634 multi final

22
1. _______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25 Answer: D 2. ________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive. a. Contention b. Polling c. Pooling d. Carrier sense e. CRC Answer: B 3. _________ are smaller versions of NAPs that link a set of regional ISPs. a. mini Network Access Points b. cable modem termination system endpoints c. distribution hubs d. metropolitan area exchanges e. points-of-presence Answer: D 4. _________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request Answer: A 5. _________ is the basic physical layout of the circuit. a. point-to-point configuration b. configuration c. circuit configuration d. circuit design e. circuit plan Answer: C 6. __________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets Answer: B 7. __________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling Answer: B 8. __________ is a line-of-sight type of wireless media. a. coaxial cable b. microwave c. radio d. twisted pair e. fiber optic Answer: B 9. __________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer Answer: C 10. __________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion. Answer: C 11. ___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control Answer: B 12. ___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling Answer: E 13. ___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing Answer: A 14. ___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding Answer: C 634 multi final Study online at quizlet.com/_50xf3

Upload: suresh-martha

Post on 18-Apr-2015

2.092 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: 634 Multi Final

1. _______ is the dominant network protocoltoday. a. SDLC b. SNAc. IPX/SPX d. TCP/IPe. X.25

Answer:D

2. ________ is the process of sending a signal toa client that gives its permission to transmit orasks it to receive.a. Contentionb. Pollingc. Poolingd. Carrier sensee. CRC

Answer:B

3. _________ are smaller versions of NAPs thatlink a set of regional ISPs.a. mini Network Access Pointsb. cable modem termination system endpointsc. distribution hubsd. metropolitan area exchangese. points-of-presence

Answer:D

4. _________ is a specially formatted requestused to perform IP address to data linkaddress resolution. a. Address Resolution Protocolb. Domain Service Requestc. HTTP requestd. Link state requeste. Autonomous System Request

Answer:A

5. _________ is the basic physical layout of thecircuit.a. point-to-point configurationb. configurationc. circuit configurationd. circuit designe. circuit plan

Answer:C

6. __________ ensure that hardware andsoftware produced by different vendors worktogether.a. Delimitersb. Standardsc. ASPsd. RBOCse. Intranets

Answer:B

7. __________ has led to the belief that theInternet is "free".a. Encryptingb. Peeringc. Bridgingd. Tollinge. Polling

Answer:B

8. __________ is a line-of-sight type of wirelessmedia.a. coaxial cable b. microwavec. radiod. twisted pair e. fiber optic

Answer:B

9. __________ is not an important function ofthe transport layer. a. end-to-end delivery of the messageb. taking messages from the application layerc. routingd. breaking long messages into smallerpacketse. interfacing with the network layer

Answer:C

10. __________ refers to the process oftranslating between one set of privateaddresses inside a network and a set of publicaddress outside the network.a. Translationb. Conversionc. Network address translationd. Proxy translatione. IP conversion.

Answer:C

11. ___________ is how the network worksconceptually.a. Physical topologyb. Logical topologyc. Network topologyd. Ethernete. Media access control

Answer:B

12. ___________ is not a type of digitalsignaling technique.a. Non-return-to-zero signalingb. Unipolar signalingc. Manchester encodingd. Return-to-zero signalinge. Data rate signaling

Answer:E

13. ___________ is the process of determiningthe path that a message will travel fromsending computer to receiving computer. a. Routingb. Addressing c. Interfacingd. Broadcastinge. Packetizing

Answer:A

14. ___________ is the translation ofapplication layer addresses into IPaddresses. a. Network interface card reversal b. IPv6c. Server name resolutiond. Subnet maskinge. Name service coding

Answer:C

634 multi finalStudy online at quizlet.com/_50xf3

Page 2: 634 Multi Final

15. ___________ refers to the fact that ISPs donot charge one another (at the same level) fortransferring messages they exchange acrossan NAP or MAE.a. Poppingb. Peeringc. Yipingd. Nappinge. Chargebacking

Answer:B

16. ____________ are companies that build adata and telecommunications infrastructurefrom which other companies can leaseservices for WANs and MANs.a. Common carriersb. Router manufacturersc. Standards organizations d. CSUse. PUCs

Answer:A

17. ____________ is a modulation techniquethat combines two different amplitudecombinations with eight different phasecombinations modulation to send four bitsper symbol.a. quadrature amplitude modulation b. time division multiplexingc. synchronous digital line control d. pulse code modulatione. baseband signaling

Answer:A

18. ____________ is not a function of a datalink protocol.a. Media access controlb. Message delineation c. Amplitude shift keyingd. Indicating when a message starts and stopse. Error control

Answer:C

19. ____________ is one of the most commonlyused coding schemes used in datatransmission.a. ASCIIb. ISDNc. MAUd. ATMe. FDM

Answer:A

20. ____________ refers to changing the shapeof the sound wave in different ways torepresent a 1 or a 0.a. digitizing.b. samplingc. modulationd. demodulatione. shaping

Answer:C

21. ____________ refers to one computerlegally sharing a software package, such asMicrosoft Word, with other computers on thenetwork to save costs.a. Software metering b. Information sharingc. Resource sharingd. Software piratinge. Network routing

Answer:C

22. ____________ refers to the transmissioncharacteristics of the circuit.a. handshakingb. virtual circuitc. bondingd. logical circuite. physical circuit

