Network Introduction Overview and Classification Final Review Review



















































- Slides: 51
Network Introduction, Overview and Classification Final Review
Review Questions 1. The shielding on UTP wire is typically made from ______. a. Kevlar b. Teflon c. PCBs d. none of the above
Review Questions 2. As of 2008, the most popular networking cable to install in new office buildings is _______. a. optical fiber b. CAT 1 c. CAT 3 d. CAT 5
Review Questions 3. Management’s statement of the importance of and their commitment to network security is called the _______. a. network security standard b. network security strategy c. network security policy d. statement of network intent
Review Questions 4. An example of a passive security attack is ________. a. altering message contents b. masquerading c. all of the above d. none of the above
Review Questions 5. Voice scrambling _________. a. makes the voice transmission unintelligible to anyone who does not have a descrambler b. can be circumvented by wiretapping c. all of the above d. none of the above
Review Questions 6. Finding qualified people to fill networking positions is a management function called _______. a. recruiting b. staffing c. organizing d. controlling
Review Questions 7. Asking another company to take over the design, implementation, and operation of a network is called _______. a. retrenching b. outplacing c. insourcing d. outsourcing
Review Questions 8. Performance reporting should _______. a. look at current performance but not historical performance b. provide data so performance trends can be seen c. provide detailed data to senior management d. only be done monthly
Review Questions 9. The “killer ap” of internetworking since its earliest days was _______. a. FTP b. e-mail c. instant messaging d. inquiry of customer’s sales records
Review Questions 10. J. C. R. Licklider’s contribution to internetworking was important because ______. a. his ideas inspired later developments b. he created the first RFC c. his inventions were the basis for Ethernet d. his money funded computer research
Review Questions 11. The thousands of databases on the Internet that cannot be located by search engines are collectively called _______. a. subject directories b. portals c. the hidden Web d. the invisible Web
Review Questions 12. When a URL does not contain a filename after the slash mark, the Web server automatically delivers the default file, which is most often called _____. a. mypage. html b. index. html c. index. com d. www. html
Review Questions 13. Extensible markup language (XHTML) is ________. a. being replaced by XML b. made obsolete by HTML c. a hybrid of XML and HTML d. unrelated to XML and HTML
Review Questions 14. An organization that charges a fee to connect subscribers to its own Internet connected servers, providing a gateway to the Internet, is called ______. a. a common carrier b. a telephone company c. a packet carrier d. an ISP
Review Questions 15. Delays in networks can come from ___________. a. propagation b. switching c. queuing d. all of the above
Review Questions 16. Which of the following is not an Internet top level domain name? a. . biz b. . gov c. . com d. None of the above
Review Questions 17. A queue is a ______. a. billiard stick b. waiting line c. server d. router
Review Questions 18. When two stations on a circuit transmit at the same time, ______ occurs. a. an altercation b. a division c. polling d. a collision
Review Questions 19. Which of the following routing techniques are used in WANs? a. dynamic routing b. distributed routing c. static routing d. All of the above
Review Questions 20. More and more families are creating home networks to _______. a. avoid the high cost of ISPs b. share a high-speed Internet connection c. practice their networking skills d. ensure greater network security
Review Questions 21. One of the most important prerequisites for home networking is _______. a. thorough knowledge of networking b. an MSCE certification c. broadband cable access d. ease of installation
Review Questions 22. Which of the following is not a phase of network design as described in the text? a. developing the statement of requirements b. investigating alternatives c. network design d. implementation
Review Questions 23. Management approval of a technical project is normally required _____. a. at the beginning of the project b. at the end of most phases of the network design process c. after the network is installed and they can see how it is operating d. only under exceptional circumstances
Review Questions 24. IPsec is used in which of the following? a. SPOOLing b. VPNs c. MVS d. PDNA
Review Questions 25. Attenuation is ________. a. the increase of signal strength by a factor of ten b. only an issue on digital circuits c. the weakening of a signal over a distance d. only an issue on circuits provided by ATT
