Final Review. Review Questions 1. The shielding on UTP wire is typically made from ____________. a....

Post on 28-Dec-2015

215 views 1 download

transcript

Network Introduction, Network Introduction, Overview and ClassificationOverview and Classification

Final Review

Review Questions

1. The shielding on UTP wire is typically made from ____________.a. Kevlarb. Teflonc. PCBsd. none of the above

Review Questions

2. As of 2008, the most popular networking cable to install in new office buildings is ______________.a. optical fiberb. CAT 1c. CAT 3d. CAT 5

Review Questions

3. Management’s statement of the importance of and their commitment to network security is called the ______________.a. network security standardb. network security strategyc. network security policyd. statement of network intent

Review Questions

4. An example of a passive security attack is ________________.a. altering message contentsb. masqueradingc. all of the aboved. none of the above

Review Questions

5. Voice scrambling __________________.a. makes the voice transmission unintelligible to anyone

who does not have a descramblerb. can be circumvented by wiretappingc. all of the aboved. none of the above

Review Questions

6. Finding qualified people to fill networking positions is a management function called ______________.a. recruitingb. staffingc. organizingd. controlling

Review Questions

7. Asking another company to take over the design, implementation, and operation of a network is called _____________.a. retrenchingb. outplacingc. insourcingd. outsourcing

Review Questions

8. Performance reporting should ______________.a. look at current performance but not historical

performanceb. provide data so performance trends can be seenc. provide detailed data to senior managementd. only be done monthly

Review Questions

9. The “killer ap” of internetworking since its earliest days was _____________.a. FTPb. e-mailc. instant messagingd. inquiry of customer’s sales records

Review Questions

10. J.C.R. Licklider’s contribution to internetworking was important because ______.a. his ideas inspired later developmentsb. he created the first RFCc. his inventions were the basis for Ethernetd. his money funded computer research

Review Questions

11. The thousands of databases on the Internet that cannot be located by search engines are collectively called ______________.a. subject directoriesb. portalsc. the hidden Webd. the invisible Web

Review Questions

12. When a URL does not contain a filename after the slash mark, the Web server automatically delivers the default file, which is most often called __________.a. mypage.htmlb. index.htmlc. index.comd. www.html

Review Questions

13. Extensible markup language (XHTML) is ________________.a. being replaced by XMLb. made obsolete by HTMLc. a hybrid of XML and HTMLd. unrelated to XML and HTML

Review Questions

14. An organization that charges a fee to connect subscribers to its own Internet connected servers, providing a gateway to the Internet, is called ___________.a. a common carrierb. a telephone companyc. a packet carrierd. an ISP

Review Questions

15. Delays in networks can come from _____________________.a. propagationb. switchingc. queuingd. all of the above

Review Questions

16. Which of the following is not an Internet top level domain name?a. .bizb. .govc. .comd. None of the above

Review Questions

17. A queue is a ____________.a. billiard stickb. waiting linec. serverd. router

Review Questions

18. When two stations on a circuit transmit at the same time, ______ occurs.a. an altercationb. a divisionc. pollingd. a collision

Review Questions

19. Which of the following routing techniques are used in WANs?a. dynamic routingb. distributed routingc. static routingd. All of the above

Review Questions

20. More and more families are creating home networks to ______________.a. avoid the high cost of ISPsb. share a high-speed Internet connectionc. practice their networking skillsd. ensure greater network security

Review Questions

21. One of the most important prerequisites for home networking is _____________.a. thorough knowledge of networkingb. an MSCE certificationc. broadband cable accessd. ease of installation

Review Questions

22. Which of the following is not a phase of network design as described in the text?a. developing the statement of requirementsb. investigating alternativesc. network designd. implementation

Review Questions

23. Management approval of a technical project is normally required _____.a. at the beginning of the projectb. at the end of most phases of the network design

processc. after the network is installed and they can see how it is

operatingd. only under exceptional circumstances

Review Questions

24. IPsec is used in which of the following?a. SPOOLingb. VPNsc. MVSd. PDNA

Review Questions

25. Attenuation is ________________.a. the increase of signal strength by a factor of tenb. only an issue on digital circuitsc. the weakening of a signal over a distanced. only an issue on circuits provided by ATT

