Networking Ch 5&6

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If the network is experiencing a high amount of traffic, the chances of collision are small. True False

F

It is not possible to create a Windows Server network with multiple domains. True False

F

Most switches are transparent, which means they learn by themselves. True False

F

Shortly after its introduction, the Unix software was rewritten in the popular C++ programming language. True False

F

IEEE created the 100-Mbps Ethernet 802.3u protocol, also called ____ Ethernet. Fast Gigabit Terabit FDDI

Fast

With a system-based or ____ license, there is rarely a software counter controlling the current number of users. server interactive user site corporate

server

A ____has one primary function: direct the data frame to only the addressed receiver. hub port switch filter

switch

When a software package is sold, it is usually intended for a particular type of installation, referred to as the ____. software compatibility copyright user license hardware imprint

user license

Active Directory is part of the ____ OS. Unix Windows Server Linux FreeBSD

Windows Server

A hub is designed to perform much faster than a switch. True False

f

It is called ____ the kind of storage where there is a high cost per stored byte and low cost per data access. cold storage coarse storage hot storage fine-grain storage

hot storage

The local area network software called a(n) ____ server provides workstations with the authorization to access a particular printer, accepts and queues prints jobs, prints cover sheets, and allows users access to the job queue for routine administrative functions. application database file print

print

____ was a system designed for twisted-pair wiring, but with only a 100 Mbps data transfer rate for 100 meters. 10Base-T 100Base-T 100Base-TX 100Base-FX

100Base-FX

The ____ standard is an early and extremely popular 802.3 standard. 1GBase-T 10Base-T 1GBase-R 100Base-TX

10Base-T

Because of collisions, busy CSMA/CD networks rarely exceeded ____ percent throughput. 10 40 50 80

40

The ____ standard defines the Spanning Tree Protocol (STP). 802.3u 802.1s 802.1Q 802.1D

802.1D

____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive. Anti-spam Anti-spyware Crash protection Anti-malware

Anti-spyware

____ instance is a VM hosted on one of AWS's servers. EBS E3 S3 EC2

EC2

"Global configuration" is the default mode for CLI commands in a Cisco IOS. True False

F

The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. True False

F

The application development process that breaks an application into smaller components is called deduplication. True False

F

The local area network first appeared in the 1950s. True False

F

The most popular example of a contention-based protocol among wired LANs is the token-passing protocol. True False

F

The IEEE 802.3z standards are also known as ____ Ethernet. Switch Fast Gigabit Terabit

Gigabit

The ____ standard was designed to allow multiple devices to work together to create a virtual LAN. IEEE 802.1Q IEEE 802.3u IEEE 802.2v IEEE 802.3f

IEEE 802.1Q

After watching traffic for a while, a switch has a table of device addresses that shows which ____ address is connected to each of the switch's ports. IP TCP MAC LLC

MAC

A(n) ____ is a large, complex program that can manage resources commonly found on most LANs. API GUI NOS RAID

NOS

____ is a more cloud-native storage infrastructure than file systems and block storage. Elastic storage Auto-scaling Microsoft AD Object storage

Object storage

____ technique is also known as disk mirroring. RAID 0 RAID 1 RAID 3 RAID 5

RAID 1

____ is similar in concept to software-defined networking since it abstracts the control of storage management away from the physical or virtual disks storing the data. SDN SDS SD-branch SD-WAN

SDS

1000Base-SX was the first Gigabit Ethernet standard. True False

T

AWS and GCP are examples of CSP. True False

T

Latency is one of the measurable factors for cloud storage optimization. True False

T

Link aggregation allows you to combine two or more data paths, or links, into one higher-speed link. True False

T

Linux shares many of the same advantages and disadvantages as Unix. True False

T

SD-branch technology is one of the possible instances of SDN. True False

T

While early LANs transmitted data at perhaps 10 million bits per second, the newest LANs can transmit data at 10 billion bits per second and higher. True False

T

A network operating system needs a host machine from which to operate. True False

True

____ runs directly on the host system's hardware and does not require an underlying OS. Type 1 hypervisor Type 2 hypervisor Type 3 hypervisor Type 4 hypervisor

Type 1 hypervisor

One of the greatest advantages of ____ is the efficient use of resources, as many servers can run on a single physical machine. OSs NOSs Virtualization RAIDs

Virtualization

____ software is the application or set of programs that stores Web pages and allows browsers from anywhere in the world to access those Web pages. Remote access Network monitoring Web server Antivirus

Web server

The most popular contention-based protocol for wired LANs is ____. token ring round-robin carrier sense multiple access with collision avoidance (CSMA/CA) carrier sense multiple access with collision detection (CSMA/CD)

carrier sense multiple access with collision detection (CSMA/CD)

A(n) ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites. site network server corporate single-user-single-station

corporate

Many network admins, even those most committed to the advantages of virtualization, are uncomfortable using a virtual ____. load balancer machine firewall storage

firewall

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. hub switch router repeater

hub

It is possible to use a(n) ____ to run an Android VM in a computer that functions just like a real Android device. firewall webserver cloud service hypervisor

hypervisor

In the directory service AD, the ____ can be objects, like users, groups of users, computers, applications, and network devices. forest tree domain leaves

leaves

The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information. medium access control (MAC) physical access control (PAC) medium physical control (MPC) Correct! logical link control (LLC)

logical link control (LLC)

RSTP stands for ____ spanning tree protocol. rapid recurrent repeated reconfigurable

rapid

The ____ is used to connect local area networks to wide area networks. hub repeater router bridge

router

Under the terms of the ____ license, the software package may be installed on a single machine, and then only a single user at one time may be using that machine. interactive user single-user-single-station site network server

single-user-single-station

A modern-day topology that uses a more advanced central connection device called a switch has both the physical and logical topologies ____ shaped. bus ring star tree

star

The LAN topology that has the devices connected by a single hub is called ____ topology. bus star-wired bus bus wired tree star

star-wired bus

In a bus topology, connecting to the cable requires a simple device called a(n) ____. hub router tap echo suppressor

tap

One pricing strategy offered by AWS is BYOL. True False

T

Early local area networks transmitted data at only ____ million bits per second. 1 10 100 1000

10


Set pelajaran terkait

Lesson 4: Psychosocial Integrity

View Set

Ch. 12 - High Risk Prenatal Care

View Set

Driving- Chapter 3: Learning to Drive

View Set

Chapter 8 Assessment Techniques and Safety in the Clinical Setting

View Set

Supply Chain Management Capstone- SCM4350

View Set

351 Promulgated Contract Forms - Lesson 9

View Set