Final Exam ISTM 310 (Chapter 1 - Chapter 12)
Which of the following is not a data link layer standard?
HTTP
Which of the following is a term used to group together the physical and data link layers?
Hardware layers
The acronym, HTML, refers to:
Hypertext Markup Library
Which of the following is not a key advantage of digital transmission?
It permits only low transmission rates.
Which of the following is not an advantage of instant messaging?
It usually takes days for an IM message to be delivered to the recipient.
The acronym, MIME, refers to:
Multipurpose Internet Mail Extension
Which of the following is not true about File Transfer Protocol (FTP)?
The most common type of FTP site is an open FTP site.
A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.
intranet
An N-tiered architecture:
is generally more "scalable" than a three-tiered architecture
Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?
phase
Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?
transport Layer
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
transport Layer
The _________ layer performs error checking which is redundant with the function of the _________ layer.
transport, data link
The type of media usually installed on homes and businesses by the telephone company is called ____________.
twisted pair
A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.
two
In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:
user agent
_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.
webcasting
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication.
certificate authority
Which of the following is way to reduce or eliminate crosstalk on a circuit,
changing multiplexing techniques
With QoS routing different __________ are defined, each with different priorities.
classes of service
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.
cloud-based mesh design
Which of the following would not be part of an "ideal" backbone design for the future
coax cabling throughout LANs and BN
A(n) _____________ is not a common type of dedicated server.
collision server
Inverse multiplexing means:
combining several low speed circuits to enable them to be transmitted across one high speed circuit
With contention:
computers wait until the circuit is free before they send data
A star architecture:
connects all computers to one central computer that routes messages to the appropriate computer
Storing other people's Web data closer to your users is referred to as
content caching
With __________ ARQ, the sender immediately sends the next message or packet of data.
continuous
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?
controlled chaos
The integration of voice, video, and data communications is also known as __________.
convergence
________ controls fix a trespass into the network.
corrective
In __________, the network designer considers the relative cost of the technologies
cost assessment
For access to DSL, __________ equipment is installed at the customer location.
customer premises
Which of the following is not a type of intrusion prevention system?
data link-based
A _______ is a connectionless method of sending data packets on a packet switched service.
datagram
Which of the following is not a technology layer that is considered when designing backbone networks?
decentralized layer
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.
denial-of-service attack
A star topology is:
dependent upon the capacity of the central computer for its performance
The fastest growing form of videoconferencing is
desktop
An example of _____ of data would be if a computer virus eliminated files on that computer.
destruction
When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
dialed circuit
Transmission speeds:
differ widely among media
__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.
directional
A tornado that eliminates a network control center would be an example of a natural __________.
disaster
There are some network modeling tools that can ________ the existing network.
discover
Encryption is the process of:
disguising information by the use of mathematical rules, known as algorithms
A network switch failure is an example of a(n) ________ threat.
disruptive
With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.
distance vector
A _________ is a group of related resources.
domain
Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information.
dumb
The cheapest time to install network cabling is:
during the construction of the building
Which of the following media has the lowest error rates and the highest transmission speeds?
fiber optic cable
Which of the following media is least susceptible to noise?
fiber optic cable
Which of the following type of media is least susceptible to eavesdropping?
fiber optics
A(n) ____________ allows many users to share the same set of files on a common, shared disk drive.
file server
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.
firewall
Which of the following is a way to sell the network proposal to management?
focus on the growth in network use
IP spoofing means to:
fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
A switch uses a _____________ that is very similar to a routing table used in a router.
forwarding table
Asymmetric DSL uses ___________ multiplexing to create three separate channels over one local loop circuit.
frequency division
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
full mesh design
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.
giga, gigabit
Circuit capacity on a backbone network will not be improved by:
going from 100Base-T Ethernet to 10Base-T Ethernet
The two basic types of media are:
guided and wireless (radiated)
Stop-and-wait ARQ uses ___________ type of data flow.
half duplex
The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.
half-duplex
A client computer is assigned a data link layer address is by:
hardware manufacturers
The newer form of IP, version 6 (Ipv6) is:
has an increased address size from 32 bits to 128 bits
When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the:
hidden node problem
Another term for cable networks that use both fiber-optic and coaxial cable is __________.
hybrid fiber coax
Dynamic routing:
imposes an overhead cost by increasing network traffic
To get more "bandwidth" in a digital transmission, you must:
increase the range of frequencies available for a transmission
The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.
logical network design
Which of the following is a primary advantage of a VPN?
