Unit 2 Exam - CIS 345

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

41. ISDN PRI uses ____ B channels and one 64-Kbps D channel. a. 10 c. 23 b. 12 d. 32

23

30. Which wireless networking standard is faster? a. 802.11a b. 802.11b c. 802.11g d. 802.11n

802.11n

27. Why is it a good idea to change your wireless router's password? a. so other people cannot change the router's settings b. so you won't forget it c. to make it the same as your login password d. the default password is most likely too complex

A

14. Which of the following wireless technologies boasts the highest maximum theoretical throughput? a. LTE b. HSPA+ c. 802.11g d. 802.11n

LTE

An IP address reserved for communicating from a node to itself is called: a. Loopback address b. Logical c. IP address d. MAC address

Loopback address

A number that uniquely identifies a network node is referred to as: a. MAC address c. IP address b. Loopback address d. Logical address

MAC address

______ WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points. a. Bus b. Star c. Mesh d. Tiered

Mesh

18. As the network manager for a small business, you have been asked to evaluate high-speed, packet-switched wireless data services that your company's users can use at their desks, in their cars, and at their homes within your metropolitan area. Which two of the following meet those criteria, and are therefore candidates for evaluation? a. 802.11g b. 802.11n c. WiMAX 2 d. HSPA+ e. LTE

WiMAX 2

____ area networks can cover large geographic distances, including the entire Earth. a. Personal b. Local c. Wide d. Universal

Wide

1000Base-SX has a maximum throughput of ____. a. 1 Gbps b. 10 Gbps c. 100 Gbps d. 1000 Gbps

1 Gbps

Which of the following is the type of 10-Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? r. 10GBase-T s. 10GBase-ER t. 10GBase-LR u. 10GBase-SR

10GBase-ER

Which of the following Ethernet standards is specially encoded for transmission over WANs using SONET technology? e. 100Base-T f. 10GBase-ER g. 100Base-FX h. 10GBase-SW

10GBase-SW

55. Which of the following is the type of 10-Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? a. 10GBase-T b. 10GBase-ER c. 10GBase-LR d. 10GBase-SR

10gbase-er

52. Which of the following Ethernet standards is specially encoded for transmission over WANs using SONET technology? a. 100Base-T b. 10GBase-ER c. 100Base-FX d. 10GBase-SW

10gbase-sw

7. What frequency band is used by 802.11b, 802.11g, and 802.11n? a. 1.5 GHz b. 2.4 GHz c. 5 GHz d. 11 GHz

2.4 ghz

8. Your office currently runs a mix of 802.11b and 802.11g clients. Rumor has it that your company is about to merge with another company that uses a different wireless technology. Which of the following would be compatible with what your WLAN currently runs? a. 802.11a b. 802.11n c. Bluetooth d. WiMAX

802.11n

17. Suppose you work for a telecommunications carrier who is looking into providing WiMAX in a suburb of a large city. A colleague suggests that your company reserve licensed frequencies from the FCC for your service. Why? a. Licensed frequencies will suffer less interference than unlicensed frequencies. b. Licensed frequencies allow users to roam farther than unlicensed frequencies. c. Licensed frequencies can use multiple areas of the wireless spectrum at once, thus increasing potential throughput. d. Licensed frequencies require less expensive equipment to transmit and receive than unlicensed frequencies.

A

50. On a 10Base-T network, which of the following best describes how the wires of a UTP cable are used to transmit and receive information? a. One wire pair handles data transmission, while another wire pair handles data reception. b. One wire in one pair handles data transmission, while the other wire in the same pair handles data reception. c. Three wires of two wire pairs handle both data transmission and reception, while the fourth wire acts as a ground. d. All four wires of two wire pairs handle both data transmission and reception.

A

51. What technique is used to achieve 1-Gbps throughput over a Cat 5 cable? a. All four wire pairs are used for both transmission and reception. b. The cable is encased in a special conduit to prevent signal degradation due to noise. c. Signals are issued as pulses of light, rather than pulses of electric current. d. Data is encapsulated by a unique type of frame that allows rapid data compression.

A

22. Which of the following are potential disadvantages of wireless LANs as compared with cabled LANs? a. Controlling access to a wireless LAN is more difficult. b. Issues such as the location of buildings and the weather can affect connectivity to a wireless LAN. c. The additional protocols required by wireless LANs create additional overhead. d. Signal strength can be affected by many sources of electronic noise.

