Networking Chapter 8, exam

Ace your homework & exams now with Quizwiz!

One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.

Answer: False

The Simple Mail Transfer Protocol is the least commonly used e-mail standard.

Answer: False

The World Wide Web was conceived at University of Utah as part of the development of the Internet.

Answer: False

The application architecture called the distributed computing model uses the "thick" client approach.

Answer: False

The earliest data communications networks were client-server networks.

Answer: False

The two-tier e-mail architecture does not require any application software on the client computer.

Answer: False

To use the Web, each client computer requires a data link layer software package called a Web browser.

Answer: False

Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.

Answer: False

A network computer is designed primarily to communicate using Internet based standards, but has no hard disk. It has only limited functionality.

Answer: True

In a client-server network, the presentation logic is the responsibility of the client computer.

Answer: True

In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.

Answer: True

Middleware is the software that sits between the application software on the client and the application software on the server.

Answer: True

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.

Answer: True

A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands. (True or False)

False

An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network. (True or False)

False

Host-based and client-based networks are similar in that the client computer performs most of the work. (True or False)

False

The Simple Mail Transfer Protocol is the least commonly used e-mail standard. (True or False)

False

The World Wide Web was conceived at University of Utah as part of the development of the Internet. (True or False)

False

The World Wide Web was conceived at University of Utah as part of the development of the Internet. (True or False)

False

The application architecture called the distributed computing model uses the "thick" client approach (True or False)

False

The standard protocol for communication between a Web browser and a Web server is the web protocol. (True or False)

False

The two-tier e-mail architecture does not require any application software on the client computer. (True or False)

False

To use the Web, each client computer requires a data link layer software package called a Web browser.

False

To use the Web, each client computer requires a data link layer software package called a Web browser. (True or False)

False

Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. (True or False)

False

baseline

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.

Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. (True or False)

True

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. (True or False)

True

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. (True or False)

True

The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data. (True or False)

True

Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. (True or False)

True

Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture.

True

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

The standards H.320, H.323, and MPEG-2 are commonly used with

Videoconferencing

The ________________ cloud deployment model provides the highest levels of control, privacy and security.

private

Host-based and client-based networks are similar in that the client computer performs most of the work.

Answer: False

________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet

10/100 Ethernet

IEEE 802.11ac runs on which of the following two different frequency spectrums simultaneously? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz

2.4GHz and 5GHz

How many channels does 802.11g provide for communication with clients, a. 20 b. 12 c. 10 d. 3 e. 8

3

The maximum data rate of a an 802.11ad WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps

54 Mbps

An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.

Answer: False

building-block

Nowadays, most organizations use a simpler approach to network design called the ___________ approach.

The maximum data rate of an 802.11g WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps

54 Mbps

How many channels does the 802.11ac standard provide for communication between the access point and clients? a. 4 b. 6 c. 8 d. 11 e. 2

8

802.11g is backward compatible with which type of LAN? a. 802.11a b. 802.11b c. 802.15 d. 802.3 e. 802.5

802.11b

The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________. a. 802.11n b. 802.11a c. 802.3 d. 802.11b e. 802.11g

802.11n

Which of the following standards is backward compatible with IEEE802.11a, b, and g? a. 802.11a b. 802.11b c. 802.11g d. 802.11n e. 802.15

802.11n

Which of the following is not a WLAN standard? a. 802.11ac b. 802.11a c. 802.3 d. 802.11b e. 802.11g

802.3

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software

Answer: B

As the demand for more and more network applications grow; host-based computing becomes the best solution.

Answer: False

turnpike effect

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.

The backbone architecture layer that is closest to the users is the a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Access layer

80

According to one rule of thumb, ______ percent of circuit loading information is easy to gather.

Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.

All of the above are true statements.

