Data Communication and Networks, Final Exam: Question Bank

Ace your homework & exams now with Quizwiz!

There are six basic forms of a classful IPv4 address: Class A, B, C, D, E, and F. T/F

?False

____________________ mean that as a person speaks into a telephd, the system can digitize the voice and store it on a hard disk drive as computer data.

?IVR

Windows Server 2000 incorporated Microsoft's answer to the highly popular NetWare NDS directory system: ____.​ inode​ iPrint ​X.509​ Active Directory

Active Directory

____ software can locate and clean the spyware programs found in a computer's memory and hard disk drive.​ ​Antispam ​Backup ​Antispyware ​Crash protection

Antispyware

The most popular protocol that handles dynamic assignment of IP addresses is ________________________________________.

DHCP page 284

1000BaseT is capable of using only the Category 7 cable specification.​ T/F

False

A trunk has a unique telephone number associated with it. T/F

False

ATM clearly dominates in the local area network arena. T/F

False

ATM transfer rates are as fast as 311 Mbps. T/F

False

All Uniform Resource Locators consist of six parts. T/F

False

CSMA/CD is the only network technology that successfully supports connection admission control and quality of service. T/F

False

H.323 was originally designed for TCP/IP networks. T/F

False

IP is the protocol used by most networks and network applications to create an error-free, end-to-end network connection. T/F

False

Linux software cannot support e-mail servers, Web servers, FTP servers, file/print servers, firewalls, proxy servers, and Domain Name System (DNS) servers.​ T/F

False

POP3 is not useful if you do not have a permanent connection to a network and must dial in using a temporary Internet connection. T/F

False

The Fast Ethernet standards are based on 1000-Mbps transmission speeds, or 1 gigabit (1 billion bits) per second. T/F

False

The more information you wish to send over a medium, the lower the frequency of the signal you need to represent that information. T/F

False

The price of the PVC is inversely proportional to the CIR level. T/F

False

Three of the most popular local area network systems are Ethernet, IBM Token Ring, and Wireless Ethernet.​ T/F

False

​Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet. T/F

False

____________________ states that each node takes the incoming packet and retransmits it onto every outgoing link.

Flooding

If the circuit cards are ____________________, it is possible to insert and remove cards while the power to the unit is still on.​

Hot swappable

To promote acceptance, the ____________________ suite of protocols was created to support the many different types of wireless local area networks in existence.​

IEEE 802 ??? Page 211

____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer. SLIP​ PPTP ​IPsec​ PPP

IPsec

A(n) _________________________ is a communications network that interconnects a variety of data communications devices within a small geographic area and broadcasts data at high data transfer rates.​

LAN

______________________________ protocol is a link state algorithm and is still used today by many Internet routers.

OSPF

_____ technique is also known as disk mirroring. RAID-1 RAID-3 RAID-5 RAID-0

RAID-1

The ______________________________ paved the way for anybody to offer a local telephone service to homes and businesses.

Telecommunications Act of 1996

_____ are permanent direct connections between two specified points. Centrex The lines PBX IPX

The lines

All bus networks share a major disadvantage: In general, it is difficult to add a new workstation if no tap currently exists.​ T/F

True

An asymmetric service is useful for an Internet connection in which the bulk of the traffic comes down from the Internet to the workstation. T/F

True

Circuit-switched networks were designed primarily for voice signals. T/F

True

Convergence has had a particularly noticeable impact on the telecommunications market. T/F

True

Home and small business local area networks often use NAT to conserve IP addresses. T/F

True

IP multicasting suffers from a lack of security. T/F

True

In reality, a multitasking operating system runs only one program at a time. T/F

True

MPLS on Internet routers and VPNs (virtual private networks) are gaining in popularity in the data network market. T/F

True

The design of a tree should ideally be similar to a pyramid.​ T/F

True

The hub, in most applications, has been replaced with the switch.​ T/F

True

You can assign many meanings to the weights in a weighted network graph. T/F

True

A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet. ​File Transfer Protocol (FTP) ​Internet Protocol (IP) ​Domain Name Service (DNS) ​Uniform Resource Locator (URL)

Uniform Resource Locator (URL)

____ software works with the user to locate and remove applications that are no longer desired.​ ​Backup ​Remote access ​Network monitoring ​Uninstall

Uninstall

A(n) ____________________ is a collection of computers and computer-related equipment interconnected to perform a given function or functions and typically using local and long-distance telecommunications systems

WRONG! Network

The ____________________ allows for a CSMA/CD network to simultaneously transmit and receive data to and from a workstation.

WRONG! full duplex

IP ____________________ is essentially another name for a data packet.

WRONG! packet

A ____ is a device that interconnects two segments of local area networks and acts as a filter. ​satellite ​hub ​switch ​router

WRONG! router switch??

A network that is connected in a _____ is one in which neighbors are connected only to neighbors. bus star-bus mesh star

WRONG! star

​____ applications do not negotiate a connection, and the transfer of data is rarely, if ever, acknowledged. Connection-oriented ​FTP ​Reliable service ​Connectionless

WRONG!!! ​Connection-oriented

The basic telephone system, or ________________________________________, has been in existence since the early 1900s.

WRONG!!! old plain telephone service plain old telephone service (POTS)??

