Data Communications part 3
When an application is running, the application relies on the OS when it makes service requests through a defined ____. RAID GUI NOS API
API
____ software is used to block unwanted e-mail and is available at many levels. Network monitoring Anti-spam Remote access Anti-malware
Anti-spam
____ is not necessarily a form of error, but can indirectly lead to an increase in errors affecting the transmitted signal. Impulse noise White noise Crosstalk Attenuation
Attenuation
____ noise that happens with twisted pair wires, such as an Ethernet cable, can be electrical. Echo Crosstalk Jitter Gaussian
Crosstalk
In an on-prem network environment, ____ stands for the storage device attached directly to a computer. DAN DAS SAN NAS
DAS
The LLC and MAC sublayers are divisions of the ____ OSI model layer. physical Data link transport network
Data link
____ was the first commercially available local area network system and remains, without a doubt, the most popular local area network system today. IBM Token Ring FDDI Wireless Ethernet Ethernet
Ethernet
IEEE created the 100-Mbps Ethernet 802.3u protocol, also called ____ Ethernet. Terabit Fast FDDI Gigabit
Fast
The IEEE 802.3z standards are also known as ____ Ethernet. Terabit Fast Switch Gigabit
Gigabit
The ____ standard was designed to allow multiple devices to work together to create a virtual LAN. IEEE 802.1Q IEEE 802.3u IEEE 802.3f IEEE 802.2v
IEEE 802.1Q
n the CSMA/CA protocol, the time interval during which a device waits to check if the medium is idle is called ____. CTS RTS IFS TIW
IFS
________________ allows you to combine two or more data paths, or links, into one higher-speed link. Quality of service Link aggregation The Spanning Tree Algorithm A virtual LAN
Link aggregation
After watching traffic for a while, a switch has a table of device addresses that shows which ____ address is connected to each of the switch's ports. MAC LLC TCP IP
MAC
In the Ethernet header, the destination address is a ____. MAC address port number IP address v4 IP address v6
MAC address
A(n) ____ is a large, complex program that can manage resources commonly found on most LANs. API RAID GUI NOS
NOS
____ software incorporates a fairly large number of network support tools. Network monitoring Backup Anti-spam Crash protection
Network monitoring
____ software allows a user to access all of the possible functions of a personal computer workstation from a mobile or remote location. Network monitoring Remote access Sniffer Anti-spyware
Remote access
____ is the prompt for the Global configuration mode of Cisco's IOS. Router# Router(config)# Router(config-if)# Router>
Router(config)#
____ is the prompt for the Interface configuration mode of Cisco's IOS. Router(config-if)# Router> Router(config)# Router#
Router(config-if)#
____ is a flow-control scheme that allows a station to transmit a number of data packets at one time before receiving some form of acknowledgment. Sliding window Stop-and-wait ACK window Timeout
Sliding window
One of the greatest advantages of ____ is the efficient use of resources, as many servers can run on a single physical machine. OSs RAIDs Virtualization NOSs
Virtualization
One of the greatest advantages of ____ is the efficient use of resources, as many servers can run on a single physical machine. Virtualization OSs RAIDs NOSs
Virtualization
____ software is the application or set of programs that stores Web pages and allows browsers from anywhere in the world to access those Web pages. Web server Network monitoring Remote access Antivirus
Web server
Active Directory is part of the ____ OS. FreeBSD Linux Windows Server Unix
Windows Server
Typically, impulse noise is a(n) ____ burst of energy. logical binary analog digital
analog
The ____ topology consists of a simple cable to which all devices attach. ring star star bus token ring
bus
The most popular contention-based protocol for wired LANs is ____. carrier sense multiple access with collision avoidance (CSMA/CA) round-robin token ring carrier sense multiple access with collision detection (CSMA/CD)
carrier sense multiple access with collision detection (CSMA/CD)
High humidity and wet weather can cause an increase in electrical ____ over a telephone system. crosstalk attenuation jitter compression
crosstalk
In ____ segment networks, a switch may be directly connected to a workstation, and the switch connects to the hub. dedicated remote shared distributed
dedicated
To minimize the effect of echo, a device called a(n) ____ can be attached to a line. repeater echo suppressor amplifier hub
echo suppressor
A local area network performs file serving when it's connected to a workstation with a large storage disk drive that acts as a central storage repository or ____ server. application database printer file
file