An N-tiered architecture: a. is generally more "scalable" than a three-tiered architecture b. is generally less "scalable" than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers

Answer: A

In the three tier architecture the software on the client computer is responsible for____________. a. presentation logic b. application logic c. data access logic d. data storage e. application storage

Answer: A

There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header

Answer: A

To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package

Answer: A

_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

Answer: A

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n

Answer: B

An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

Answer: B

Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla

Answer: B

One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

Answer: B

The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher

Answer: B

With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic. a. Application; presentation b. Presentation; data access c. Data access; presentation d. Application; data access e. Presentation; application storage

Answer: B

A "thick client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network

Answer: C

Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures

Answer: C

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. browser b. application web c. web server d. operating system e. none of the above

Answer: C

How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server

Answer: C

In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer

Answer: C

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. user agent d. Webcast package e. gateway agent

Answer: C

The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language

Answer: C

With respect to costs for a client-server network, which of the following is true? a. Personal computers used as clients in a client-server network cost about the same as mainframes for the same amount of computing power. b. More network capacity, which costs more money, is required for client-server networks than for client-based networks. c. Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper. d. Updating the network with new version of software tends to be less expensive in a client-server network since the software is centralized in one client. e. None of the above

Answer: C

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

Answer: C

A "thin client" architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network

Answer: D

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture

Answer: D

One disadvantage of the ____________ architecture is that places a greater load on the network. a. two-tier b. three tier c. one-tier d. n-tier e. layered

Answer: D

To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library

Answer: D

With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic

Answer: D

________ is the presentation of information to the user and the acceptance of the user's commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

Answer: D

IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

Answer: E

There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body

Answer: E

Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage

Answer: E

A "thin client" approach places most of the application logic on the client.

Answer: False

A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands.

Answer: False

All three parts (request line, request header, request body) of an HTTP request from a web browser to a web server are required when a request is made.

Answer: False

The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.

Answer: True

Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.

Answer: True

____________ is not an important middleware standard.

Asynchronous Transfer Mode (ATM)

CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance

Carrier Sense Multiple Access with Collision Avoidance

technology design

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________

The _________ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Core layer

Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva

DEC, Xerox, and Intel

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services

Directory Services

The _______ is the part of the backbone that connects the LANs together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

Distribution layer

much more

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.

capacity planning

Estimating the size and type of the "standard" and "advanced" network circuits is called _________.

With respect to costs for a client-server network, which of the following is true?

Experts believe that client server architectures can be complex, but that developing application software for host based architectures is usually cheaper.

A "thin client" approach places most of the application logic on the client. (True or False)

False

Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system

PAD

__________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables

Hubs provide a complicated way to connect network cables

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________.

Hypertext Transfer Protocol

WiGig is standardized as a. IEEE 802.11ad b. IEEE 802.11ac c. IEEE 802.11n d. IEEE 802.11g e. IEEE 802.11a

IEEE 802.11ad

VLANs prioritize traffic based on the ______. a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics

IEEE 802.1q standard

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data.

IaaS

needs analysis

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.

technology design

In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.

the goal is to understand what users and applications the network will support

In needs analysis:

the decisions for fundamental technology/protocols and circuit capacity are interrelated

In the technology design stage of network design,

Which of the following is not true about 10/100 Ethernet? a. It is not a hybrid type of Ethernet. b. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time. c. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client's NIC and use 10 Mbps or 100 Mbps, depending on what the client uses. d. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. e. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term.

It is not a hybrid type of Ethernet.

Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit 'listen' before transmitting

It is used in token ring protocol LANs

Which of the following is not an advantage of instant messaging?

It usually takes days for an IM message to be delivered to the recipient.

LAN bottlenecks are usually found at the: a. data entry keyboard and client video monitors b. LAN server and network circuit c. hub repeaters and transducer circuit modules d. client operating system and diskette drive e. client hard drive and processor

LAN server and network circuit

___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control

Logical topology

In a host-based system with a mainframe, upgrades to the host are _____________.

Lumpy

With _____________, the AP permits the owner to provide a list of valid addresses that can connect. a. EAP. b. SSID c. WEP d. MAC address filtering e. SWEP

MAC address filtering

The software that runs on the mail server is referred to as the ____________

Mail transfer agent

Which of the following is not an example of a mail user agent software package?

Microsoft Word

Marc Andreessen led a team that developed the first graphical Web browser, which was called:

Mosaic

In a ___________ architecture, computers are both client and server, thus sharing the work.