low cost
Associated with a switched backbone, MDF is an acronym for:
main distribution facility
A security hole is a(n):
malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
A central database called the _____________, has an agent that collects information about a device and makes this information available to the network management station.
management information base
Routers:
may also be called TCP/IP gateways
1. In a ring design WAN,
messages can take a long time to travel from the sender to the receiver
_________ are smaller versions of NAPs that link a set of regional ISPs.
metropolitan area exchanges
A(n) ____________, is an information system that is critical to the survival of an organization.
mission critical application
The acronym, Modem, stands for _________________.
modulator/demodulator
Which of the following is not a way to reduce network demand?
moving data further from the applications and people who use them
Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.
much more
A special type of message that is used when sending the same message to a specific group of computers is called a:
multicast message
One disadvantage of the ____________ architecture is that places a greater load on the network.
n-tier
In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.
needs analysis
The _________ layer is responsible for routing of messages from the sender to the final destination.
network layer
A __________ is an organizational department that is responsible for monitoring and fixing overall network problems.
network operations center
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
network profile
Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
newer version permits jumbo frames
Cross-talk:
occurs when one circuit picks up signals in another
__________ antennas transmit the signal in all directions.
omnidirectional
Switched Ethernet:
operates at about 95% of capacity before performance becomes a problem.
Frequency division multiplexing:
operates by dividing the signal into different frequencies
In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins?
phase modulation
Data is physically transmitted from one computer or terminal to another in the ________ layer.
physical
A _________ is the place at which the ISP provides services to its customers.
point-of-presence
Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
point-to-point
In the three tier architecture the software on the client computer is responsible for____________.
presentation logic
________ controls discover unwanted events.
preventive
_________ controls stop a person from acting.
preventive
Basic rate interface:
provides a communications circuit with two 64 Kbps B channels, plus one D channel
10/100 Ethernet:
provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server
Which is not a function of the physical layer:
providing error-free transmission of data.
____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.
quadrature amplitude modulation
Which of the following is not an example of a building block used in technology design?
specifications for a particular lighting fixture in the network operating center
Another term for impulse noise is:
spikes
What percentage of overlap in coverage by access points (AP) is needed to provide smooth and transparent roaming from AP to AP.
15 %
IPv6 will be based upon _________ -byte addresses.
16
Bluetooth operate in the ________ band.
2.4 GHz
In the U.S. 802.11g WLANs operate in the ________ band.
2.4 GHz
A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
255.255.0.0
How many channels does 802.11g provide for communication with clients?
3
How many distinct communication channels (don't overlap) does the 802.11b standard provide between the access point and clients?
3
IPv4 uses ________ bytes per Internet address.
4
The data rate for a T-3 circuit in North America is:
44.376 Mbps
The probability of detecting an error, given that one has occurred, using parity checking is about:
50%
The maximum data rate of a an 802.11a WLAN is
54 Mbps
The maximum data rate of an 802.11g WLAN is
54 Mbps
How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels?
6
When converting analog voice data to digital signals, Pulse Code Modulation typically samples the incoming voice signal _______ times per second.
8,000
802.11g is backward compatible with which type of LAN?
802.11b
The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________.
802.11n
Which of the following standards is backward compatible with IEEE802.11a, b, and g?
802.11n
Which wireless standard is becoming the dominant standard of all the current standards?
802.11n
Which IEEE standard inserts a 16-byte VLAN tag into a normal Ethernet packet?
802.1q
Which of the following is not a WLAN standard?
802.3
Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total computer processing power now resides on microcomputer-based LANs.
90
The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:
> 99%
Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
splits the communication circuit vertically (with time slots) instead of horizontally
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.
star design
With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data.
stop and wait
A brute force attack against an encryption system
tries to gain access by trying every possible key
Which of the following is a mode that is used by IPSec?
tunnel
With a virtual private network, users create permanent virtual circuits through the Internet called:
tunnels
A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.
turnpike effect
A type of message that is used when sending a message from one computer to another computer is called a:
unicast message
A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.
uninterruptible power supply
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?
unlocked wiring closet for network
To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can:
upgrade to a bigger circuit
The performance of MANs and WANs can be improved by:
upgrading the circuits between the computers
Switched backbone networks:
use a star topology with one device, usually a switch
Switched Ethernet:
usually enables all attached circuits to send or receive packets simultaneously
Hubs:
usually incorporate repeaters or amplifiers
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.
virtual private network
_____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN.
warchalking
The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:
wavelength division multiplexer
The source destination port identifier tells the destination station _____________.
which application layer process the packet is from.
