Computer Science 108

Ace your homework & exams now with Quizwiz!

In dotted decimal, which network numbering segment is reserved for loopback? 0.x.x.x 192.168.x.x 172.x.x.x 127.x.x.x

127.x.x.x

What range of addresses can be issued to a class C network? 192.0.0.0-223.255.255.255 0.0.0.0-255.255.255.255 172.10.0.0-191.255.255.255 10.0.0.0-126.0.0.0

192.0.0.0-223.255.255.255

Which of these statements is NOT true about a NIC? It is often built into a computer's motherboard. A NIC only allows for either a wired or wireless connection, not both. An Ethernet connection is the most common. Another term for it is LAN adapter.

A NIC only allows for either a wired or wireless connection, not both.

If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement? DLP DDoS protection IPS/IDS Web content filter

DLP (Data loss prevention software)

All of the following are protocols of the Data Link Layer except ____. Unrestricted Simplex Protocol High-Level Data Link Control (HDLC) HTTP (HyperText Transfer Protocol) Collision-Free Protocols

HTTP (HyperText Transfer Protocol)

In a _____ topology network, all the devices are connected back to a central hub or switch. mesh bus star logical

star

The tree network topology is a special type of _____ topology. star bus hybrid ring star bus mesh

star bus hybrid

A VLAN is created by multiple _____ that forwards all network traffic to other locations. switches routers modems All of these answers are correct.

switches

Which of the following statements about a VLAN environment is TRUE? Access link connections can handle multiple VLAN connections Trunking is the ability for a port to curtail the number of broadcast packets A LAN is a logical setup of a VLAN within a network system Computers or nodes by default are not VLAN aware

Computers or nodes by default are not VLAN aware

Which of the following statements is true? Authoritative name servers respond to queries from recursive name servers Local DNS cache respond to queries from root servers Recursive name servers respond to queries from authoritative servers Recursive name servers respond to queries from TLD name servers

Authoritative name servers respond to queries from recursive name servers

Which of the following is NOT an element of access in regards to network security? Availability Authentication Authorization Accounting

Availability

What is one of the major differences between a DSL network and a cable network? DSL only worked well if the modem was close to the main service area, cable does not have such restrictions. DSL was more expensive to implement than cable. DSL is more stable and reliable than cable. All of these answers are correct.

DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.

Which QoS model is the most widely used one today? IntServ DiffServ Best-Effort None of these

DiffServ

Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources? EPN MAN PAN WAN

EPN

Which of the following is the most accurate description of clients in client/server architecture? Hardware devices which provide end users with access to data and services on the server All devices connected to a network Desktop computers with a wired connection and laptop computers with a wireless connection Computers connected to a network used for downloading data from a server

Hardware devices which provide end users with access to data and services on the server

Which arm of the International Telecommunications Union (ITU) is responsible for telecommunication operations internationally? ITU-D ITU-R ITU-S ITU-T

ITU-T

Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi? Access Point Wireless card Integrated Wi-Fi Hotspot

Integrated Wi-Fi

What does DHCP do for computer nodes? It produces numbers and stores them for future use. It issues numeric IP addresses to nodes that request them. It changes the numeric addresses into names for easier identification. None of these.

It issues numeric IP addresses to nodes that request them.

Which of the following connectors are also used with multimode and single-mode fiber optic cables for accessing gigabit ethernet? MT-RJ Fiber LC RJ-11 RJ-45

MT-RJ

Which network topology would be used to directly connect every computer in an office to every other computer in the office, using a one-to-one cabling method? Mesh Star Bus Tree Ring

Mesh

SSH client and server utilities are found on most operating systems by default, except _____. Linux MAC OS X Microsoft Windows Unix

Microsoft Windows

What makes Mosh an alternative to SSH? Mosh is more secure than SSH. Mosh can reconnect if a wireless connection gets interrupted. Mosh is faster than SSH. Mosh is easier to set up than SSH.

Mosh can reconnect if a wireless connection gets interrupted.

Which of the following is NOT one of the core elements of network security? Integrity Privacy Availability Confidentiality

Privacy

Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications? RIP RTP RTCP REP

RTP

Which acronym refers to the network name that your router broadcasts so you can find it? TKIP WPA SSID WEP

SSID

Non-repudiation means putting measures in place to assure something cannot be denied. Which of these is a simplified method of non-repudiation? Sending a link via social media Sending a letter through certified mail Attaching a document to an email Delivering a document to a home address

Sending a letter through certified mail

When it comes to home networks, how is the primary IP address generated for all devices? The router brand you have gives you a unique address. The ISP assigns a static address to the location, which is translated through a NAT. The modem generates one by default. All of these answers are correct.

The ISP assigns a static address to the location, which is translated through a NAT.

Which network topology uses concentration routers to interconnect star network WANs? Bus topology Ring topology Mesh topology Tiered topology

Tiered topology

What are WLAN Protocols? WLAN Protocols are network protocols which govern data transmissions over wireless connectivity. WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN). WLAN Protocols are network protocols which govern data transmissions over wide area connectivity. WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN).

WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.

A wireless network for Internet access in a large building is typically connected in a _____ topology. logical physical ring mesh

mesh

Which part of a data packet typically contains an error-checking algorithm? header footer body both the header and footer

both the header and footer


Related study sets

6.07 Quiz: Correlation and Causation

View Set

Principles of Management Test 3 (Ch:8-11)

View Set

CITI training Social and Behavioral focus

View Set

MGMT 309 Mindtap ALL CORRECT ANSWERS

View Set