A,B and D

2. Which of the following is not true about multipath signaling? a. The more obstacles a wireless signal reflects or diffracts off, the better chance it has of reaching its destination. b. Multipath signaling uses less energy and results in clearer reception than line-of-sight signaling. c. Given that they follow multiple paths to their destination, signals will arrive at the same destination at slightly different times. d. The more obstacles between a wireless transmitter and receiver, the more signal fading will occur.

B

25. Why is a wireless signal susceptible to noise? a. Wireless NICs are usually poorly made. b. Wireless transmissions cannot be shielded like transmissions along an Ethernet cable. c. Wireless NICs do not support the network protocols necessary for error correction. d. Wireless NICs rely on the upper levels of the OSI model for error correction.

B

6. Suppose a user on your office network has changed the channel on which his wireless NIC communicates. Assuming the wireless connection is his only access to the LAN, what will happen when he next tries to send an e-mail? a. The e-mail program will take longer than usual to send his message. b. The e-mail program will respond with a message indicating it could not connect to the mail server. c. The e-mail program will send the message without problems. d. The e-mail program will request the user to supply his logon credentials again before sending the message.

B

65. You are asked to configure a backbone switch that connects servers supplying weather data to mariners and pilots around the world. Your network's traffic load is very high at all times, day and night. What type of switching do you configure the switch to use? a. Bypass switching b. Store-and-forward switching c. Cut-through switching d. Message switching

B

What is an advantage of using a parallel backbone over a collapsed backbone? a. A collapsed backbone requires too many connecting devices. b. A parallel backbone uses redundant connections and is more reliable. c. A collapsed backbone uses redundant connections, which costs more money. d. A parallel backbone uses fewer redundant connections, which costs less money.

B

The ____ is the main telecommunications line through the network, connecting the major router sites across the country. a. star topology b. ARPANET c. mid-level network d. backbone

Backbone

Which of the following is a connectivity device that operates at the Data Link layer of the OSI model and reads header information to forward packets according to their MAC addresses? a. Bridge b. Buffering c. Dynamic routing d. Firewall

Bridge

When a node on a wide area network ____ network transmits its data, the data is received by all the other nodes. a. broadcast b. packet-switched c. circuit-switched d. datagram packet-switched

Broadcast

Which of the following refers to the transmission to all nodes on a network? a. Broadcast b. Peering c. Sequencing d. Encryption

Broadcast

21. In which of the following ways does a wireless LAN differ from an Ethernet LAN? a. A wireless LAN requires additional protocols in the TCP/IP suite. b. A wireless LAN uses completely different protocols than an Ethernet LAN. c. A wireless LAN uses different techniques at the Physical layer to transmit data. d. A wireless LAN uses different techniques at the Data Link layer to transmit frames.

C

24. You have been hired as a network consultant by the East Coast Savings bank. East Coast Savings would like to implement a wireless LAN, but with high standards of security. What sort of restrictions would you recommend placing on the wireless LAN? a. Wireless LAN users have the same access as users attached to the Ethernet network. b. Wireless LAN users may surf the Web, but may not access the rest of the bank's network. c. Wireless LAN users may surf the Web, but may not access the rest of the bank's network without special security software. d. Wireless LAN users must use their own wireless ISP.

C

4. Which of the following 802.11 transmission requirements contributes to its inefficiency? a. Before it can associate, a station must listen for an access point's beacon on every channel within its frequency range. b. A source node must regularly ping the access point to ensure it is still available for transmitting data to the rest of the stations. c. A destination node must issue an acknowledgment for every packet that is received intact. d. Before transmitting, a source node must check to ensure the access point has not changed its SSID.

C

70. What is a router's convergence time? a. The time a router takes to interpret Layer 2 addressing information for any given frame b. The maximum amount of time a router is allowed for choosing the best path c. The time it takes for a router to recognize a best path in the event of a change or network outage d. The time it takes for border routers to exchange routing table information

C

How do bridges keep track of whether they should forward or filter frames? a. From each frame they receive, they extract source addresses; those frames whose source addresses don't belong to the bridge's broadcast domain are filtered. b. They hold each frame until it is requested by the destination node, at which time the bridge forwards the data to the correct segment based on its MAC address. c. They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address. d. They compare the incoming frame's network address to known addresses on both segments and filter those that don't belong to either.