Network

_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System

Network Operating System

One of the most frequently used Telnet applications is

PuTTY

Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access

QoS

Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE

RAID

Request for Proposal

RFP stands for:

A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

Routed backbone

_________ move packets along the backbone based on their network layer address. a. Bridged backbones b. Hubbed backbones c. Multistation access unit backbones d. Routed backbones e. NIC backbones

Routed backbones

_________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet

Securenet

____ is the process of creating several logically separate servers on the same physical computer. a. Server virtualization b. Server optimization c. Server proliferation d. Server platforming e. Server redundancy

Server virtualization

The most commonly used e-mail standard is:

Simple Mail Transfer Protocol

A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone

Switched backbone

_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones c. Hubbed backbones d. Bridged backbones e. Multistation access unit backbones

Switched backbones

Which of the following is not true about Telnet?

Telnet poses no security threat.

narrow and deep

The building block design approach is sometimes called

logical network design

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.

after the vendor(s) are selected

The large network purchases are done:

building backbone

The network architecture component that is sometimes referred to as the distribution layer is the

LAN

The network architecture component which enables users to access the network is the

Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to route the packet to the correct circuit/computer. e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily.

The physical topology is the same as the physical topology of shared Ethernet: a ring.

Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.

The switch has a physical bus topology.

rapidly growing

The traditional network design approach does not work well for _________ networks.

discover

There are some network modeling tools that can ________ the existing network.

Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.

They can only switch messages based on their data link layer addresses.

Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.

They tend to use lower speed circuits than LANs.

The idea for a special hypertext network, called the World Wide Web, was conceived of by:

Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989

issue an RFP to vendors

To estimate costs for large network purchases, organizations often:

A server farm is a group of computers that are linked together so they act as a one computer. (True or False)

True

Cloud-hosted virtual desktops are now available through a service called DaaS allowing users to access the same client computer (virtual desktop) from any computer and any location. (True or False)

True

In a client-server network, the presentation logic is the responsibility of the client computer. (True or False)

True

In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.

True

In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage. (True or False)

True

Middleware is the software that sits between the application software on the client and the application software on the server. (True or False)

True

A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

Virtual LAN

Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone

Virtual LAN

A second type of network that a wireless access point provides is a ______ that is secured by a separate password that is entered on a Web page when you first connect to the network. a. WI-LO network b. guest network c. transient network d. IEEE 802.temp e. IEEE 802.11guest

WI-LO network

To interact with the World Wide Web, a client computer needs an application layer software package called a:

Web browser

cost of advertising brochures for new products to be offered by an organization

Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?

focus on the growth in network use

Which of the following is a way to sell the network proposal to management?

non-necessary requirements

Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized?

specifications for a particular lighting fixture in the network operating center

Which of the following is not an example of a building block used in technology design?

an application will have drop down menu choices

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?

specific routers that have been chosen to implement the proposed network

Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams?

In designing LAN networks, network designers tend to err on the side of building too small a network

Which of the following is not true about network design?

Ethernet

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?

Peak circuit traffic

__________ is an estimate of the highest data volume on a link.

Most WiMAX providers in the US are using an effective data range of Select one: a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles

a. 0.5 to 1.5 miles

Some of the new applications being developed for a high-speed Internet include Select one: a. Tele-immersion b. Tele-conferencing c. QoS d. Broadband e. Tele-phoning

a. Tele-immersion

Which of the following is not true about switched Ethernet? Select one: a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. Most switches support full duplex circuits. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time.

a. The switch has a physical bus topology.

Which of the following is true regarding switched backbones? Select one: a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based

a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment

In general, tier 3 ISPs make money by charging ________. Select one: a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs

a. customers

Dynamic routing: Select one: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. does not add to the network traffic and should be used in all network environments d. is another term for static routing in WANs

a. imposes an overhead cost by increasing network traffic

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. Select one: a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

a. line splitter

In a ring design WAN, Select one: a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

a. messages can take a long time to travel from the sender to the receiver

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. Select one: a. much more b. much less c. about the same d. exactly the same e. a little more

a. much more

Which of the following is not a purpose for using hubs in a network? Select one: a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above

a. to act as a communications server

Which of the following is not a way in which network requirements, identified in the needs analysis of the building-block network design process, are organized? Select one: a. unnecessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate ANSWER

