Network System Basics Chapter 1-6

Ace your homework & exams now with Quizwiz!

type of address that is automatically assigned when no DHCP server can be contacted

APIPA

A method of IP addressing in which the network and host IDs are determined by a prefix number that specifies how many bits of the IP address are network bits.

CIDR

16. access method used by Wi-Fi

CSMA/CA

17. devices on the network must listen first before they can transmit

CSMA/CD

34. indicates that the wireless computer can transmit data

CTS

dynamically assigns IP addresses

DHCP

resolves computer names to IP addresses

DNS

an equipment and cabling room that serves as the connecting point for backbone cabling between buildings and between IDFs

MDF

14. A frame is a packet that has been encapsulated with the source and destination MAC addresses in the header and an error-checking code in the trailer. a. True b. False

a. True

23. What type of logical topology is at work when using an Ethernet hub? a. logical bus b. logical ring c. switched topology d. hierarchical topology

a. logical bus

20. Which part of the address www.marketing.localdomain.org is the top-level domain name? a. org b. www c. localdomain d. marketing

a. org

3. You are instructing a cable installer where to run the UTP cable that goes from the work area on the third floor of your building to the place where it connects with a patch panel and switches. To which facility should you tell the installer to run the cable? a. MDF b. IDF c. Equipment room d. Point of presence

b. IDF

16. What component of the computer contains a MAC address? a. motherboard b. NIC c. CPU d. BIOS

b. NIC

19. uses an analog signal to send multiple signals simultaneously

broadband

8. A __________ frame is a message that is intended to be processed by all devices on the LAN.

broadcast

The bounds of a network that defines which devices must receive a packet that's broadcast by any other device

broadcast domain

24. You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. Which network model would be the most appropriate for your situation a. internetwork b. domain c. peer-to-peer network d. server-based network

c. peer-to-peer network

22. Which of the following is the physical topology that is daisy-chained like a bus where the cabling is brought around from the last device to the first device? a. physical bus b. physical star c. physical ring d. point-to-point

c. physical ring

31. What is the hexadecimal number F equal to in binary? a. 0011 b. 1011 c. 1001 d. 1111

d. 1111

36. designated port on a hub or switch used to connect to another hub or switch

uplink port

4. resolves an IP address to a MAC address

ARP

An autoconfigured IPv6 host address that uses the MAC address of the host plus an additional 16 bits.

EUI-64

a telecommunications closet that houses the cabling and devices for work area computers

IDF

A value used to express how many bits of an IP address are network ID bits.

IP Prefix

an extension to IP working at the Internetwork layer that provides security by using authentication and encryption

IPsec

use infrared signals to communicate

IrDA device

a network that connects devices in a small geographic area

LAN

Transport layer protocol that is connection-oriented and reliable

TCP

Transport layer protocol that is connectionless

UDP

An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network.

USATAP

network that is geographically dispersed

WAN

8. In an MDI device, which two pins does the device use to transmit? a. 1 and 2 b. 3 and 4 c. 4 and 6 d. 3 and 6

a. 1 and 2

6. What is the decimal equivalent to the hexadecimal number D? a. 13 b. 15 c. 12 d. 10

a. 13

18. You computer's IP address is 201.18.149.37/28. Which of the following is a valid default gateway for this address? a. 201.18.149.46 b. 201.18.149.17 c. 201.18.149.32 d. 201.18.149.48

a. 201.18.149.46

28. How many host addresses are available on a Class C network? a. 254 b. 256 c. 65534 d. 65536

a. 254

19. Which subnet mask should you use if you want 16 bits of host address space? a. 255.255.0.0 b. 255.16.0.0 c. 255.255.255.16 d. 255.255.255.0

a. 255.255.0.0

25. Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses? a. ARP b. ICMP c. DHCP d. IP

a. ARP

5. What is the media access method used by Ethernet? a. CSMA/CD b. Token passing c. CSMA/CA d. Polling

a. CSMA/CD

3. Which of the following is true about hubs? a. Devices on a hub have to share the available bandwidth. b. they can operate in full-duplex and half-duplex mode. c. they maintain a table of MAC addresses. d. they can handle several computer conversations simultaneously.

a. Devices on a hub have to share the available bandwidth.