C

What is a router's convergence time? a. The time a router takes to interpret Layer 2 addressing information for any given frame b. The maximum amount of time a router is allowed for choosing the best path c. The time it takes for a router to recognize a best path in the event of a change or network outage d. The time it takes for border routers to exchange routing table information

C

Which of the following is a difference between a router and a hub? a. A router is less sophisticated than a hub. b. A router operates at the Transport layer of the OSI model, whereas a hub operates at the Data Link layer of the OSI model. c. A router operates at the Network layer of the OSI model, whereas a hub operates at the Physical layer of the OSI model. d. A router regenerates signals, whereas a hub interprets addressing information to ensure that data is directed to the proper destination.

C

All Ethernet networks, independent of their speed or frame type, use an access method called ____. a. CSMA b. CSMA/DC c. CSAM/CD d. CSMA/CD

CSMA/CD

A ____ network is the only network that offers a dedicated path. a. packet-switched b. broadcast c. virtual circuit d. circuit-switched

Circuit-switched

____ and virtual circuit networks require path setup time and cannot dynamically reroute packets should a network problem occur. a. Broadcast b. Wireless c. Circuit-switched d. Datagram

Circuit-switched

45. Which of the following backbone types will be down if the central router fails? a. Parallel backbone b. Collapsed backbone c. Distributed backbone d. Serial backbone

Collapsed backbone

The interval during which the signals propagate down the bus and back is the ____. a. exponential backoff b. collision window c. attenuation d. bounce window

Collision Window

On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time. a. collision domain b. crash domain c. interference domain d. broadcast domain

Collision domain

47. What happens in CSMA/CD when a node detects that its data has suffered a collision? a. It immediately retransmits the data. b. It signals to the other nodes that it is about to retransmit the data, and then does so. c. It waits for a random period of time before checking the network for activity, and then retransmits the data. D. It signals to the network that its data was damaged in a collision, waits a brief period of time before checking the network for activity, and then retransmits the data

D

67. Why is a large, busy network more likely to use dynamic routing? a. Because dynamic routing is the default option on most routers, and it is difficult to configure routers to use static routing b. Because dynamic routing is the only routing method compatible with the BGP routing protocol, which is necessary for routing between WANs c. Because dynamic routing allows for stricter IP filtering and, therefore, offers greater data security than static routing d. Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error

D

Which of the following is a method of routing that automatically calculates the best path between two nodes and accumulates this information in a routing table? a. Digital loop carrier b. Bus c. Dynamic routing d. Modular router

Dynamic routing

12. Which two of the following techniques help to reduce overhead in 802.11n wireless transmission? a. CSMA/CA b. Asynchronous communication c. Frame aggregation d. Spread-spectrum signaling e. Channel bonding

Frame aggregation and channel bonding

In cut-through switching, which frame field does the switch never read? a. Start frame delimiter b. Source address c. Frame check sequence d. Protocol type

Frame check sequence

42. ___ is an updated, digital version of X.25 that also relies on packet switching. a. DSL c. Frame relay b. ISDN d. ATM

Frame relay

A combination of networking hardware and software that connects two dissimilar kinds of networks, is known as: a. Expansion slot b. Bridge c. Bus d. Gateway

Gateway

43. Why is packet switching more efficient than circuit switching? e. In packet switching, packets are synchronized according to a timing mechanism in the switch. f. In packet switching, two communicating nodes establish a channel first, then begin transmitting, thus ensuring a reliable connection and eliminating the need to retransmit. g. In packet switching, small pieces of data are sent to an intermediate node and reassembled before being transmitted, en masse, to the destination node. h. In packet switching, packets can take the quickest route between nodes and arrive independently of when other packets in their data stream arrive.

H

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. a. hub b. switch c. router d. repeater

Hub

Which two of the following might cause excessive data collisions on an Ethernet network? i. A server on the network contains a faulty NIC. j. A router on the network is mistakenly forwarding packets to the wrong segment. k. The overall network length exceeds IEEE 802.3 standards for that network type. l. A switch on the network has established multiple circuits for a single path between two nodes. m. The network attempts to use two incompatible frame types.

I and K

46. You are part of a team of engineers who work for an ISP that connects large data centers, telephone companies, and their customers throughout California and Oregon. Management has decided that the company can make large profits by promising the utmost QoS to certain high-profile customers. Which of the following switching methods will best guarantee the promised QoS? a. Circuit switching b. MPLS c. Packet switching d. Message switching

MPLS

40. ____ lets a router represent an entire local area network to the Internet as a single IP address. a. ICMP c. ARP b. NAT d. UDP

NAT

Which of the following factors is not considered when OSPF determines the best path for a packet? a. Link failure b. Number of hops c. Throughput d. Latency

Number of hops

If you are purchasing a new desktop computer today, which expansion board NIC would provide the highest transmission rate? a. PCI b. Firewire c. PCIe d. ISA