Review Questions

26. A device that performs some of the functions of both a bridge and a router is called a _______________.a. gatewayb. repeaterc. switchd. brouter

Review Questions

27. A device that operates at the physical layer and is used to regenerate signals is called a ______________.

a. gatewayb. bridgec. brouterd. repeater

Review Questions

28. A separate network that is physically removed from, but is connected to, a LAN and that houses data immediately accessible to users is called a _____________.a. VANb. NASc. SANd. DNA

Review Questions

29. A wireless standard used to connect short-range devices is called ___________.a. Wi-Fib. HiperLAN2c. Blaatandd. Bluetooth

Review Questions

30. Asynchronous Transmission Mode (ATM) technology _____________.a. uses a 53-byte cellb. is expensive compared to other LAN technologiesc. can carry voice and video signalsd. all of the above

Review Questions

31. Among the LAN connectivity hardware, which device is primarily used to pass messages from one network to another, and translate the destination address to the format required by the network receiving the message?a. bridgeb. gatewayc. hubd. router

Review Questions

32. Background noise (white noise) on a circuit ______________________.a. is rarely a problem because it is a known, predictable

phenomenonb. is one of the most difficult problems to work aroundc. occurs in spikesd. delays some frequencies more than others

Review Questions

33. A _________ is calculated mathematically as a part of the error-checking process when transmitting and receiving a message.a. Greek characterb. check characterc. real characterd. control character

Review Questions

34. Characters that control the positioning of information on a workstation screen or paper are called ______________.a. page control charactersb. format effector charactersc. device control charactersd. a and b

Review Questions

35. What is the default subnet mask for a Class C network?a. 255.255.255.0b. 255.0.0.0c. 0.0.0.225d. 255.255.255.255

Review Questions

36. Which of the following binary numbers is the equivalent of the decimal number 206?a. 11001100b. 11100110c. 11001110d. 10110110

Review Questions

37. The reason that digital transmission is superior to analog transmission is ___________.a. better data integrityb. higher capacityc. better security and privacyd. all of the above

Review Questions

38. A modem converts ________ to ___________.a. Analog to Digitalb. Digital to Analogc. a and bd. none of the above

Review Questions

39. In HDLC, when a 0 bit is inserted after all strings of five consecutive 1 bits, the term applied is ________.a. zeroingb. bit stuffingc. synchronizingd. string breaking

Review Questions

40. The combination of the first three layers of the OSI model is the standard for the ______________.a. X.25 standard for data transmissionb. V. standardc. consolidated transmission standardd. Consolidated Transmission Protocol

Review Questions

41. When data or a request from one layer is passed down to another layer, the data are surrounded by control characters or other information. This process is called _____________.a. enclosureb. encapsulationc. isolationd. permutation

Review Questions

42. The process of reassembling a message a TCP/IP packetized stream of data that has been fragmented is called __________.a. reassemblyb. reconstitutionc. segmentationd. togetherness

Review Questions

43. It is much easier for a machine to process a code if ____________________.a. it is a true binary codeb. all of the characters have the same number of bitsc. all of the bits are the same durationd. all of the above

Review Questions

44. An example of a communications medium is ____________.a. a telephoneb. a personal computerc. a teleprinterd. a copper wire

Review Questions

45. The PSTN is an example of a _____________.a. mesh networkb. star networkc. bus networkd. ring network

Review Questions

46. The OSI layer responsible for establishing the communication rules between certain machines or applications is the ______________.a. network layerb. transport layerc. session layerd. data link layer

Review Questions

47. Rules that guide the progress of messages through a network are called _____.a. mediab. circuitsc. switchesd. protocols

Review Questions

48. A teletypewriter is a _____________.a. talking typewriterb. device that switches analog signalsc. forerunner of email systemsd. personal computer printer connected by infrared

signals

Review Questions

49. Networks that cover a short distance with high bandwidth are called ____________.a. WANsb. LANsc. SGANsd. hybrid networks

Review Questions

50. Networks provided by telephone companies that cover a broad geographic area are called ___________.a. hierarchical networksb. PBXsc. ring networksd. WANs