28. Which protocol uses TCP port 21 by default? a. FTP b. ARP c. IMAP d. ICMP

a. FTP

24. Which of the following are solutions to the shortage of available IPv4 addresses? (Choose all that apply.) a. IPv6 b. private addressing c. subnetting d. supernetting e. NAT

a. IPv6 b. private addressing c. subnetting e. NAT

10. In which layer does Ethernet operate? a. Network Access b. Internetwork c. Transport d. Application

a. Network Access

11. What type of wireless transmission technology is used for 802.11n networks running at 2.4 GHz? a. OFDM b. laser. c. DSSS d. narrowband radio

a. OFDM

30. With which kind of Wi-Fi antennas does the signal radiate out with equal strength in all directions? a. Omnidirectional b. Unidirectional c. Multidirectional d. Semidirectional

a. Omnidirectional

14. In some wireless network configurations, a computer must send a special message to the AP before it can transmit data. What is this message called? a. RTS b. ARP c. CTS d. DNS

a. RTS

4. You will be installing UTP cable at a new facility. You have concerns that some of the cable runs are excessively long. What tool should you use to determine the length of your cable runs? a. TDR b. Multimeter c. OPM d. Tone generator

a. TDR

15. What does a switch store in its switching table? a. The frame's source MAC address and the port it was received on. b. The frame's destination MAC address and the port it was received on. c. The frame's source IP address and the port it was received on. d. The frame's destination IP address and the port it was received o

a. The frame's source MAC address and the port it was received on.

31. Which of the following is NOT a field in an Ethernet frame header? a. Time-to-Live b. Type c. FCS d. source MAC

a. Time-to-Live

11. A domain is a collection of users and computers whose accounts are managed by Windows servers called domain controllers. a. True b. False

a. True

12. The three basic functions of a computer are input, processing, and output. a. True b. False

a. True

13. The process of encapsulation adds IP addresses and then MAC addresses to chunks of data before sending the data onto the network. a. True b. False

a. True

15. What makes a computer a "server" is the fact that it has a server operating system installed on it. a. True b. False

a. True

2. IF you want to run cabling in the space between a false ceiling and the true ceiling, you must use plenum-rated cable. a. True b. False

a. True

26. A network that connects LANs in different countries is most likely a WAN. a. True b. False

a. True

3. What is one of the disadvantages of a server-based network compared to a peer-to-peer network? a. additional costs b. decentralized data access. c. difficult to expand d. less secure

a. additional costs

26. Which of the following are true about routers? (Choose all that apply.) a. break up a network into functional groups b. make larger broadcast domains c. work with IP addresses d. forward broadcasts out all connected ports e. allow computers on different networks to communicate

a. break up a network into functional groups c. work with IP addresses e. allow computers on different networks to communicate

30. Which of the following is a feature of TCP? (Choose all that apply.) a. breaks large chunks of data into segments b. converts signals into bits c. provides data-formatting services d. ensures flow control e. establishes a connection

a. breaks large chunks of data into segments d. ensures flow control e. establishes a connection

29. What is an advantage of a point-to-point topology? a. data travels on a dedicated link b. provides redundancy and fault tolerance c. allows many end-device connection d. a reliable and fast backbone

a. data travels on a dedicated link

30. Which of the following are components of wireless networks? (Choose all that apply.) a. emitter b. patch panel c. antenna d. AP e. SMA connectors

a. emitter c. antenna d. AP

16. An IP address consists of four octets separated by periods. Which part of this address denotes its class? a. first octet b. second octet c. third octet d. fouth octet

a. first octet

2. Which of the following are examples of output devices? (Choose all that apply.) a. monitor b. printer c. keyboard d. speakers e. CPU

a. monitor b. printer d. speakers

9. Which of the following are examples of input devices? (Choose all that apply.) a. mouse b. monitor c. keyboard d. scanner e. printer

a. mouse c. keyboard d. scanner

6. You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What type of CPU are you looking for? a. multicore b. miltiprocessing c. multitasking d. multilink

a. multicore

11. What is the unit of information called after the Internetwork layer places its header on a datagram? a. packet b. segment c. data d. frame

a. packet

21. What command would you issue from the command prompt to test whether your computer has connectivity to the network? a. ping IPaddress b. arp -d IPaddress c. ipconfig IPaddress d. ipconfig /all