PCIe

44. Which of the following backbone types is the most fault-tolerant? a. Parallel backbone b. Collapsed backbone c. Distributed backbone d. Serial backbone

Parallel backbone

WANs typically send data over ____ available communications networks. a. privately b. publicly c. individually d. serially

Privately

11. When a mobile WLAN user roams from access point A's range into access point B's range, what does it do automatically to maintain network connectivity? a. Associate with access point B in order to communicate with access point A b. Reassociate with access point B c. Reestablish its connection with access point A on another channel d. Nothing; the user must reestablish network connectivity manually

Reassociate with access point B

In a ring network, each workstation acts as a(n) ____ for the transmission. a. repeater c. terminator b. amplifier d. manager

Repeater

The SONET network topology is a ____. a. star b. ring c. bus d. star-bus

Ring

The ____ is used to connect local area networks to wide area networks. a. hub b. repeater c. router d. bridge

Router

You are asked to configure a backbone switch that connects servers supplying weather data to mariners and pilots around the world. Your network's traffic load is very high at all times, day and night. What type of switching do you configure the switch to use? a. Bypass switching b. Store-and-forward switching c. Cut-through switching d. Message switching

Store-and-forward switching

The primary goal of a(n) ____ is to isolate a particular pattern of traffic from other patterns of traffic or from the remainder of the network. a. hub b. switch c. repeater d. amplifier

Switch

Which of the following distinguishes switches from repeating devices, such as hubs? a. Switches separate collision domains. b. Switches separate broadcast domains. c. Switches can alert the network administrator to high data collision rates. d. Switches do not examine Network layer protocol information, which makes them faster than repeating devices.

Switches separate collision domains.

____ cabling has become the preferred medium for star-wired bus topologies. a. Twisted pair b. Coaxial c. Fiber-optic d. FDDI

Twisted pair

In which of the following examples do the workstations necessarily share a collision domain? n. Two computers connected to the same hub o. Two computers connected to the same switch p. Two computers connected to the same router q. Two computers connected to the same access server

Two computers connected to the same hub

49. You are designing a 100Base-T network to connect groups of workstations in two different offices in your building. The offices are approximately 250 meters apart. If you only use repeating devices to connect the workstation groups, how many hubs will you need? aa. One bb. Two cc. Three dd. Four

Two or Three

60. If the on-board NIC on your office laptop stops working, and you are connected to a 1-Gigabit Ethernet wired network, which type of NIC connector replacement would provide best performance? e. Firewire f. The Best Wireless Adapter g. PCMCI h. USB Version 3

USB version 3

If the on-board NIC on your office laptop stops working, and you are connected to a 1-Gigabit Ethernet network, which type of NIC connector replacement would provide best performance? a. USB b. Firewire c. PCMCI d. USB Version 3

USB version 3

41. A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. a. NAT network c. DHCP b. TCP network d. virtual private network (VPN)

VPN

39. _________________ are connections between network nodes that, although based on potentially disparate physical links, logically appear to be direct, dedicated links between those nodes. a. Packet Switches c. ETM switches b. Virtual Private Switches d. Virtual circuits

Virtual circuits

48. The maximum segment length for a 1000Base-FX network depends on which two of the following? a. Voltage b. Wavelength c. Frame type d. Priority labeling e. Fiber core diameter f.

Wavelength and Fiber core Diameter

The maximum segment length for a 1000Base-FX network depends on which two of the following? v. Voltage w. Wavelength x. Frame type y. Priority labeling z. Fiber core diameter

Wavelength and Fiber core diameter

53. Which two of the following might cause excessive data collisions on an Ethernet network? a. A server on the network contains a faulty NIC. b. A router on the network is mistakenly forwarding packets to the wrong segment. c. The overall network length exceeds IEEE 802.3 standards for that network type. d. A switch on the network has established multiple circuits for a single path between two nodes. e. The network attempts to use two incompatible frame types.

a and c

9. If your wireless stations are configured to perform passive scanning, what do they need from an access point to initiate association? a. A request to send b. An alert frame c. A beacon frame d. Nothing; they will find the access point on their own

a beacon frame

23. How is a wireless NIC different from a NIC that requires a cable? a. A wireless NIC contains an antenna. b. A wireless NIC contains a chip, which does additional processing at higher levels of the OSI model. c. A wireless NIC requires an external power source. d. A wireless NIC requires an external antenna.

