Upload
asher-barber
View
216
Download
1
Embed Size (px)
Citation preview
Network Introduction, Network Introduction, Overview and ClassificationOverview and Classification
Final Review
Review Questions
1. The shielding on UTP wire is typically made from ____________.a. Kevlarb. Teflonc. PCBsd. none of the above
Review Questions
2. As of 2008, the most popular networking cable to install in new office buildings is ______________.a. optical fiberb. CAT 1c. CAT 3d. CAT 5
Review Questions
3. Management’s statement of the importance of and their commitment to network security is called the ______________.a. network security standardb. network security strategyc. network security policyd. statement of network intent
Review Questions
4. An example of a passive security attack is ________________.a. altering message contentsb. masqueradingc. all of the aboved. none of the above
Review Questions
5. Voice scrambling __________________.a. makes the voice transmission unintelligible to anyone
who does not have a descramblerb. can be circumvented by wiretappingc. all of the aboved. none of the above
Review Questions
6. Finding qualified people to fill networking positions is a management function called ______________.a. recruitingb. staffingc. organizingd. controlling
Review Questions
7. Asking another company to take over the design, implementation, and operation of a network is called _____________.a. retrenchingb. outplacingc. insourcingd. outsourcing
Review Questions
8. Performance reporting should ______________.a. look at current performance but not historical
performanceb. provide data so performance trends can be seenc. provide detailed data to senior managementd. only be done monthly
Review Questions
9. The “killer ap” of internetworking since its earliest days was _____________.a. FTPb. e-mailc. instant messagingd. inquiry of customer’s sales records
Review Questions
10. J.C.R. Licklider’s contribution to internetworking was important because ______.a. his ideas inspired later developmentsb. he created the first RFCc. his inventions were the basis for Ethernetd. his money funded computer research
Review Questions
11. The thousands of databases on the Internet that cannot be located by search engines are collectively called ______________.a. subject directoriesb. portalsc. the hidden Webd. the invisible Web
Review Questions
12. When a URL does not contain a filename after the slash mark, the Web server automatically delivers the default file, which is most often called __________.a. mypage.htmlb. index.htmlc. index.comd. www.html
Review Questions
13. Extensible markup language (XHTML) is ________________.a. being replaced by XMLb. made obsolete by HTMLc. a hybrid of XML and HTMLd. unrelated to XML and HTML
Review Questions
14. An organization that charges a fee to connect subscribers to its own Internet connected servers, providing a gateway to the Internet, is called ___________.a. a common carrierb. a telephone companyc. a packet carrierd. an ISP
Review Questions
15. Delays in networks can come from _____________________.a. propagationb. switchingc. queuingd. all of the above
Review Questions
16. Which of the following is not an Internet top level domain name?a. .bizb. .govc. .comd. None of the above
Review Questions
17. A queue is a ____________.a. billiard stickb. waiting linec. serverd. router
Review Questions
18. When two stations on a circuit transmit at the same time, ______ occurs.a. an altercationb. a divisionc. pollingd. a collision
Review Questions
19. Which of the following routing techniques are used in WANs?a. dynamic routingb. distributed routingc. static routingd. All of the above
Review Questions
20. More and more families are creating home networks to ______________.a. avoid the high cost of ISPsb. share a high-speed Internet connectionc. practice their networking skillsd. ensure greater network security
Review Questions
21. One of the most important prerequisites for home networking is _____________.a. thorough knowledge of networkingb. an MSCE certificationc. broadband cable accessd. ease of installation
Review Questions
22. Which of the following is not a phase of network design as described in the text?a. developing the statement of requirementsb. investigating alternativesc. network designd. implementation
Review Questions
23. Management approval of a technical project is normally required _____.a. at the beginning of the projectb. at the end of most phases of the network design
processc. after the network is installed and they can see how it is
operatingd. only under exceptional circumstances
Review Questions
24. IPsec is used in which of the following?a. SPOOLingb. VPNsc. MVSd. PDNA
Review Questions
25. Attenuation is ________________.a. the increase of signal strength by a factor of tenb. only an issue on digital circuitsc. the weakening of a signal over a distanced. only an issue on circuits provided by ATT
Review Questions
26. A device that performs some of the functions of both a bridge and a router is called a _______________.a. gatewayb. repeaterc. switchd. brouter