a. ping IPaddress

1. Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals from sender to receiver and is often used with TV remotes? a. scatter infrared b. laser c. narrowband radio d. microwave

a. scatter infrared

1. On Windows, the tracert command uses the TTL value of the packet to ensure routers in the path send a response. a. true b. false

a. true

12. Protocols are sets of rules and procedures that dictate communication and behavior. a. true b. false

a. true

13. When copper wires are bundled together, they are susceptible to crosstalk, a form of interference where the signals leak out onto other wires. a. true b. false

a. true

14. What really determines the bandwidth of a cabling type is how fast a transmitting device, such as a NIC, can generate bit signals on the medium a. true b. false

a. true

15. Route summarization can combine multiple routing table entries into a single entry. a. true b. false

a. true

16. An OPM measures the amount of light transmitted by a device and whether the amount meets the requirements for the device you're connecting. a. true b. false

a. true

17. Network Address Translation helps with the IP address shortage problem by allowing an organization to use private IP addresses while connected to the Internet. a. true b. false

a. true

18. If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured. a. true b. false

a. true

19. A switch operating in full duplex mode can send and receive data at the same time. a. true b. false

a. true

20. Subnetting is a way of breaking a large address space into more, smaller, address spaces. a. true b. false

a. true

21. In order to find out your MAC address, you should open a command prompt and type ipconfig /all. a. true b. false

a. true

22. IPv6 addresses are written as eight 16-bit hexadecimal numbers separated by colons. a. true b. false

a. true

23. The four layers of the TCP/IP protocol suite are Application, Transport, Internetwork, and Network Access. a. true b. false

a. true

23. The name assigned to a wireless network is called the SSID. a. true b. false

a. true

25. Ping uses ICMP Echo packets to request a response from another computer to verify whether it's available for communication. a. true b. false

a. true

25. The physical bus topology is a continuous length of cable connecting one computer to another in daisy-chain fashion and terminated at both ends. a. true b. false

a. true

28. A network's physical topology refers to the arrangement of the cabling and how the devices connect to each other. a. true b. false

a. true

29. Wireless and wired networks are both susceptible to RFI. a. true b. false

a. true

3. An IPv6 address that can only be used on the internal internetwork and cannot be used to access the Internet is called a(n) unique local address. a. true b. false

a. true

30. A packet is a chunk of data with the source and destination IP addresses added to it. a. true b. false

a. true

32. In a large network, in which several switches need to be connected together, usually one device is placed at the center, forming a(n) extended star. a. true b. false

a. true

33. The Transport layer uses port numbers to identify the source and destination Application-layer protocol of the data that it contains. a. true b. false

a. true

33. With a unidirectional antenna, signals are focused in a single direction, which makes them ideal for placement at one end of long, narrow spaces or to cover distances between buildings. a. true b. false

a. true

34. ARP is used to resolve an IPv4 address to a MAC address. a. true b. false

a. true

36. The difference between operating in half-duplex mode or full-duplex mode is that you do not have collisions in half-duplex. a. true b. false

a. true

37. A network's logical topology often depends on the central device's electronics. a. true b. false

a. true

38. A mesh topology is fully redundant and is the most expensive to implement. a. true b. false

a. true

4. When a wireless computer connects with an AP before it connects with other devices, it is operating in infrastructure mode. a. true b. False

a. true

41. A point-to-point topology is typically used for WAN connections or wireless bridges. a. true b. false

a. true

7. IPv4 addresses are written in dotted decimal notation. a. true b. false

a. true

7. Routers do not forward broadcast packets. a. true b. false

a. true

9. To determine the network ID of an IP address, computers use a logical AND operation between the IP address and the subnet mask. a. true b. false

a. true

6. Because fiber-optic cabling uses light pulses instead of electrical signals, it is immune to interference and highly resistant to eavesdropping. a. true. b. false

a. true.

2. An address type used in IPv6 to allow a one-to-many relationship between source and destination.

anycast addresses

13. How many bits are available in an IPv6 network for creating subnets when the prefix is /48 and the host ID is 64 bits? a. 48 b. 16. c. 32 d. 64

b. 16.