The familiar background static on radios and telephones is called:
white noise
When devices operate as fast as the circuits they connect and add virtually no delays, we say that the device operates at _______________.
wire speed
____________ is not a function of a data link protocol.
Amplitude shift keying
A (n) ______ is a special type of virus that spreads itself without human intervention.
worm
An application layer address using TCP/Ipv4 looks like:
www.cba.uga.edu
Which of the following is not true a dumb terminal:
you can install your latest application software on it.
The _____________ is an operating system based on a version of UNIX that is more secure than the Windows Server operating system.
Apple Mac Operating System
_____________ is the percentage of time the network is usable by users.
Availability
__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users.
Charge-back
____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.
Common carriers
The _________ is the part of the backbone that connects the different backbones together.
Core layer
____________ is also called automatic software distribution.
Electronic Software Distribution
Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?
Ethernet
_________ is being pioneered by Yipes.com.
Ethernet to the home
__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software.
Fault management
____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.
Flipped bits
_____________ is used in Bluetooth in which the 2.4 GHz frequency range is divided into 79 separate channels.
Frequency-hopping spread spectrum
Which of the following can connect two different networks that utilize the same or different data link and network layer protocols as well as the same or different cable type?
Gateway
________________ separate channels to reduce interference between channels in frequency division multiplexing.
Guardbands
UDP is not commonly used for:
HTTP requests
__________ is not true with respect to network hubs.
Hubs provide a complicated way to connect network cables
The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.
Hypertext Transfer Protocol
The network layer of the Internet model uses the _____________ protocol to route messages though the network.
IP
__________can obliterate a group of bits, causing a burst error.
Impulse noise
The ping command uses the most basic interior routing protocol on the Internet, which is the:
Internet Control Message Protocol
At the top of the Internet structure are national ___________, such as AT&T and Sprint.
Internet service providers
Which of the following is not true about X.25?
It is a type of circuit switched service.
Which of the following is true with respect to the data link layer?
It is responsible for getting a message from one computer to another (one node to another) without errors.
Which of the following is not true about CSMA/CD?
It is used in token ring protocol LANs
Which of the following is true about the data link protocol, SDLC:
It uses a special bit pattern called a flag at the beginning and end of every frame (or packet)
Which of the following is not a critical software component in a dedicated server LAN?
LAN metering software
LAN bottlenecks are usually found at the:
LAN server and network circuit
_______________ is a type of dynamic routing.
Link state
___________ is how the network works conceptually.
Logical topology
With _____________, the AP permits the owner to provide a list of valid addresses that can connect.
MAC address filtering
_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails.
MTBF
_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure.
MTTDiagnose
______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site.
MTTFix
_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions.
Managed devices
_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it.
Managed devices
Which of the following is not a user agent package?
Microsoft Word
The earliest type of fiber optic systems were:
Multimode
____________ routers can understand different network layer protocols.
Multiprotocol
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.
NAT proxy server
National ISPs connect together and exchange data at ___________.
Network Access Points
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
Network address translation
_____________ are used by many large and small organizations to monitor and control their networks today.
Network management software packages
____________ refers to keeping track of the operation of network circuits to make sure they are working properly.
Network monitoring
Which of the following statements is true?
On a circuit, the shorter the distance, the higher the speed.
__________ is an estimate of the highest data volume on a link.
Peak circuit traffic
__________ has led to the belief that the Internet is "free".
Peering
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
Peering
___________ ensures that the network is operating as efficiently as possible.
Performance management
A Bluetooth network is called ____________.
Piconet
_____________ helps ensure that critical problems get priority over less important ones.
Problem prioritizing
___________ allows the network manager to determine who is responsible for correcting any outstanding problems.
Problem tracking
______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
Propagation delay
The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
TCP connection
_______ is the dominant network protocol today.
TCP/IP
Which of the following is not a benefit of packet switched services?
The data transmission rates tend to be lower than dial-up or dedicated circuits.
Which is true about bandwidth?
The greater the bandwidth, the faster we can transmit data.
One reason that there are technical network integration management issues is the fact that:
The more different types of network technology used, the more complex network management becomes.
Which of the following is not true about layer-2 switched Ethernet?
The physical topology is the same as the physical topology of shared Ethernet: a ring.
Which of the following is not true about switched Ethernet?
The switch has a physical bus topology.