_____ area networks can cover large geographic distances, including the entire Earth. Local Universal Personal Wide

Wide

With _____________________________________________, the frame relay router experiencing congestion sends a signal back to the originating station, which then slows down its transmission.

backward explicit congestion notification

​After the Telecommunication Act of 1996, new providers of local telephone services were called _____________________________________________.

competitive local exchange carriers CLECs

A ____ license allows a software package to be installed anywhere within a corporation, even if installation involves multiple sites.​​ corporate ​single-user-single-station ​network server ​site

corporate

A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected.​ switch ​hub ​router ​repeater

hub

The switch operates in place of a ____.​ ​hub ​router ​repeater ​bridge

hub

​When an application is simply observing its own throughput and not relying on any special types of signals coming from the network, this is called ____ congestion control. explicit ​backward explicit ​forward explicit ​implicit

implicit

A(n) ____________________ license, operating system user license, and controlled number of concurrent users license all refer to essentially the same situation.​

interactive user

The ____________________ is the telephone line that leaves your house or business.

local loop

A(n) ______________________________ is a large, complex program that can manage the common resources on most local area networks.​

network operating system (NOS)

The tap is a(n) ____________________, as it does not alter the signal and does not require electricity to operate.​

passive device

A(n) ____________________ may not have any servers but allows communications between workstations, as if the workstations were all equals.​

peer-to-peer network

The ____________________ design refers to the pattern formed by the locations of the elements of the network, as it would appear if drawn on a sheet of paper.​

physical

​The SONET network topology is a ____. ​star ​ring ​star-bus ​bus

ring

A modern operating system must provide various levels of operating system _____, including directory and file security, memory security, and resource security. memory size security space

security

A(n) ____________________ is a single unit or box that supports many networking functions.​

server appliance

In ____________________ segment networks, a switch may be connected to a hub (or several hubs), which then connects multiple workstations.​

shared

A(n) ____________________ is a device that a user interacts with to access a network, and it contains the software application that allows someone to use the network for a particular purpose.

station

​In a network graph, the edge between each pair of nodes can be assigned a weight or associated cost to form a structure called a(n) _________________________.

weighted network graph

​____ is a popular format that transmits the downstream data at a faster rate than the upstream rate. ​High bit-rate DSL (HDSL) ​Asymmetric digital subscriber line (ADSL) ​DSL Lite ​Consumer DSL (CDSL)

​Asymmetric digital subscriber line (ADSL)

____ avoids congestion by requiring users to negotiate with the network regarding how much traffic they will be sending, or what resources the network must provide to satisfy the user's needs before the user sends any data. ​Explicit congestion control ​Implicit congestion control ​Buffer preallocation ​Connection admission control

​Connection admission control

____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video). ​H.323 ​H.232 ​H.121 ​H.256

​H.323

​____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information. Integrated voice recognition and response ​Unified messaging​ Fax-back​ç Third-party call control

​Integrated voice recognition and response

​There is a newer, very high-speed network that will cover the United States, interconnecting universities and research centers at transmission rates up to a gigabit per second (1000 Mbps). The new high-speed network is called ____. ​Internet6 ​Internet2 ​FastEthernet ​IPv6

​Internet2

Active Directory is built around the ____.​ X.500 standard ​802.11 protocol ​Ethernet standard ​Lightweight Directory Access Protocol (LDAP)

​Lightweight Directory Access Protocol (LDAP)

____ software incorporates a fairly large number of network support tools.​ Antispam ​Crash protection ​Network-monitoring ​Backup

​Network-monitoring

​____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer. ​DNS ​Remote login ​FTP ​ARP

​Remote login

​The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection. Source Port ​Sequence Number ​Padding ​Window

​Sequence Number

​____ means that users have the ability to control a call—for example, set up a conference call—without being a part of it. ​Fax-back ​Unified messaging ​Integrated voice recognition and response ​Third-party call control

​Third-party call control

____ cabling has become the preferred medium for star-wired bus topologies.​ ​Coaxial ​Fiber-optic ​Twisted pair ​FDDI

​Twisted pair

____ is a no-frills transport protocol that does not establish connections, does not attempt to keep data packets in sequence, and does not watch for datagrams that have existed for too long. ​Internet Control Message Protocol (ICMP) ​User Datagram Protocol (UDP) ​Network Address Translation (NAT) ​Transport Control Protocol (TCP)

​User Datagram Protocol (UDP)

In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets. ​implicit congestion control ​connection admission control ​explicit congestion control ​buffer preallocation

​buffer preallocation

The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit.​ ​network monitoring ​antivirus ​crash protection ​sniffer

​crash protection

The primary goal of ____ software is to perform crash stalling, or to try to keep the operating system running long enough to perform a graceful exit.​​ network monitoring ​antivirus ​crash protection ​sniffer

​crash protection

The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information.​ ​logical link control (LLC)​ medium physical control (MPC) ​medium access control (MAC) ​physical access control (PAC)

​logical link control (LLC)​

​A(n) ____ handles all in-house calls and places calls onto outside telephone lines. ​private branch exchange (PBXs) local exchange carriers (LECs) ​interexchange carriers (IECs or IXCs) ​local access transport area (LATA)

​private branch exchange (PBXs)

A(n) ____ license is designed for the user who might have a desktop machine at work and a laptop machine for remote sites, or another desktop machine at home.​ ​site ​interactive user ​single-user-multiple-station ​single-user-single-station

​single-user-multiple-station

​The type and number of interconnections between nodes and the way network data is passed from node to node are the responsibility of the ____. ​server ​sub-network ​station ​client

​sub-network

A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures. ​NAT network ​DHCP ​virtual private network (VPN) ​TCP network

​virtual private network (VPN)


Related study sets

Cognitive Psych EXP3604, Ch. 1-4

View Set

Matematik procent del 1 Hvad er 25% af 100

View Set

Chapter 9 Section Quiz: Social Stratification in the United States

View Set

Chapter 15 Italian Renaissance/World History and Geography

View Set