29. Which of the following is an invalid IP address/prefix to assign to a host? a. 172.31.0.255/16 b. 172.16.255.128/25 c. 201.18.149.32/26 d. 10.255.0.0/8

b. 172.16.255.128/25

9. A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once. 1-backbone cabling 2-entrance facility 3-MDF 4-horizontal wiring 5-IDF 6-work area a. 2, 1, 3, 4, 5, 4, 6 b. 2, 1, 3, 1, 5, 4, 6 c. 6, 1, 3, 4, 5, 4, 6 d. 2, 1, 5, 1, 3, 4, 6

b. 2, 1, 3, 1, 5, 4, 6

17. An extranet is a private network, such as a school or company network, in which the devices and servers are available only to users connected to the internal network. a. True b. False

b. False

7. In which layer does a router operate? a. Network Access b. Internetwork c. Transport d. Application

b. Internetwork

8. When using the route command at a command prompt, which entry indicates the default route? a. Network Destination 255.255.255.255 Netmask 0.0.0.0 b. Network Destination 0.0.0.0 Netmask 0.0.0.0 c. Network Destination 0.0.0.0 Netmask 255.255.255.255 d. Network Destination 255.255.255.255 Netmask 255.255.255.255

b. Network Destination 0.0.0.0 Netmask 0.0.0.0

15. If you want a computer to be assigned the same IP address each time it requests an IP address, what DHCP option should you configure? a. Scope b. Reservation c. Exclusion d. gateway

b. Reservation

19. When a TCP session begins, what is the name of the first segment that is transferred? a. ACK b. SYN c. RST d. FIN

b. SYN

6. Which of the following is NOT an Application layer protocol? a. DNS b. TCP c. DHCP d. SMTP

b. TCP

13. Which of the following are Transport layer protocols? (Choose all that apply.) a. ICMP b. TCP c. DHCP d. UDP e. ARP i. IP

b. TCP d. UDP

39. What does it mean if the full-duplex indicator on a switch port is on? a. The switch is detecting collisions. b. The port can transmit and receive frames simultaneously. c. Bandwidth sharing is enabled d. The MAC address table is full.

b. The port can transmit and receive frames simultaneously.

28. The XYZ company has two offices, one in Chicago, and a brand new office in Pittsburgh. To connect the two offices, they will need a dedicated line, probably leased from the phone company. What type of network will they be implementing to connect their two offices? a. LAN b. WAN c. PAN d. SAN

b. WAN

39. When a wireless computer uses a peer-to-peer connection to directly connect to another wireless computer, it is operating in what mode? a. infrastructure b. ad hoc c. hot spot d. Wi-fi

b. ad hoc

28. You are running a length of fiber optic cable between two wiring closets. What best describes the cable you are running? a. structured cable b. backbone cable c. horizontal cable d. work area cable

b. backbone cable

29. Which unit of data stores a single value that can be a 0 or a 1? a. byte b. bit c. nibble d. word e. bps

b. bit

10. When referring to network bandwidth, what is the basic unit of measurement? a. bytes per second b. bits per second c. bandwidth per second d. bytes per minute

b. bits per second

16. Windows 10 is an example of which of the following? a. network protocol b. client operating system c. server software d. server operating system

b. client operating system

31. Which of the following are features of a router? (Choose all that apply) a. connects computers to the LAN b. connects LANs to one another c. works with MAC addresses d. forwards broadcast packets e. works with packets

b. connects LANs to one another e. works with packets

7. Which type of interference is caused by wires in the same cabling bundle? a. RFI b. crosstalk c. attenuation d. eavesdropping

b. crosstalk

22. Which of the following is NOT a function of the Network Access layer? a. transmits and receives bit signals b. delivers packets efficiently c. provides a MAC address for the network interface d. receives packets from the Internetwork layer and creates a frame

b. delivers packets efficiently

10. Although different networking standards specify different media, bandwidth, and media length, they all use the same type of encoding. a. true. b. false

b. false

11. A computer's default gateway setting is the MAC address of a router on a remote network. a. true b. false

b. false

17. The Internetwork layer includes the ICMP and TCP protocols of the TCP/IP suite. a. true b. false

b. false

17. When a NIC is in promiscuous mode, it will process only the frames in which the destination MAC address matches its own MAC address a. true b. false

b. false

18. Each component of a computer is designed to perform only one specific task-either input, processing, or output. a. true b. false