One drawback to dynamic routing is:
The transmission of status information "wastes" network capacity that could be used to send user messages
Which of the following is not true about Layer-3 switches
They can only switch messages based on their data link layer addresses.
Which of the following is not true about one-time passwords?
They create a packet level firewall on the system.
Which of the following is true regarding switched backbones?
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
Which of the following is not true about backbone networks?
They tend to use lower speed circuits than LANs.
________ is a measure of how much it costs per year to keep one computer operating.
Total cost of ownership
_________________ is defined as the total number of information bits divided by the total number of bits in the transmission.
Transmission efficiency
Spyware, adware and DDOS agents are three types of:
Trojans
____________ are reports produced by numerous network software packages for recording fault information.
Trouble tickets
___________ refers to managing and documenting the network's hardware and software configuration.
Troubleshooting
Which of the following is not a problem with dialed circuits?
Use of these circuits is very simple.
A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware.
Virtual LAN
Which of the following is a fundamental backbone network architecture?
Virtual LAN
A ____________ translates a wireless application request to HTTP and sends it over the Internet to the desired Web server.
WAP proxy
Which of the following is not an advantage of a WLAN?
WLANs allow users to work more securely than a wired LAN.
A major difference between Wi-Fi Protected Access (WPA) and WEP or EAP is
WPA keys are longer than WEP keys.
Which of the following is the most secure for wireless networks?
WPA2
Which of the following is false about staff costs for a network?
When a variety of devices are used in a network, it takes less time to perform network management activities
_______ is the commercial name for a set of standards by the IEEE 802.16 standards group.
WiMAX
Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office.
a DSLAM
A local area network is:
a group of microcomputers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.
A backbone network is:
a high speed central network that connects other networks in a distance spanning up to several miles.
A metropolitan area network is:
a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.
A sniffer program is a:
a program that records all LAN messages received for later (unauthorized)
Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?
application layer address
A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.
application level firewall
Ethernet/IP packet networks:
are supported with gigabit fiber optic networks in large cities
How can a set of 802.11b access points be configured to operate without interference?
assigning each access point a different channel to communicate with clients
The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
attenuation
Electronic software distribution:
automatically produces documentation of software installed on each client computer
__________ refers to the range of frequencies available.
bandwidth
The three fundamental approaches to routing are:
centralized, static routing, and dynamic routing
____________ refers to the transmission characteristics of the circuit.
logical circuit
Which of the following is not a type of hardware device that can be used to interconnect networks?
'dumb' terminals
With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
00011011
Depending on the Bluetooth version, the maximum data rate of Bluetooth today is around
1-3 Mbps
A T1 level of ADSL has a maximum downstream rate of about _________ Mbps.
1.5
The data rate for a T-1 circuit in North America is:
1.544 Mbps
In passive optical networking, the optical signal has a maximum length of about __________.
10 miles
________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.
10/100 Ethernet
Which of the following is a type of protocol that needs to be considered in technology design?
100 Mbps
____________ is a newer type of packet switching technology.
ATM
Which of the following is not a difference between ATM and X.25?
ATM provides packet switched service.
It appears that the use of _____ is decreasing in backbones while the use of ____ is increasing.
ATM, Ethernet
The backbone architecture layer that is closest to the users is the
Access layer
_____________ is an effective way to prevent attenuation.
Adding repeaters or amplifiers to a circuit
_________ is a specially formatted request used to perform IP address to data link address resolution.
Address Resolution Protocol
Which of the following is not true about multi-switch VLANs?
All of the above are true statements.
_____ is standardized as IEEE 802.15
Bluetooth
Which of the following is not a controlled access method of media access control?
CSMA/CD
CSMA/CA is an acronym for:
Carrier Sense Multiple Access with Collision Avoidance
Which of the following is not an application layer standard?
T1
When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
DNS request packet
___________ is not a type of digital signaling technique.
Data rate signaling
________ is a type of WAN connection that uses the normal voice telephone network.
Dial-up service
__________ provide authentication which can legally prove who sent a message over a network.
Digital signatures
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
Directory Services
The _______ is the part of the backbone that connects the LANs together
Distribution layer
Server name resolution is done using the:
Domain Name Service
Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages.
QoS
A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates
Quality control chart
Which of the following can provide fault tolerance for the storage space on a server?
RAID
RFP stands for:
Request for Proposal
With which type of digital signaling does the signal always return to zero volts after each bit?