Review Questions 26. A device that performs some of the functions of both a bridge and a router is called a ________. a. gateway b. repeater c. switch d. brouter
Review Questions 27. A device that operates at the physical layer and is used to regenerate signals is called a _______. a. gateway b. bridge c. brouter d. repeater
Review Questions 28. A separate network that is physically removed from, but is connected to, a LAN and that houses data immediately accessible to users is called a _______. a. VAN b. NAS c. SAN d. DNA
Review Questions 29. A wireless standard used to connect short-range devices is called ______. a. Wi-Fi b. Hiper. LAN 2 c. Blaatand d. Bluetooth
Review Questions 30. Asynchronous Transmission Mode (ATM) technology _______. a. uses a 53 -byte cell b. is expensive compared to other LAN technologies c. can carry voice and video signals d. all of the above
Review Questions 31. Among the LAN connectivity hardware, which device is primarily used to pass messages from one network to another, and translate the destination address to the format required by the network receiving the message? a. bridge b. gateway c. hub d. router
Review Questions 32. Background noise (white noise) on a circuit ___________. a. is rarely a problem because it is a known, predictable phenomenon b. is one of the most difficult problems to work around c. occurs in spikes d. delays some frequencies more than others
Review Questions 33. A _____ is calculated mathematically as a part of the errorchecking process when transmitting and receiving a message. a. Greek character b. check character c. real character d. control character
Review Questions 34. Characters that control the positioning of information on a workstation screen or paper are called _______. a. page control characters b. format effector characters c. device control characters d. a and b
Review Questions 35. What is the default subnet mask for a Class C network? a. 255. 0 b. 255. 0. 0. 0 c. 0. 0. 0. 225 d. 255
Review Questions 36. Which of the following binary numbers is the equivalent of the decimal number 206? a. 1100 b. 11100110 c. 11001110 d. 10110110
Review Questions 37. The reason that digital transmission is superior to analog transmission is ______. a. better data integrity b. higher capacity c. better security and privacy d. all of the above
Review Questions 38. A modem converts ____ to ______. a. Analog to Digital b. Digital to Analog c. a and b d. none of the above
Review Questions 39. In HDLC, when a 0 bit is inserted after all strings of five consecutive 1 bits, the term applied is ____. a. zeroing b. bit stuffing c. synchronizing d. string breaking
Review Questions 40. The combination of the first three layers of the OSI model is the standard for the _______. a. X. 25 standard for data transmission b. V. standard c. consolidated transmission standard d. Consolidated Transmission Protocol
Review Questions 41. When data or a request from one layer is passed down to another layer, the data are surrounded by control characters or other information. This process is called _______. a. enclosure b. encapsulation c. isolation d. permutation
Review Questions 42. The process of reassembling a message a TCP/IP packetized stream of data that has been fragmented is called _____. a. reassembly b. reconstitution c. segmentation d. togetherness
Review Questions 43. It is much easier for a machine to process a code if __________. a. it is a true binary code b. all of the characters have the same number of bits c. all of the bits are the same duration d. all of the above
Review Questions 44. An example of a communications medium is ______. a. a telephone b. a personal computer c. a teleprinter d. a copper wire
Review Questions 45. The PSTN is an example of a _______. a. mesh network b. star network c. bus network d. ring network
Review Questions 46. The OSI layer responsible for establishing the communication rules between certain machines or applications is the _______. a. network layer b. transport layer c. session layer d. data link layer
Review Questions 47. Rules that guide the progress of messages through a network are called _____. a. media b. circuits c. switches d. protocols
Review Questions 48. A teletypewriter is a _______. a. talking typewriter b. device that switches analog signals c. forerunner of email systems d. personal computer printer connected by infrared signals
Review Questions 49. Networks that cover a short distance with high bandwidth are called ______. a. WANs b. LANs c. SGANs d. hybrid networks
Review Questions 50. Networks provided by telephone companies that cover a broad geographic area are called ______. a. hierarchical networks b. PBXs c. ring networks d. WANs