b. false

18. The first packet in the four-packet exchange between a DHCP client and server is the DHCPRequest. a. true b. false

b. false

22. Compared to SMF, MMF cable costs more and generally works with laser-based emitters but spans the longest distances and is used in higher-bandwidth applications. a. true b. false

b. false

23. The decimal equivalent of the binary number 10000001 is 133. a. true b. false

b. false

23. The length of cable between the wall jack and a patch panel is called vertical cabling. a. true b. false

b. false

24. CSMA/CD is Carrier Sense Many Access/Collision Detection. a. true b. false

b. false

27. An IP address is composed of 48 bits that are grouped together into 8-bit octets and are represented by a decimal number from 0 to 255. a. true b. false

b. false

27. The mac address is composed of two 12-bit numbers. a. true b. false

b. false

31. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs. a. true b. false

b. false

5. DNS is a protocol that automatically provides a computer with its IP address configuration. a. true b. false

b. false

7. A collision can occur on a switch only if the switch is operating in full-duplex mode. a. true b. false

b. false

8. IPv4 addresses are 128 bits in length and have a hierarchical address space. a. true b. false

b. false

9. The physical bus topology is no longer used because it required extra cable and a central device to connect all the computers. True a. true b. false

b. false

9. What are you likely to find in a DNS zone? a. MAC address-IP address pairs b. hostname-IP address pairs c. FQDN-MAC address pairs d. IP address-scope pairs

b. hostname-IP address pairs

1. You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement? a. WPAN b. internetwork c. WAN d. wireless network

b. internetwork

8. What command would you issue from a command prompt to see a listing of the computers in your workgroup? a. arp -a b. net view c. ipconfig /all d. ping

b. net view

25. Air waves are an example of what type of network component? a. network interface card b. network medium c. interconnecting device d. network protocol

b. network medium

27. In a physical bus topology, both ends of the medium must be terminated in order to prevent what? a. signal propagation b. signal bounce c. signal degradation d. collision

b. signal bounce

25. Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID? a. DNS address b. subnet mask c. default gateway d. MAC address

b. subnet mask

1. Which device receives a frame and reads the source and destination MAC addresses before forwarding the frame out another port? a. router b. switch c. repeater d. hub

b. switch

12. Which of the following is NOT one of the main differences between the types of network cabling? a. the distance that a signal can travel b. the ability to send and receive signals c. the type of signal that the media can transmit d. the speed at which the signal can be sent

b. the ability to send and receive signals

42. When discussing Ethernet standards, what does the XBaseY terminology refer to? a. the length or type of cabling, the transmission speed, and the type of transmissions b. the transmission speed, the type of transmissions, and the length or type of cabling c. the transmission speed, the length or type of cabling, and the type of transmissions d. the length or type of cabling, the type of transmissions, and the transmission speed

b. the transmission speed, the type of transmissions, and the length or type of cabling

6. What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer? a. route b. tracert c. ipconfig d. arp

b. tracert

2. Which of the following is NOT a function of a hub? a. cleans up the signal b. transmits the frame out the correct port. c. receives the signal from a connected computer on one of its ports. d. regenerates the signal

b. transmits the frame out the correct port.

4. What type of frame is addressed to a specific computer? a. broadcast b. unicast c. multicast d. anycast

b. unicast

20. You're the network administrator for a company located in Arizona that has just opened an office in Texas. You need to make sure that the two locations can communicate. What type of network are you implementing? a. MAN b.WAN c. internetwork d. extendend LAN

b.WAN

interconnects telecommunications closets and equipment rooms

backbone cabling

12. The network ____________ is a measurement of the amount of data that can pass through a network in a certain period of time.