Return-to-zero signaling
_________ move packets along the backbone based on their network layer address.
Routed backbones
___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
Routing
_________ is not a type of Ethernet specification.
Securenet
___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept.
Service level agreements
________ is used to model the behavior of the planned communication network once the proposed network map is complete.
Simulation
____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network.
Static routing
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.
Subscriber
A __________ type of BN has a star topology with one device, such as a switch, at its center.
Switched backbone
_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today.
T-carrier services
Using parity, the probability for detecting an error, given that one has occurred, is:
about 50% for either even or odd parity
A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
access point
Which of the following is not an effective way to reduce LAN network demand:
add hidden nodes
Which of the following would be least effective in improving backbone performance?
adding new keyboards to the client computers
The large network purchases are done:
after the vendor(s) are selected
A symmetric encryption system has two parts: the key and the ____________.
algorithm
With a client-based network, one fundamental problem is that:
all data on the server must travel to the client for processing
10Base-T:
all of the above
Digital Subscriber Line:
all of the above
Microwave transmission:
all of the above
Which of the following is not a potential bottleneck for LAN performance?
all of the above are potential bottlenecks for LAN performance
At the physical layer, 802.11b uses radio waves which are a form of:
analog transmission
A fundamental technique to determine if an intrusion is in progress in a stable network is:
anomaly detection
Estimating the size and type of the "standard" and "advanced" network circuits is called _________.
capacity planning
Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.
baseline
Errors on a network can occur:
because of noise on the line
Threat of intrusion comes from ____________.
both inside and outside of the organization
Which of the following is a function of the transport layer?
breaking long messages into several smaller messages
Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies.
broadband
The term ______________ refers to high speed communication circuits such as DSL.
broadband communications
A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
broadcast message
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
broadcast message
Nowadays, most organizations use a simpler approach to network design called the ___________ approach.
building-block
In a _________ , more than one data bit is changed by the error-causing condition.
burst error
The type of logical topology that Ethernet uses is a:
bus
Which of the following is not a basic architecture for dedicated circuit networks?
bus
A digital service offered by cable companies is the _________.
cable modem
1000 Base-T:
can run at either full- or half-duplex
Gateways:
can translate one network protocol into another
Another term for a user agent is:
e-mail client
The effective data range is up to 6 miles with a line of sight to the access point or 2.5 miles without line of sight. This describes ____________.
e.) IEEE 802.16e
When a signal is reflected back to the transmitting equipment, it is called a(n) _________.
echo
Network demand will not be reduced by:
encouraging the use of applications such as medical imaging
The primary reason for networking standards is to:
ensure that hardware and software produced by different vendors can work together
A _____connects all networks within a company, regardless of whether it crosses state, national, or international boundaries.
enterprise network
To snare intruders, many organizations now use _________ techniques.
entrapment
When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution.
escalated
One advantage of _____________ is that no conversations between LAN and WAN protocols are needed.
ethernet to the home
A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet.
extranet
2. In a ring design WAN,
failure in one circuit means that the network can most likely continue to function
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
fiber
Which of the following media can best withstand harsh environmental conditions?
fiber optic cable
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:
increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.
intrusion
Often, incidents of ___________ involve employees of the organization, surprisingly enough.
intrusion
Asynchronous transmission:
is also known as start-stop transmission
A peer-to-peer LAN:
is generally cheaper in hardware and software than a dedicated server
Documentation for network and application software:
is important for monitoring adherence to software license rules
Media access control:
is not very important in point-to-point with full duplex configuration
In ARQ, a NAK:
is sent by the recipient if the message contains an error
Primary rate interface:
is typically offered only to commercial customers
Synchronous transmission:
is used to transmit a "frame" or "packet" of data at a time
To estimate costs for large network purchases, organizations often:
issue an RFP to vendors
Of the following, which is not true about fiber optic cable?
it has a very low capacity
Switches:
learn addresses by reading the source and destination addresses
Optical media is:
less likely to suffer from noise than electrical media
A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL.
line splitter
Which of the following is not a key deliverable for the cost assessment step
list of wish list requirements
A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side.
optical-electrical converter
A(n) ____________ examines the source and destination address of every network packet that passes through it.
packet level firewall
Which of the following type of networks permit packets from separate messages to be interleaved?
packet switched network
The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
packets
Devices in a rack are connected together using ___________.
patch cables
Networks that are designed to connect similar computers that share data and software with each other are called:
peer-to-peer networks
Which of the following is not a method for deterring intrusion?
performing social engineering
TCP/IP:
performs packetizing, as well as routing and addressing functions
IP:
performs routing functions
A _________ is a connection-oriented approach to sending packets on a packet switched service.