a. unnecessary requirements

A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub

access point

Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users' routines

add hidden nodes

Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network

adding new keyboards to the client computers

With a client-based network, one fundamental problem is that:

all data on the server must travel to the client for processing

10Base-T: a. supports 10 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct

all of the answers are correct

Which of the following is not a potential bottleneck for LAN performance? a. number and speed of hard disks in the server b. amount of memory in the server c. speed of server's CPU d. network interface card e. all of the answers are potential bottlenecks for LAN performance

all of the answers are potential bottlenecks for LAN performance

Which of the following is not a general function by any application program?

application access storage

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network.

application architecture

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.

application logic

How can a set of 802.11b access points be configured to operate without interference? a. assigning each access point a different channel to communicate with clients b. separate each access point by more than 10 meters c. assign the same channel to no more than two access points d. use omnidirectional antennas on some access points and directional on others. e. none of the above

assigning each access point a different channel to communicate with clients

One disadvantage of the ____________ architecture is that places a greater load on the network.

n-tier

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? Select one: a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps

b. Ethernet

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. Select one: a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines

b. Internet service providers

___________ is how the network works conceptually. Select one: a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control

b. Logical topology

__________ has led to the belief that the Internet is "free". Select one: a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

b. Peering

The network architecture component that is sometimes referred to as the distribution layer is the Select one: a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN

b. building backbone

A star topology is: Select one: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

b. dependent upon the capacity of the central computer for its performance

SONET: Select one: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is almost identical to the ITU-T standard, synchronous digital hierarchy (SDH) c. uses existing copper cabling and the PSTN network d. refers to Sprint Overall Network e. is not currently available, even in large cities

b. is almost identical to the ITU-T standard, synchronous digital hierarchy (SDH)

Which of the following is not a key deliverable for the cost assessment step of the building-block network design process? Select one: a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice

b. list of wish list requirements

Associated with a switched backbone, MDF is an acronym for: Select one: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility

b. main distribution facility

Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. Select one: a. multipoint b. point-to-point c. shared d. ring e. star

b. point-to-point

Mesh networks: Select one: a. usually provide relatively long routes through the network (compared to ring networks) b. typically contain more circuits in the network than in star or ring networks c. do not use decentralized routing d. typically are less expensive than ring networks e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

b. typically contain more circuits in the network than in star or ring networks

The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected

bus

WiMAX was designed to use the _______ frequencies. Select one: a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz

c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ

The data rate for a T-3 circuit in North America is: Select one: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

c. 44.376 Mbps

__________ is an estimate of the highest data volume on a link. Select one: a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer

c. Peak circuit traffic

Which of the following would be least effective in improving backbone performance? Select one: a. upgrading memory for devices in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between devices e. improving devices in the network

c. adding new keyboards to the client computers

Which of the following is not a basic architecture for dedicated circuit networks? Select one: a. ring b. partial mesh c. bus d. star e. full mesh

c. bus

A star architecture: Select one: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

c. connects all computers to one central computer that

The network architecture component which contains the organization's servers is called the Select one: a. LAN b. building backbone c. data center d. enterprise edge e. WAN

c. data center

A _______ is a connectionless method of sending data packets on a packet switched service. Select one: a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

c. datagram

Which of the following is not a technology layer that is considered when designing backbone networks? Select one: a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options

c. decentralized layer

A ____________ allows many users to share the same set of files on a common, shared disk drive. Select one: a. print server b. database server c. file server d. piconet server e. remote access server

c. file server

A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a ___________. Select one: a. ADS b. domain c. forest d. tree e. NDS

c. forest

1000 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 1000Base-SLCX

can run at either full- or half-duplex

Client-server architectures:

can use middleware to provide a standard way of communicating between software from more than one vendor

Which of the following would not be part of an "ideal" backbone design for the future? a. access layer composed of 10/100 layer 2 Ethernet switches b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T c. redundant switches d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber e. coax cabling throughout LANs and BN

coax cabling throughout LANs and BN

A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server

collision server

The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer.

community

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted?