bandwidth

32. how devices connected to a hub use network bandwidth

bandwidth sharing

20. sends a digital signal using the entire bandwidth

baseband

10. Your network address is 192.168.100.0. What prefix allows you to assign 30 host addresses? a. /29 b. /30 c. /27 d. /28

c. /27

4. You have just run the ipconfig command and after you did you see that your IP address is 0.0.0.0. What option did you use on the ipconfig command? a. /flush b. /all c. /release d. / renew

c. /release

25. What is the maximum cable length for both category 5e and category 6 UTP cable? a. 10 m b. 20 m c. 100 m d. 1000 m

c. 100 m

11. What is the network ID of the IP address 172.19.48.16 with subnet mask 255.255.240.0? a. 172.19.0.0 b. 172.19.32.0 c. 172.19.48.0 d. 172.19.240.0

c. 172.19.48.0

26. Which IP address is a Class C address? a. 225.100.149.20 b. 125.88.1.66 c. 193.19.101.11 d. 177.14.23.19

c. 193.19.101.11

16. Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results? a. MAC b. DNS c. ARP d. NAT

c. ARP

3. What happens to Wi-Fi signals when they pass through solid objects like walls? a. Diffraction occurs and the signals are amplified. b. Scattering and multipath occurs. c. Absorption occurs and the signals attenuate. d. Reflections occur causing attenuation.

c. Absorption occurs and the signals attenuate.

21. In wireless networks, what type of media access control is used? a. CSMA/CD b. Polling c. CSMA/CA d. Token passing

c. CSMA/CA

22. How does a switch "learn" MAC addresses? a. All the MAC addresses must be entered manually. b. The switch comes loaded with the most frequently used addresses. c. It reads the source address and keeps a record of which port the sending computer is on. d. The switch uses a mathematical formula to determine what the MAC address would be for each computer connected to it.

c. It reads the source address and keeps a record of which port the sending computer is on.

5. What is the purpose of the default route? a. It serves as a guideline for how to configure routes. b. It's a route set by Microsoft so that all information comes to their servers first. c. It's where the router sends all packets with destination addresses of which it has no knowledge. d. It's a route that all routers use to get to the Internet

c. It's where the router sends all packets with destination addresses of which it has no knowledge

19. Every NIC has a unique address that consists of a 12-digit hexadecimal value. What is this address called? a. IP address b. subnet mask c. MAC address d. default gateway

c. MAC address

3. What type of record do you need to create so the address of your mail server can be resolved? a. PTR b. CNAME c. MX d. SRV

c. MX

27. You are building a gaming computer and you want to install a dedicated graphics card that has a fast GPU and 4GB of memory on board. You need to make sure that you have the right connector available on your motherboard. What type of connector would be appropriate? a. PCI b. SATA c. PCI Express d. IDE

c. PCI Express

32. Which protocol is used to access a Windows desktop interface remotely? a. FTP b. SMB c. RDP d. SSH

c. RDP

21. Which Application layer protocols are used for file-sharing? (Choose all that apply.) a. DNS b. SNMP c. SMB d. DHCP e. NFS

c. SMB e. NFS

8. Which of the following is true about collisions? a. They can only happen with switches. b. They are a problem with Token Ring networks. c. They can occur on Ethernet half-duplex networks. d. Fewer computers means more collisions.

c. They can occur on Ethernet half-duplex networks.

5. An Ethernet cable runs across a warehouse that is 120 meters in length. The bit signals are so weak that they cannot be accurately read by the receiving station. What is the term for this problem? a. electromagnetic interference b. crosstalk c. attenuation d. radio frequency interference

c. attenuation

26. Which of the following is a function of the Internetwork layer? a. provides a physical address b. breaks data into segments c. delivers packets efficiently d. provides CRC error checking

c. delivers packets efficiently

17. The entrance facility is the place where the connection to a WAN is located. It is the point where the LAN equipment ends and a third-party provider's equipment and cabling begins. What is another name for this point? a. departure point b. entrance point c. demarcation point d. main distribution point

c. demarcation point

22. When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called? a. multitasking b. verification c. encapsulation d. application

c. encapsulation

9. A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers? a. switch. b. router c. hub d. modem

c. hub

18. Which of the following are types of infrared LANs? (Choose all that apply.) a. microwave b. narrowband c. line-of-sight d. reflective d. scatter

c. line-of-sight d. reflective d. scatter

34. Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling? a. contains four pairs of copper wire b. susceptible to electrical interference c. maximum speed is 100 Mbps d. omes in numbered categories

c. maximum speed is 100 Mbps

24. You hand a technician a crossover cable to make a connection between devices. Which device pair are you most likely asking him to connect? a. router to switch b. switch to computer c. switch to switch d. hub to computer