Review Questions
27. A device that operates at the physical layer and is used to regenerate signals is called a ______________.
a. gatewayb. bridgec. brouterd. repeater
Review Questions
28. A separate network that is physically removed from, but is connected to, a LAN and that houses data immediately accessible to users is called a _____________.a. VANb. NASc. SANd. DNA
Review Questions
29. A wireless standard used to connect short-range devices is called ___________.a. Wi-Fib. HiperLAN2c. Blaatandd. Bluetooth
Review Questions
30. Asynchronous Transmission Mode (ATM) technology _____________.a. uses a 53-byte cellb. is expensive compared to other LAN technologiesc. can carry voice and video signalsd. all of the above
Review Questions
31. Among the LAN connectivity hardware, which device is primarily used to pass messages from one network to another, and translate the destination address to the format required by the network receiving the message?a. bridgeb. gatewayc. hubd. router
Review Questions
32. Background noise (white noise) on a circuit ______________________.a. is rarely a problem because it is a known, predictable
phenomenonb. is one of the most difficult problems to work aroundc. occurs in spikesd. delays some frequencies more than others
Review Questions
33. A _________ is calculated mathematically as a part of the error-checking process when transmitting and receiving a message.a. Greek characterb. check characterc. real characterd. control character
Review Questions
34. Characters that control the positioning of information on a workstation screen or paper are called ______________.a. page control charactersb. format effector charactersc. device control charactersd. a and b
Review Questions
35. What is the default subnet mask for a Class C network?a. 255.255.255.0b. 255.0.0.0c. 0.0.0.225d. 255.255.255.255
Review Questions
36. Which of the following binary numbers is the equivalent of the decimal number 206?a. 11001100b. 11100110c. 11001110d. 10110110
Review Questions
37. The reason that digital transmission is superior to analog transmission is ___________.a. better data integrityb. higher capacityc. better security and privacyd. all of the above
Review Questions
38. A modem converts ________ to ___________.a. Analog to Digitalb. Digital to Analogc. a and bd. none of the above
Review Questions
39. In HDLC, when a 0 bit is inserted after all strings of five consecutive 1 bits, the term applied is ________.a. zeroingb. bit stuffingc. synchronizingd. string breaking
Review Questions
40. The combination of the first three layers of the OSI model is the standard for the ______________.a. X.25 standard for data transmissionb. V. standardc. consolidated transmission standardd. Consolidated Transmission Protocol
Review Questions
41. When data or a request from one layer is passed down to another layer, the data are surrounded by control characters or other information. This process is called _____________.a. enclosureb. encapsulationc. isolationd. permutation
Review Questions
42. The process of reassembling a message a TCP/IP packetized stream of data that has been fragmented is called __________.a. reassemblyb. reconstitutionc. segmentationd. togetherness
Review Questions
43. It is much easier for a machine to process a code if ____________________.a. it is a true binary codeb. all of the characters have the same number of bitsc. all of the bits are the same durationd. all of the above
Review Questions
44. An example of a communications medium is ____________.a. a telephoneb. a personal computerc. a teleprinterd. a copper wire
Review Questions
45. The PSTN is an example of a _____________.a. mesh networkb. star networkc. bus networkd. ring network
Review Questions
46. The OSI layer responsible for establishing the communication rules between certain machines or applications is the ______________.a. network layerb. transport layerc. session layerd. data link layer
Review Questions
47. Rules that guide the progress of messages through a network are called _____.a. mediab. circuitsc. switchesd. protocols
Review Questions
48. A teletypewriter is a _____________.a. talking typewriterb. device that switches analog signalsc. forerunner of email systemsd. personal computer printer connected by infrared
signals
Review Questions
49. Networks that cover a short distance with high bandwidth are called ____________.a. WANsb. LANsc. SGANsd. hybrid networks
Review Questions
50. Networks provided by telephone companies that cover a broad geographic area are called ___________.a. hierarchical networksb. PBXsc. ring networksd. WANs