Final Study (ALL Quiz) NETWORK CNET 56 Spring
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix. a. underscore ( _ ) b. backward slash ( \ ) c. forward slash ( / ) d. dash ( - )
c. forward slash (/)
A complex combination of topologies is known as a ____ topology. a. compound b. mixed c. hybrid d. mulitpart
c. hybrid
If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit. a. incorrect antenna placement b. SSID mismatch c. interference d. incorrect encryption
c. interference
Clients are able to exchange signals with satellites as long as they have a ____ path. a. proprietary b. directional c. line-of-sight d. view
c. line-of-sight
Security auditing is handled by ____. a. communication services b. access services c. network management services d. Internet services
c. network management service
A program similar to mtr, ____, is available as a command-line utility in Windows operating systems. a. route b. dig c. pathping d. nbstat
c. pathping
A(n) ____ number is the address on a host where an application makes itself available to incoming or outgoing data. a. destination b. application c. port d. source
c. port
The ____ utility allows you to view a host's routing table. a. dig b. nbstat c. route d. pathping
c. route
The data transmission characteristic most frequently discussed and analyzed by networking professionals is ____. a. noise b. cost c. throughput d. scalability
c. throughput
The distance between corresponding points on a wave's cycle is called its ____. a. phase b. frequency c. wavelength d. amplitude
c. wavelength
____ is the least popular WLAN standard. a. 802.11n b. 802.11g c. 802.11b d. 802.11a
d. 802.11a
____ services allow remote users to connect to the network. a. Remote b. Management c. Connection d. Access
d. Access
Which OSI model layer initiates the flow of information? a. Physical b. Presentation c. Session d. Application
d. Application
The phenomenon of offering multiple types of communications services on the same network is known as ____. a. multi-communications b. divergence c. unified communications d. convergence
d. Convergence
Upon creation, each vNIC is automatically assigned a ____. a. reference address b. switch address c. block address d. MAC address
d. MAC address
An example of a popular client email software is ____. a. MIME b. Sendmail c. Microsoft Exchange Server d. Microsoft Outlook
d. Microsoft Outlook
A directional antenna issues wireless signals along a(n) ____ direction. a. narrow b. wide c. open d. single
d. Single
In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address. a. limited b. subnet c. stateful d. classful
d. classful
A physical topology ____. a. specifies addressing schemes b. specifies connectivity methods c. specifies device types d. depicts a network in broad scope
d. depicts a network in broad scope
To establish a satellite Internet connection, each subscriber must have a ____. a. line-of-sight antenna b. dish pathway c. source pathway d. dish antenna
d. dish antenna
In classful addressing, the Class B IPv4 address network ID is located in the ____. a. first 8 bits b. last 8 bits c. last 16 bits d. first 16 bits
d. first 16 bits
Standards define the ____ performance of a product or service. a. maximum acceptable b. most acceptable c. ideal d. minimum acceptable
d. minimum acceptable
Transport layer protocols break large data units into ____. a. PDUs b. block IDs c. frames d. segments
d. segments
A ____ uses very little hard disk space or processing power from the workstation on which it is installed. a. thick client b. virtual client c. fat client d. thin client
d. thin client
To connect to a network, a virtual machine requires a ____. a. virtual MAC address b. virtual switch c. physical switch d. virtual adapter
d. virtual adapter
The most popular method for connecting nodes on a network is circuit switching. True or False
False
The simplest form of a network is a client/server network. True or False
False
The strength of an electrical signal is directly proportional to its frequency. True or False
False
WiMAX is defined by the IEEE 802.11 standard. True or False
False
A serial backbone is the simplest kind of backbone. True or False
True
ATM is a WAN technology that functions in the Data Link layer. True or False
True
Advances in NIC technology are making this hardware smarter than ever. True or False
True
Bridges are protocol independent. True or False
True
For greater network efficiency, segmentation is preferred. True or False
True
Hands-on experience to improve networking hardware and software skills is important when attempting to enter the networking field. True or False
True
ICMP (Internet Control Message Protocol) reports on the success or failure of data delivery. True or False
True
Modern Ethernet networks are based on the star topology. True or False
True
Modulation can be used to make a signal conform to a specific pathway. True or False
True
Not all Transport layer protocols are concerned with reliability. True or False
True
On a network using TCP/IP, some nodes may use multiple IP addresses. True or False
True
POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time. True or False
True
SONET specifies framing and multiplexing techniques at the Physical layer. True or False
True
Spread spectrum is a popular way of making wireless transmissions more secure. True or False
True
The maximum distance a signal can travel and still be interpreted accurately is equal to a segment's maximum length. True or False
True
Wireless signals experience attenuation. True or False
True
The most common 1-Gigabit Ethernet standard in use today is ____. a. 1000Base-LX b. 10GBase-SR c. 1000Base-SX d. 1000Base-T
a. , b. or d.
