) stationary B) static C) dynamic D) fixed

static

The network architecture that spans the largest physical distance is called a ________. A) HAN B) WAN C) PAN D) LAN

wan

If you want to access your home network from your distant garage, a ________ might help boost the signal. A) router B) switch C) wireless range extender D) wireless access point

wireless range extender

Strong encryption now requires ________-bit keys. A) 512 B) 40 C) 128 D) 256

256

Which generation of wireless data is being rolled out as the latest mobile data service and also as a home Internet service? A) 6th B) 5th C) 4th D) 3rd

5th

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server. A) DNS B) URL C) XML D) FTP

DNS

Which of the following would not be considered a possessed object? A) driver's license B) password C) smart keys D) key cards

passwords

In a ________ network, each node connected to the network communicates directly with every other node. A) router B) bridge C) client/server D) peer-to-peer

peer-to-peer

Individual Internet users connect to ISPs through a(n) ________. A) T line B) optical carrier (OC) line C) User Datagram Protocol (UDP) D) point of presence (POP)

point of presence (POP)

A network ________ is a set of rules for how information and communications are exchanged. A) packet B) frame C) token D) protocol

protocol

Wireless network devices use ________ to communicate with each other. A) DSL B) radio waves C) fiber optics D) microwaves

radio waves

A ________ sends information between two networks. A) router B) repeater C) bridge D) switch

router

Which of the following information is not contained in a packet sent over the Internet? A) The size (in bytes) of the packet B) The data that are transmitted C) The address from where the packet originates D) The address to which the packet is sent

the size (in bytes) of the packet

________ is the actual speed of data transfer that is achieved between two nodes on a network. A) Benchmark B) Throughput C) Broadband D) LAN speed Question 71 / 1 point

throughout

Ring networks use the ________ method to avoid data collisions. A) active-check B) packet screening C) token D) passive-check

token

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device? A) scalability B) authentication C) tunneling D) virtualization

virtualization


Set pelajaran terkait

Chem I Lesson 12 - Thermodynamics, Entropy, Gibbs Free Energy, and Le Chatlier's Principle

View Set

ACC-590 Practice Exam 1, ACC-590 Chapter 3 Textbook MC, ACC-590 Chapter 2 Textbook MC, ACC-590 Chapter 1 Textbook MC, ACC-590 Quizzes 1-6

View Set

Topic Two, Lesson Five: Benefits of Free Enterprise-Economics

View Set

Chapter 3: Networking Connectors and Wiring Standards

View Set

APGoPo Judiciary and Unit 3: Civil Liberties and Civil Rights

View Set