permanent virtual circuit
IMAP (Internet Message Access Protocol):
permits an e-mail message to remain stored on the mail server even after they have been read by a client computer
A logical bus topology:
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
With a switched backbone network, the equipment is usually placed in a ______.
rack
The traditional network design approach does not work well for _________ networks.
rapidly growing
The key principle in preventing disruption, destruction and disaster is ___________.
redundancy
On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
repeaters
If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)?
replacing the cable with fiber optic cable
Routed backbones:
require a lot of management
Mesh networks:
require more processing by each computer in the network than in star or ring networks
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.
ring design
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
risk assessment
Correlating the individual error messages into a pattern to find the true cause of the problem is referred to as_______
root cause analysis
__________ is not an important function of the transport layer.
routing
An advantage of centralized routing is:
routing decisions are simple
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
routing table
The _____________ is used by a computer to determine how messages will travel through the network.
routing table
Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?
security (relative to fiber)
TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
sequence numbers
In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.
technology design
Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.
technology design
Internet 2 is also known as:
the Abilene network
At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data.
the DSLAM
Another major high-speed network experimenting with long distance Ethernet over fiber is _____________.
the National Lambda Rail
In needs analysis:
the goal is to understand what users and applications the network will support
As part of the five-layer network model used in this textbook, the data link layer sits directly between:
the physical and the network layers
Which of the following is not true about switched backbones?
there are many more networking devices in a switched backbone network
Which of the following is not a purpose for using hubs in a network?
to act as a communications server
Device performance on a backbone network will not be improved by:
translating packets from one protocol to another as they enter the BN
In connection-oriented routing, the _________ layer sets up a virtual circuit between the sender and the receiver.
transport
The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages.
transport
A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.
1024
When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______.
16
The typical range of human hearing is:
20 to 14,000 Hz
If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is:
9100 Hz
With respect to converting digital data into analog signals, AM stands for:
Amplitude Modulation
With respect to costs for a client-server network, which of the following is true?
Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.
With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic.
Presentation; data access
Which of the following statements is correct?
Serial transmission is slower than parallel transmission.
___________ is an orderly close to a dialogue between end users.
Session termination
The most commonly used e-mail standard is:
Simple Mail Transfer Protocol
Which of the following is not true about Telnet?
Telnet poses no security threat.
The idea for a special hypertext network, called the World Wide Web, was conceived of by:
Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989
The height of a sound wave is called its:
amplitude
In which layer of the Internet model would the HTTP standard be used?
application
______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.
application logic
Another term for the weakening of a signal over distance is:
attenuation
The _____________ of a circuit determines a circuit's capacity.
bandwidth
Client-server architectures:
can use middleware to provide a standard way of communicating between software from more than one vendor
Which of the following is not a property of a WAN:
connects a group of computers in a small geographic area such as room, floor, building or campus.
An application program function is __________, or the processing required to access data.
data access logic
_________ is an application program function that deals with storing and retrieving data.
data storage
___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination.
dispersion
Which of the following media is the least secure?
infrared
____________ transmission is prone to interference from smoke, heavy rain and fog and requires line-of-sight.
infrared
A _____________ , a mailing list of users who discuss some topic, has two parts: a processor and a mailer.
listserv
A _____________ is the type of computer you use in your home and is the most common type of client today.
microcomputer
Which of the following would be considered a type of wireless media?
microwave
__________ is a line-of-sight type of wireless media.
microwave
____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0.
modulation
The direction in which the sound wave begins is known as:
phase
A "thick client" architecture approach:
places all or almost all of the application logic on the client
A "thin client" architecture approach:
places all or almost all of the application logic on the server
The ____________ layer of the OSI model is responsible for data format translation.
presentation
________ is the presentation of information to the user and the acceptance of the user's commands.
presentation logic
A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.
protocol
There are optional and required parts of an HTTP request. They are:
request line, request header, request body
There are required and optional parts of an HTTP response. They are:
response status, response header, response body
When all bits of a character are transferred one after another, the bits are transferred in ___________ mode.
serial
With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.
server
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.
session, presentation and application
Which of the following is not a function of the data link layer?
specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it
The function of the file server is to:
store data and software programs that can be used by client computers on the network.
_____________ is not a form of modulation used to transform digital data into analog signals.
synchronous time division
One underlying problem with a host-based network is that:
the server can get overloaded since it must process all messages
The fourth layer of the OSI model is called the __________ layer.
transport