c. switch to switch

19. all the cables and connectors that tie a network together

cable plant

15. can occur when two devices on the same medium transmit simultaneously

collision

an instance of a processor inside a single CPU chip

core

20. What is the maximum bandwidth for a network cable using category 5e UTP cable? a. 10 Mbps b. 16 Mbps c. 100 Mbps d. 1000 Mbps

d. 1000 Mbps

12. If your original network address with prefix is 172.16.0.0/16, what should your new network address with prefix be if you need 16 subnets? a. 172.16.16.0/16 b. 172.16.0.0/24 c. 172.16.0.0/28 d. 172.16.0.0/20

d. 172.16.0.0/20

30. What is the decimal equivalent to the binary number 11100000? a. 98 b. 160 c. 196 d. 224

d. 224

1. Which Ethernet standard specifies speeds of 40 and 100 Gbps and can run up to 7 meters over copper? a. 802.3ae b. 802.3z c. 802.3u d. 802.3ba

d. 802.3ba

5. Which component, located on the motherboard, carries out all the instructions provided by computer programs? a. hard drive b. RAM c. NIC d. CPU

d. CPU

14. Which of the following is the correct order of DHCP packets when a computer requests its IP address configuration? a. DHCPDiscover, DHCPRequest, DHCPOffer, DHCPAck b. DHCPRequest, DHCPDiscover, DHCPOffer, DHCPAck c. DHCPOffer, DHCPRequest, DHCPDiscover, DHCPAck d. DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck

d. DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck

24. How can the web address www.cengage.com be described? a. root b. domain c. NetBIOS d. FQDN

d. FQDN

20. Which of the following is true about a NIC? a. For incoming messages, it creates frames from packets. b. For outgoing messages, it assembles bit signals into frames. c. For incoming messages, it adds a source and destination MAC address. d. For outgoing messages, it converts frame data into bit signals.

d. For outgoing messages, it converts frame data into bit signals.

26. Which of the following is NOT true about 2.5/5GBaseT Ethernet? a. It is defined by 802.3bz. b. It requires at least Cat 6A cabling. c. It has a maximum distance of 100 meters. d. It can be used as an uplink for 802.11ac networks.

d. It can be used as an uplink for 802.11ac networks.

5. You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 300 workstations that regularly access the Internet. What process must be in operation on your network to allow all the workstations to have access to the Internet using only one public IP address? a. DHCP b. DNS c. ARP d. PAT

d. PAT

40. In which topology does a central device communicate with two or more other devices and is used in WANs where a main office has connections to several branch offices via a router? a. logical Bus b. logical star c. switched d. Point-to-multipoint

d. Point-to-multipoint

38. A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent? a. A unique serial number assigned by the manufacturer. b. The address it uses for a multicast packet c. The decryption key used for security purposes. d. The organizationally unique identifier.

d. The organizationally unique identifier.

26. You are asked to make an inventory of all the cables and connections in your network. What are you being asked to inventory? a. telecommunications closets b. horizontal wiring c. work areas d. cable plant

d. cable plant

10. What is in an Ethernet frame's trailer? a. source MAC address b. destination MAC address c. frame payload d. cyclic redundancy check

d. cyclic redundancy check

1. Which of the following is a function of the Application layer? a. provides frame error detection in the form of a CRC code b. routes packets through an internetwork c. protects data with a checksum d. data formatting and translation

d. data formatting and translation

4. Which component manages the details of communicating with the NIC hardware to send and receive data to and from network media? a. client b. server software c. network protocol d. device driver.

d. device driver.

31. What type of wiring should be used for a high-speed connection between two buildings? a. coaxial cabling b. UTP cabling c. STP cabling d. fiber-optic cabling

d. fiber-optic cabling

13. What does a switch do if it doesn't find the destination MAC address in its switching table? a. sends an error to the sending device. b. discards the frame. c. sends an ARP to learn the MAC address. d. forwards the frame out all ports

d. forwards the frame out all ports

21. Which command displays the contents of the local DNS cache? a. ping /dns b. nslookup /show c. netsh show dnscache d. ipconfig /displaydns

d. ipconfig /displaydns

23. What is one of the disadvantages of a peer-to-peer network compared to a server-based network? a. more difficult to setup and install b. more expensive c. higher administration costs d. limited security.

d. limited security.