a wireless NIC contains an antenna

13. Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal? a. The optimal quantity and locations of access points for the WLAN b. All potential sources of EMI c. The distance between each workgroup area and telco room d. All of the above

all the above

66. Which of the following routing protocols is used on the Internet's backbone? a. EIGRP b. OSPF c. BGP d. RIP

bgp

15. Which of the following will help an access point's transmissions reach farther? a. Limiting the number of stations that may associate with the access point b. Boosting its signal strength c. Using the highest possible channel in the frequency band d. Configuring it to use 802.11n only

boosting its signal strength

42 What is the minimum cabling standard required for 10GBase-T Ethernet? a. MMF b. Cat 3 c. Cat 5 d. Cat 6

cat 6

5. In the 802.11 standard, IEEE specifies what type of access method? a. Beacon passing b. Demand priority c. CSMA/CD d. CSMA/CA

csma/ca

38. SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable. a. throughput c. fault tolerance b. low cost d. latency

fault tolerance

43. What sets ATM apart from Ethernet is its ____ size. a. channel c. variable packet size b. frame d. fixed packet size

fixed packet size

72. Which of the following WAN topologies comes with the highest availability and the greatest cost? a. Bus b. Tiered c. Partial mesh d. Full mesh

full mesh

20. Which of the following types of satellites is used to provide satellite data services? a. Geosynchronous orbit b. Low Earth orbit c. Medium Earth orbit d. High Earth orbit

geosynchronous orbit

3. You are setting up a WLAN for an insurance agency. The network includes 32 clients, three printers, two servers, and a DSL modem for Internet connectivity. What type of WLAN architecture would best suit this office? a. Ad hoc b. Interstitial c. Infrastructure d. Round robin

infrastructure

68. A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device? a. It is returned to the node that originally transmitted it. b. It is encapsulated by the routing protocol and retransmitted. c. It is forwarded to its destination by the last device. d. It is discarded.

it is discarded

71 Which of the following elements of the PSTN is most likely capable of transmitting only analog signals? a. Central office b. Local loop c. CSU/DSU d. Remote switching facility

local loop

61. You are working on a 100Base-T network. A coworker has been having trouble logging on to the server and asks whether you can quickly tell her if her workstation's NIC is operating properly. You do not have the NIC's utility disk, but you look at the back of her workstation and learn that although the NIC is properly installed and connected to the network, something's wrong with it. What might you have seen that causes you to come to this conclusion? a. Its activity LED is blinking green. b. Its loopback plug is improperly terminated. c. It has two types of receptacles—SC and RJ-45—and the wrong one is in use. d. None of its LEDs are lit.

none of its less are lit

69. Which of the following factors is not considered when OSPF determines the best path for a packet? a. Link failure b. Number of hops c. Throughput d. Latency

number of hops

1. To transmit and receive signals to and from multiple nodes in a three-story office building, what type of antenna should an access point use? a. Omnidirectional b. Unidirectional c. Bidirectional d. Tri-directional

omnidirectional

29. What type of connection is used to attach a laptop to the network port on a wireless router? e. none, its wireless f. USB g. serial h. patch cable

patch cable

56. If you are purchasing a new desktop computer today, which expansion board NIC would provide the highest transmission rate? a. PCI b. Firewire c. PCIe d. ISA

pcie

16. What part of a cellular network manages handoff? a. The client b. The base station c. The MSC d. The central office

the base station

10. You're working on a school district's 802.11n WLAN. Within each school, several access points serve students, teachers, and administrators. So that users can move about the school with their laptops and not lose network connectivity, each of the access points must share which of the following? a. The same ESSID b. The same make and model c. The same average distance to the client d. The same location

the same essid

26. How is a wireless router's configuration utility usually accessed? a. by flashing the RAM BIOS b. through a Web browser c. with the Windows Cfrtr utility d. from the command line

through a web browser

54. In which of the following examples do the workstations necessarily share a collision domain? a. Two computers connected to the same hub b. Two computers connected to the same switch c. Two computers connected to the same router d. Two computers connected to the same access server

two computers connected to the same hub

The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium. a. coaxial b. twisted pair c. fiber d. atmosphere

Twisted pair

The ____ topology consists of a simple cable, or bus, to which all devices attach. a. bus/tree b. token ring c. ring star d. star

bus/tree


Set pelajaran terkait

Google Analytics for beginner's quiz

View Set

Chapter 9- Motivation, Performance, and Effectiveness

View Set

WSO Finance, Accounting, and Valuation

View Set

Chapter 14 - Organizational Culture

View Set

ITP 258 System Development Project Mid Term

View Set

Board review embriology questions

View Set