1000Base-SX has a maximum throughput of ____. a. 1 Gbps b. 100 Gbps c. 1000 Gbps d. 10 Gbps
a. 1 Gbps
The default subnet mask for a Class B network is ____. a. 255.255.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.255.255
a. 255.255.0.0
The most common logical topologies are ____ and ring. a. bus b. hybrid c. star d. wired
a. Bus
In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ____ network. a. C b. D c. A d. B
a. C
In wireless communication, to exchange information, two antennas must be tuned to the same ____. a. frequency b. variance c. attenuation speed d. port
a. Frequency
The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations. a. OC (Optical Carrier) level b. BRI (Basic Rate Interface) c. CIR (committed information rate) d. DS0 (digital signal, level 0)
a. OC (optical Carrier) level
In which OSI model layer do hubs operate? a. Physical b. Physical and Data Link c. Data Link d. Network
a. Physical
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____. a. RAM b. CMOS c. ROM d. EEPROM
a. RAM
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____ a. STP (Spanning Tree Protocol) b. OSPF (Open Shortest Path First) protocol c. BGP (Border Gateway Protocol) d. RIP (Routing Information Protocol)
a. STP (Spanning Tree Protocol)
Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput. a. security b. costs c. noise d. access
a. Security
In which OSI model layer does TCP operate? a. Transport b. Physical c. Network d. Data Link
a. Transport
Most cloud service providers use virtualization software to supply multiple platforms to multiple users. a. True b. False
a. True
TCP is a(n) ____ subprotocol. a. connection-oriented b. open-ended c. connectionless d. indiscriminating
a. connection-oriented
A ____ is a specialized device that allows multiple networks or multiple parts of one network to connect and exchange data. a. connectivity device b. node c. host d. segment
a. connectivity device
Which network model ensures that no computer on the network has more authority than another? a. peer-to-peer b. stand alone c. distributed d. client/server
a. peer-to-peer
In the case of dial-up networking, the term ____ refers to a modem. a. serial connection b. virtual connection c. POTS connection d. physical connection
a. serial connection
A digital signal composed of a pulse of positive voltage represents a(n) ____. a. 4 b. 1 c. 8 d. 0
b. 1
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information. a. last eight b. 1 c. first eight d. 0
b. 1
1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable. a. 100 b. 10 c. 2 d. 5
b. 10
Which IEEE standard describes specifications for wireless transmissions? a. 802.5 b. 802.11 c. 802.3 d. 802.1
b. 802.11
Which connector is used in RS-232 transmissions? a. ST b. DB-25 c. BNC d. Cat-5
b. DB-25
A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO. a. terminal adapter b. DSLAM c. terminator d. smart jack
b. DSLAM
____ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table. a. Static b. Dynamic c. Temporary d. On-demand
b. Dynaming
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on. a. True b. False
b. False
The software required to establish VPNs is usually expensive. a. True b. False
b. False
____ satellites are the type used by the most popular satellite data service providers. a. Medium earth orbiting b. Geosynchronous earth orbiting c. Transponder d. Low earth orbiting
b. Geosynchronous earth orbiting
In which OSI model layer does IP operate? a. Physical b. Network c. Data Link d. Transport
b. Network
Collectively, MPLS labels are sometimes called a ____. a. title b. shim c. header d. frame
b. Shim
The speed of a T-carrier depends on its ____ level. a. channel b. signal c. traffic d. hierarchy
b. Signal
At its most primitive, a ____ is a repeater with more than one output port. a. base b. hub c. switch d. bridge
b. hub
ISDN PRI uses ____ B channels and one 64-Kbps D channel. a. 10 b. 32 c. 23 d. 12
c. 23
The serial interface on the back of the connectivity device is often labeled "____." a. Board b. Port c. Console d. Connector
c. Console
Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches. a. STP b. multiport c. content d. peripheral
c. Content
A VPN tunneling protocol operates at the ____ layer. a. Session b. Network c. Data Link d. Application
c. Data Link
____ refers to dialing directly into a private network's or ISP's remote access server to log on to a network. a. Virtual networking b. Traditional networking c. Dial-up networking d. Dialed networking
c. Dial-up networking
____ describes a popular serial data transmission method. a. EIA/TIA 568BA standard b. EIA/TIA 568A standard c. EIA/TIA RS-232 (Recommended Standard 232) d. EIA/TIA Commercial Building Wiring Standard
c. EIA/TIA RS-232 (Recommend Standard 232)
____ means that a telephone company connects residential users to its network with fiber-optic cable. a. OLT b. PON c. FITH d. FITL
c. FITH
____ services refer to the capability of a server to share data files, applications, and disk storage space. a. Management b. Access c. File d. Data
c. File
A common way of sharing resources on a peer-to-peer network is by modifying the ____ controls using the computer's operating system. a. resource-sharing b. file-serving c. file-sharing d. resource-monitoring
c. File-Sharing
____ describes wiring that connects workstations to the closest telecommunications closet. a. Simple wiring b. Backbone wiring c. Horizontal wiring d. Work area
c. Horizontal wiring
____ operates at the Network layer and manages multicasting. a. ICMP b. IP c. IGMP d. UDP
c. IGMP
In addition to viewing its LEDs and using a loopback plug to test a NIC's functionality, you can also check a NIC's connectivity with ____. a. special switches b. special clients c. simple commands d. special software
c. Simple commands
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes. a. Dynamic b. Best path c. Static d. Link-state
c. Static
___ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. a. FTP b. NTP c. Telnet d. NNTP
c. Telnet
____ connect vNICs with a network, whether virtual or physical. a. Virtual duplexers b. Virtual crossovers c. Virtual bridges d. Virtual routers
c. Virtual bridges
A ____ connection is one in which a user connects her computer, via a modem, to a distant network and stays connected for a finite period of time. a. direct b. virtual c. dial-up d. remote
c. dial-up
All protocols are routable. True or False
False
Clients on a client/server network share their resources directly with each other. True or False
False
If your network does not need or use APIPA, it must be uninstalled to avoid conflicts. True or False
False
In a star topology, a single connection failure will halt all traffic between all sites. True or False
False
It is best to perform connectivity tests on a computer connected to a live network. True or False
False
The Application layer includes software applications. True or False
False
The MIME standard replaces SMTP. True or False
False