21. What is a disadvantage of using fiber-optic cabling versus twisted-pair cabling? a. limited to shorter distances due to high attenuation b. low bandwidth potential c. high susceptibility to eavesdropping d. more expensive terminations

d. more expensive terminations

2. In a token ring network, what is the central device called? a. multiport Ethernet switch b. multiservice switch c. multisession drive d. multistation access unit

d. multistation access unit

7. Which part of the network communication process is responsible for sending and receiving data to and from the network media? a. network software b. network protocol c. user application d. network interface

d. network interface

27. Which of the following is a length of cable that connects a computer to either a networking device or to an RJ-45 jack? a. patch panel b. cable segment c. backbone cable d. patch cable

d. patch cable

27. What is the unit of information that the Transport layer works with? a. frame b. packet c. signal. d. segment

d. segment

35. Which of the following is NOT an advantage of a physical star? a. easier network upgrades b. centralized monitoring and management of traffic c. use of faster technologies d. single point of failure

d. single point of failure

6. What is the most common topology and technology combination in use today? a. logical bus / Ethernet b. logical bus / wireless LAN c. logical ring / token ring d. switched / Ethernet

d. switched / Ethernet

14. The last 64 bits of an IPv6 address are the interface identifier. What is frequently used as part of the interface identifier? a. the IP address b. a DHCP server c. an ARP broadcast d. the MAC address

d. the MAC address

29. TCP establishes a connection with the destination device using which process? a. encapsulation b. flow control c. windowing d. three-way handshake

d. three-way handshake

2. What field in the Transport layer header can TCP adjust to provide flow control? a. segments b. sequence number c. SYN d. window size

d. window size

10. Using the physical mail analogy, what part of an address on an envelope is most like the IP address? a. MAC address b. street address c. recipient name d. zip code

d. zip code

the unit of information used by UDP in the Transport layer

datagram

29. routing table entry that tells a router where to send a packet with a destination network address that can't be found in the routing table

default route

a method for transmitting data in which two wires of opposite polarity are used

differential signal

a collection of users and computers in a Windows server-based network

domain

the method used to represent bits on a medium

encoding

24. In a computer's IP address settings, the default _____________ is the address of the router to which a computer sends all packets that are intended for networks outside of its own.

gateway

30. communication in which a device can send and receive signals but not at the same time

half-duplex mode

information added to the front end of a chunk of data

header

expresses how many times per second a signal or electromagnetic wave occurs

hertz

runs from work area's jack to telecommunications closet

horizontal wiring

15. A type of wireless network that uses light beams to send signals between two devices and is prone to interference from visible light sources is called ____________.

infrared

a networked collection of LANs tied together by devices such as routers

internetwork

An IP address that can be used to communicate only on the local subnet.

link-local address

11. how the data travels from one device to another

logical topology

An address that always refers to the local computer.

loopback address

18. a set of rules governing how and when the network medium can be accessed for transmission

media access method

13. connects every device to every other device

mesh topology

A value assigned to the gateway based on the speed of the interface used to access the gateway.

metric

A network communication in which a packet is addressed so that more than one destination can receive it.

multicasting

37. amount of data that can be transferred on a network in a specified interval

network bandwidth

35. device that connects a computer with the network medium

network interface card

the software defining the rules and formats a computer must use when sending information across the network

network protocols

the firmware of a computer is stored in this type of storage

nonvolatile memory

a chunk of data with source and destination IP addresses in the header

packet

connects a patch panel port to a switch or hub

patch cable

12. how the cables connect one device to another

physical topology

14. direct connection between two devices

point-to-point topology

specifies the source or destination Application-layer protocol

port number

33. device that only regenerates incoming signals

repeater

data contained in a DNS zone

resource record

31. device that connects LANs

router

the term used to describe an OS designed mainly to share network resources

server

28. device that uses MAC addresses to determine the destination of frame

switch


Related study sets

Chapter 1 Operations and Productivity

View Set

3.07 Quiz: Energy During Collisions

View Set

HD Quiz 14: Diagnosing Cancer: Lab tests, Imaging, and Biopsy

View Set

AP Marco: Edge Ex: Real and Nominal Values

View Set

MKT 350: Chapter 15 Practice Problems

View Set

Cultural Anthropology Quizzes (still need 15)

View Set