A ____ is an industry-approved bit string used to create the CRC remainder. numeric modem generator polynomial arithmetic checksum packet sniffer
generator polynomial
If the NICs are ____, it is possible to insert and remove cards while the power to the unit is still on. IEEE 802.3f compliant hot-swappable IEEE 802.3u compliant plug-and-play
hot-swappable
A ____ is a device that interconnects two or more workstations in a star-wired bus local area network and immediately retransmits the data it receives from any workstation out to all other workstations connected. router hub switch repeater
hub
The switch operates in place of a ____. hub router repeater bridge
hub
The ____ topology of a network determines how the data moves around the network from workstation to workstation. logical physical electrical data
logical
The ____ sublayer is primarily responsible for logical addressing and providing error control and flow control information. logical link control (LLC) medium physical control (MPC) medium access control (MAC) physical access control (PAC)
logical link control (LLC)
The ____ sublayer contains a header, computer (physical) addresses, error-detection codes, and control information. physical link control (PLC) logical flow control (LFC) logical link control (LLC) medium access control (MAC)
medium access control (MAC)
The data contained within a data link package is called ____. payload trailer bits header
payload
With ____, you can send electrical power over the Ethernet connection. FDDI power over Ethernet (PoE) 10GBase-fiber 1Base5
power over Ethernet (PoE)
The local area network software called a(n) ____ server provides workstations with the authorization to access a particular printer, accepts and queues prints jobs, prints cover sheets, and allows users access to the job queue for routine administrative functions. database file print application
RSTP stands for ____ spanning tree protocol. reconfigurable repeated recurrent rapid
rapid
The ____ is used to connect local area networks to wide area networks. hub router repeater bridge
router
A(n) ____ license allows a software package to be installed on all workstations and servers at a given site. single-user-multiple-station network server corporate site
site
A ____ protocol's function is simply to inform the transmitter what piece of data is expected next. CRC-32 stop-and-wait sliding window CRC-16
sliding window
A modern-day topology that uses a more advanced central connection device called a switch has both the physical and logical topologies ____ shaped. star bus ring tree
star
The most popular configuration for a local area network is the ____ topology. bus star-wired bus bus wired tree star
star
The LAN topology that has the devices connected by a single hub is called ____ topology. bus wired tree star-wired bus star bus
star-wired bus
The LAN topology that logically acts like a bus but physically looks like a star is called ____ topology. star bus bus wired tree star-wired bus
star-wired bus
A ____ is a device that interconnects two or more workstations in a star local area network router satellite hub switch
switch
A ____has one primary function: direct the data frame to only the addressed receiver. hub port filter switch
switch
In a bus topology, connecting to the cable requires a simple device called a(n) ____. hub router tap echo suppressor
tap
As ____ on a CSMA/CD network increased, the rate of collisions increased, which further degraded the service of the network. traffic errors noise amplitude transmission speed
traffic
When a software package is sold, it is usually intended for a particular type of installation, referred to as the ____. copyright software compatibility user license hardware imprint
user license
Early local area networks transmitted data at only ____ million bits per second. 1000 100 10 1
10
____ was a system designed for twisted-pair wiring, but with only a 100 Mbps data transfer rate for 100 meters. 10Base-T 100Base-TX 100Base-T 100Base-FX
100Base-FX
____ was the standard created for fiber-optic systems. 100Base-TX 10Base-F 100Base-FX 10Base-T
100Base-FX
A ____ system transmits 10-Mbps baseband (digital) signals over twisted pair for a maximum of 100 meters per segment length. 100Base-FX 100Base-TX 10Base-F 10Base-T
10Base-T
The ____ standard is an early and extremely popular 802.3 standard. 100Base-TX 1GBase-R 1GBase-T 10Base-T
10Base-T
The ____________________ Ethernet standard is also known as IEEE 802.3ae. 10-Gig 10-Gbps 10 Gbps 10G
10G
Because of collisions, busy CSMA/CD networks rarely exceeded ____ percent throughput. 80 40 50 10
40
Isolated single-bit errors occur ____ percent of the time. 60 to 70 30 to 40 50 to 60 40 to 50
50 to 60
The ____ standard defines the Spanning Tree Protocol (STP). 802.3u 802.1s 802.1D 802.1Q
802.1D
