9, 10

Ace your homework & exams now with Quizwiz!

1) A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

A

11) Which of the following is a private IP address range? A) 10.x.x.x B) 128.171.x.x C) both A and B D) neither A nor B

A

19) The highest-level DNS servers are called ________. A) root servers B) top-level servers C) both A and B D) neither A nor B

A

46) Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP

A

47) The IEEE calls 64-bit interface addresses ________. A) Extended Unique Identifiers B) Interface IDs C) MAC addresses D) half-IP

A

49) Dynamic ________ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) none of the above

A

5) A company has more control over its ________ technology. A) LAN B) WAN

A

50) A company is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) both A and B D) neither A nor B

A

52) In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B

A

52) ________ is an interior dynamic routing protocol. A) OSPF B) BGP C) both A and B D) neither A nor B

A

55) MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces

A

55) To see if a target host can be reached, you normally would send it an ICMP ________ message. A) echo request B) error advisement C) either A or B D) neither A nor B

A

56) Pinging is to send ICMP ________ messages to the target host. A) echo request B) error advisement C) ping D) echo

A

59) MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on

A

61) WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier D) by the ISP

A

63) In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B

A

68) Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

A

70) SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B

A

71) In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager

A

73) Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

A

8) Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.

A

9) NAT enhances security by ________. A) preventing sniffers from learning internal IP addresses B) encryption C) both A and B D) neither A nor B

A

11) The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

B

12) Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B

B

14) Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B

B

14) ________ is a general naming system for the Internet. A) NAT B) DNS C) DHCP D) Dotted decimal notation

B

15) How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.

B

16) ".com" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above

B

17) ".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above

B

18) Most corporations wish to have ________ domain names. A) top-level B) second-level C) third-level D) none of the above

B

20) DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B

B

22) In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) object D) access point

B

22) Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) none of the above

B

24) In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B

B

25) In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) trap D) request

B

28) IPsec protects ________ layer messages. A) data link B) application C) both A and B D) neither A nor B

B

29) In tunnel mode, IPsec provides protection ________. A) all the way between the two hosts B) only between the IPsec servers C) both A and B D) neither A nor B

B

30) Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B

B

33) The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________. A) that it provides protection over only part of the route B) higher cost C) both A and B D) neither A nor B

B

34) In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier

B

39) Which has stronger security? A) SSL/TLS B) IPsec C) Both have about equal security.

B

40) If a host is to be able to communicate via IPv4 and IPv6, it is said to ________. A) be bilingual B) have a dual-stack C) be IPv6-ready D) be IP-agile

B

41) Today, it can be problematic to have only a single IPv6 stack because ________. A) a single IPv4 stack is out of date B) a single IPv6 stack could not communicate with a single IPv4 stack C) a dual stack has become a common solution D) all of the above

B

44) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits B) 32 bits C) 64 bits D) none of the above

B

44) T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps

B

45) The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) none of the above

B

45) To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line

B

46) In an IPv6 global unicast address, the interface ID is ________ bits long. A) 32 B) 64 C) 128 D) It varies.

B

47) Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B

B

48) Which of the following DSL services usually offers QoS guarantees? A) residential B) business C) both A and B D) neither A nor B

B

23) Which of the following would be an SNMP object? A) number of rows in routing table B) a managed switch C) both A and B D) neither A nor B

A

51) The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.

B

51) Which of the following can route non-IP packets? A) OSPF B) EIGRP C) both A and B D) neither A nor B

B

54) In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above

B

57) In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B

B

58) MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B

B

66) The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B

B

25) For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B D) neither A nor B

A

26) SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) all of the above

A

26) The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B

A

7) Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies.

B

7) ________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) none of the above

B

72) A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above

B

74) OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

B

8) In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host

B

27) Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) both A and B D) neither A nor B

A

37) Which of the following standards permits central management? A) IPsec B) SSL/TLS C) both A and B D) neither A nor B

A

38) Which is less expensive to implement? A) SSL/TLS B) IPsec C) Both cost about the same to implement.

A

4) Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) both A and B D) neither A nor B

A

40) Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above

A

41) Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B

A

43) A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface

A

43) The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) both A and B

A

10) WANs are ________. A) single networks B) internets C) either A or B D) neither A nor B

C

10) Which of the following can be used within a firm? A) private IP addresses B) public IP addresses C) both A and B D) neither A nor B

C

12) Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) both A and B D) neither A nor B

C

13) The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B

C

13) Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B

C

18) The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop

C

19) DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B

C

2) A LAN is the network that ________. A) links different sites together B) provides service within a company C) provides service within a site D) all of the above

C

2) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) none of the above

C

21) A company receives its domain name from ________. A) IETF B) its ISP C) a domain registrar D) its parents

C

21) What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) all of the above

C

23) In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B

C

24) Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both A and B D) neither A nor B

C

27) SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) all of the above

C

28) For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP

C

48) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000

C

49) A firm uses a PSDN. It has four sites. How many leased lines will it need? A) 0 B) 1 C) 4 D) none of the above

C

50) In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs

C

53) Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B

C

56) In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path

C

6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 14 B) 16 C) 254 D) none of the above

C

62) WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B

C

64) Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B

C

67) Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

C

69) SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B

C

9) LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B

C

29) In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B

D

36) In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations

D

4) Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? A) 5 B) 6 C) 7 D) 8

D

5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have per subnet? A) 126 B) 254 C) 534 D) 65,534

D

53) ________ is used for supervisory messages at the internet layer. A) TCP B) DNS C) DHCP D) ICMP

D

54) IP is reliable because of ________. A) echo and echo reply messages B) error advisement messages C) both A and B D) neither A nor B

D

6) LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons

D

60) Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above

D

65) The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications

D

3) A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above

A

3) If you have a subnet part of 7 bits, how many subnets can you have? A) 126 B) 254 C) 510 D) none of the above

A

30) IPsec provides protection in two modes of operation one of these two modes is ________. A) transport mode B) data link mode C) network mode D) 802.1X mode

A

31) Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive

A

31) The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. A) protection over only part of the route B) higher cost C) both A and B D) neither A nor B

A

32) Which mode of IPsec may be more expensive if a company has a large number of computers? A) transport mode B) tunnel mode C) Both A and B are equally expensive.

A

33) In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B

A

34) Client PCs must have digital certificates in ________. A) transport mode B) tunnel mode C) both A and B D) neither A nor B

A

36) Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above

A

37) Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO

A

32) Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B

C

35) An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B

C

35) IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) both A and B D) neither A nor B

C

38) What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps

C

39) Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B

C

42) To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem

C

42) Which is NOT one of the three parts of a public IPv6 unicast address? A) subnet ID B) routing prefix C) host part D) All of the above are parts in a public IPv6 unicast address.

C

1) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) 254

D

15) In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain

D

16) In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop

D

17) Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5

D

20) How many DNS root servers are there? A) 1 B) 2 C) 10 D) 13

D


Related study sets

Psych 2314 Ch. 4-Promoting Health and Wellness, Life Span Development A Topical Approach: CH 4 - Health & Wellness

View Set

Civics Chapter 13 (powerpoint, guided reading, and quiz packet)

View Set

Intro to Financial Management- Accounting Exam 2

View Set

BUS 106 Chapter 7 Questions and Problems

View Set

Adult 1: Exam 2 practice questions

View Set

CH. 04: Network Protocols and Routing

View Set

Chapter 14: Agricultural Entomology

View Set

AUDITORY SYSTEM AND TEMPORAL LOBE FUNCTION

View Set