compression

Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider

controlling access to a media by more than one computer in a LAN

The biggest drawbacks to VLANs are their_________________. a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size

cost and management complexity

______________ are sometimes called private line services. Select one: a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

d. Dedicated-circuit networks

Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. Select one: a. backbone b. switched c. routed d. QoS e. access

d. QoS

Which of the following is one of the tier 1 ISPs in North America? Select one: a. IETF b. IEEE c. IAB d. Sprint e. ISOC

d. Sprint

A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. Select one: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone

d. Switched backbone

Which of the following is not an effective way to reduce LAN network demand: Select one: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes

d. add hidden nodes

A digital service offered by cable companies is the _________. Select one: a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet

d. cable modem

A___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. Select one: a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

d. cable modem termination system

Media access control refers to: Select one: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider

d. controlling access to a media by more than one computer in a LAN

Device performance on a backbone network will not be improved by: Select one: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options

d. translating packets from one protocol to another as they enter the BN

With the two-tier client-server architecture, the server is responsible for the ________ logic.

data access

An application program function is __________, or the processing required to access data.

data access logic

The ___________ is where the organization housing its primary servers. a. MDF b. guest house c. SOHO network d. data center e. load balancer

data center

_________ is an application program function that deals with storing and retrieving data.

data storage

Which of the following is not a technology layer that is considered when designing backbone networks? a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options

decentralized layer

__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical

directional

A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint

domain

Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used

dumb terminals

The cheapest time to install network cabling is: a. during the construction of the building b. as soon as the building is completed c. as soon as the building is occupied d. about five years after the building is occupied so that the exact office locations for each network computer is known e. any time that a network needs to be installed

during the construction of the building

The _____ contains the servers that are designed to serve data to customers and suppliers. a. e-commerce edge b. SAN c. LAN d. domain controller e. bottleneck

e-commerce edge

Another term for a mail user agent is:

e-mail client

A subnetted or hierarchical backbone can also be called: Select one: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

e. Routed backbone

_________ is not a type of Ethernet specification. Select one: a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet

e. Securenet

Which of the following is not a current trend that is making the traditional design approach less appropriate for today's networks? Select one: a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware

e. The most expensive part of any network is the hardware

Which of the following is not true about Layer-3 switches? Select one: a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.

e. They can only switch messages based on their data link layer addresses.

Which of the following is false about staff costs for a network? Select one: a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities

e. When a variety of devices from different vendors are used in a network, it takes less time to perform network management activities

100Base-T: Select one: a. supports 100 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct

e. all of the answers are correct

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. Select one: a. building block b. access layer c. core layer d. cost assessment e. logical network design

e. logical network design

With a switched backbone network, the equipment is usually placed in a ______. Select one: a. server b. NIC c. cabinet d. basement e. rack

e. rack

Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia

encouraging the use of applications such as medical imaging

When a variety of devices are used in a network, it takes less time to perform network management activities

false about staff costs for a network?

Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair

fiber

A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server

file server

A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________. a. ADS b. domain c. forest d. tree e. NDS

forest

A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion

forwarding table

Which of the following is a mode in which a switch operates: a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching

fragment-free switching

Circuit capacity on a backbone network will not be improved by: a. going from 100Base-T Ethernet to 10Base-T Ethernet b. going from 100Base-T Ethernet to gigabit Ethernet c. adding additional circuits alongside heavily used ones d. replacing a shared circuit backbone with a switched circuit backbone e. providing a faster circuit to the server

going from 100Base-T Ethernet to 10Base-T Ethernet

When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: a. out of range problem b. collision problem c. hidden node problem d. controlled access problem e. media access problem

hidden node problem

An N-tiered architecture:

is generally more "scalable" than a three-tiered architecture

Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media

it has a very low capacity

Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches

learn addresses by reading the source and destination addresses

Wired Ethernet is a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. . a. host b. legacy c. caching d. hub e. peak

legacy

The ________ acts as a router at the front of the server farm. a. load router b. MDF c. Layer 2 switch d. front-end loader e. load balancer

load balancer

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:

mail user agent

Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility

main distribution facility

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.

mainframe

Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer

may also be called TCP/IP gateways

In a client-server network, _________ gets software from different vendors to work together.

middleware

A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list

network profile

An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.

not a step under the traditional network design approach?

implementation

not a step used in newer types of network design processes?

Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors

not contributing to the dramatic increase in network traffic today?

The most expensive part of any network is the hardware

not making the traditional design approach less appropriate for today's networks?

__________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical

omnidirectional

Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________. a. overlay networks b. Bluetooth c. cellular networks d. mobile networks e. Ethernet networks

overlay networks

Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches

patch cables

IMAP (Internet Message Access Protocol):

permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

Another name for distributed coordination function (DCF) is __________. a. distributed carrier sense method b. physical carrier sense method c. physical carrier sense mode d. distributed carrier sense mode e. distributed coordination mode

physical carrier sense method

Computers can be assigned to a VLAN based on the ________. a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer

physical port on the switch

A "thick client" architecture approach:

places all or almost all of the application logic on the client

A "thin client" architecture approach:

places all or almost all of the application logic on the server

Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star

point-to-point

With the two-tier client-server architecture, the client is responsible for the ________ logic.

presentation

In the three tier architecture, the software on the client computer is responsible for the ____________.

presentation logic

________ is the presentation of information to the user and the acceptance of the user's commands.

presentation logic

The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system

provide the software that performs the functions associated with the physical layer

10/100 Ethernet: a. uses 100 Mbps throughout the entire network b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use c. uses 10 Mbps throughout 100% of the entire network d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server e. uses 10 Gbps throughout 100% of the entire network

provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server

With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack

rack

Circuit loading

refers to the amount of data transmitted on a circuit.

If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)? a. adding one or more additional servers b. upgrading the server's CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable

replacing the cable with fiber optic cable

There are optional and required parts of an HTTP request. They are:

request line, request header, request body

Routers: a. require more management than switches b. are not susceptible to time delays c. use data link layer addresses to move packets that leave the subnet d. require only a few set of TCP/IP addresses e. don't need much time to establish separate subnet addresses for each LAN

require more management than switches

There are required and optional parts of an HTTP response. They are:

response status, response header, response body

A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone

routed backbone

Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above

to act as a communications server

Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet

routers can connect two or more networks that use the same data link protocol

Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber)

security (relative to fiber)

Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation

segmentation

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.

server

A ________ is a group of computers linked together so that they appear to act as one computer.

server farm

A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network. a. wide area network b. local area network c. storage area network d. storage server e. local area storage WAN

storage area network

Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11

sufficient memory

How are the application architecture functions split up in a client-server network?

the presentation logic is on the client, while the data storage and data access logic are on the server

A response status code of 404 means:

the requested page was not found

Which of the following is not determined by a site survey? a. feasibility of the desired coverage b. potential sources of interference c. the security of the WLAN d. estimated number of access points needed to provide coverage e. current locations of the wired network into which the WLAN will connect.

the security of the WLAN

One underlying problem with a host-based network is that:

the server can get overloaded since it must process all messages

Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable

there are many more networking devices in a switched backbone network

Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options

translating packets from one protocol to another as they enter the BN

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.

two

To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can: a. increase the CPU of the server b. upgrade to a bigger circuit c. increase the number of hard disks on the server d. increase the amount of disk capacity of the server e. increase the amount of memory of the server

upgrade to a bigger circuit

Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building c. use a star topology with one device, usually a switch d. have a great deal of cable in their backbones e. tend to have less cable, but more network devices

use a star topology with one device, usually a switch

Switch-based Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously

usually enables all attached circuits to send or receive packets simultaneously

Hubs: a. usually incorporate repeaters or amplifiers b. have connection points called handles c. limit the distance of a network to a few meters in length d. are a difficult method to connect network cables e. operate at the application layer

usually incorporate repeaters or amplifiers

_____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. a. wardriving b. chalking c. warchalking d. marking e. identifying

warchalking

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.

web server

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user.

webcasting

A(n) _____________ is used in a computer to connect it to a WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub

wireless NIC


Related study sets

Chapter 26: Safety, Security, and Emergency Preparedness

View Set

(Verbal, Dramatic, Situational) Irony Examples & Definitions

View Set

History of Rock and Roll Chapters 1-5

View Set