Answer:D

23. ____________ refers to the type of routingin which the routing table is developed by thenetwork manager and modifications aremade only when computers are added to orremoved from the network. a. Adaptive routingb. Dynamic routingc. Static routing d. Distance vector routinge. Link state routing

Answer:C

24. _____________ is an effective way toprevent attenuation. a. Shielding wiresb. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuitd. Changing multiplexing techniques e. Shorting a circuit

Answer:C

25. _____________ is an effective way toprevent impulse noise, cross talk, andintermodulation noise. a. Shielding wiresb. Adding fluorescent lights c. Adding repeaters to a circuitd. Adding amplifiers to a circuite. Shorting a circuit

Answer:A

26. _____________ is not a form of modulationused to transform digital data into analogsignals.a. synchronous time division b. amplitude shift keyingc. amplitude modulationd. frequency modulatione. phase modulation

Answer:A

Page 3: 634 Multi Final

27. _____________ is the software that controlsthe network.a. Network Operating Systemb. Client Operating Systemc. Embedded Operating Systemd. Network Control Systeme. Network Software System

Answer:A

28. _____________ provide information aboutresources on the network that are available tothe users, such as shared printers, fileservers and application software.a. Network Servicesb. Directory Servicesc. Client Servicesd. Computing Servicese. Remote Access Services

Answer:B

29. _____________ refers to having usersaccess the same data files, exchangeinformation via electronic mail, or search theInternet for information.a. Resource sharingb. User groupingc. User profilingd. Information sharinge. Data pirating

Answer:D

30. _____________ routing is a method ofrouting in which each packet makes its ownway through the network. a. Frequency division b. Connection-orientedc. PCMCIAd. Connectionless e. Application net

Answer:D

31. ______________ controls errors bydetecting and correcting them at the receivingend without retransmission of the originalmessage. a. Hamming code b. Huffman encodingc. Front end processingd. Wave division multiplexinge. Hub polling

Answer:A

32. ______________ routing is most commonlyused when the application data or messagecan fit into one single packet.a. Frame-orientedb. Connection-orientedc. Connectionlessd. Physical-orientede. Byte-oriented

Answer:C

33. _______________ is a type of dynamicrouting. a. Static routingb. Circuitous routingc. Centralized routingd. Link statee. X.25 routing

Answer:D

34. __________can obliterate a group of bits,causing a burst error.a. Crosstalkb. Attenuationc. Impulse noised. Intermodulation noisee. Jitter

Answer:C

35. A _______ geometric layout for a WANconnects all computers to one centralcomputer that routes messages to theappropriate computer, usually via a series ofpoint-to-point dedicated circuits.a. ring designb. mesh designc. bus designd. star design e. mesh design

Answer:D

36. A _______ is a connectionless method ofsending data packets on a packet switchedservice.a. bursty packet b. virtual circuitc. datagramd. histograme. permanent virtual circuit

Answer:C

37. A _________ is a connection-orientedapproach to sending packets on a packetswitched service.a. permanent virtual circuitb. datagramc. histogramd. bursty packete. fractional T-1 network

Answer:A

38. A __________ indicates what resources oneach server are available on the network foruse by other computers and what people areallowed what access to the network.a. user profileb. user access logc. network profiled. network operating systeme. server allocation list

Answer:C

Page 4: 634 Multi Final

39. A ___________ assigns levels of risk tovarious threats to network security bycomparing the nature of the threats to thecontrols designed to reduce them.a. risk assessment b. backplanec. mitigating control factor analysisd. control verification worksheete. control test plan

Answer:A

40. A _______________ is a particular type ofnetwork that uses circuits that run over theInternet but that appears to the user to be aprivate network.a. local carrier networkb. virtual private network c. integrated service digital networkd. software defined network e. SONET network

Answer:B

41. A "thick client" architecture approach: a. always is a two-tier network architectureb. always is an n-tiered architecturec. places all or almost all of the applicationlogic on the clientd. places all or almost all of the applicationlogic on the servere. refers to the size of the cable connecting theclients to the network

Answer:C

42. A backbone network is:a. a high speed central network that connectsother networks in a distance spanning up toseveral miles. b. a group of microcomputers or terminalslocated in the same general area andconnected by a common cable(communication circuit) so they canexchange information.c. a network spanning a geographical areathat usually encompasses a city or countyarea (3 to 30 miles).d. a network spanning a large geographicalarea (up to 1000s of miles).e. a network spanning exactly 200 miles withcommon carrier circuits.

Answer:A

43. A client computer is assigned a data link layeraddress is by: a. hardware manufacturersb. software manufacturersc. middleware manufacturersd. network managers who configure a file in acomputer's network layer software packagee. ISO

Answer:A

44. A coding scheme that uses 10 bits to representeach character is capable of representing_________ different characters.a. 256b. 20c. 200d. 512e. 1024

Answer:E

45. A digital service offered by cable companies isthe _________.a. Abilene networkb. WAP proxyc. G.Lite ADSLd. cable modeme. Next Generation Internet

Answer:D

46. A hacker gaining access to organizationaldata files and resources is an example of a(n)____________ threat.a. disruptiveb. controlled chaosc. disruptived. intrusion e. disaster

Answer:D

47. A high-speed Internet has a set of accesspoints called ____pops that provide point-of-presence at ________ speeds.a. giga, gigabitb. mega, megabitc. multi, multibitd. giga, megabite. multi, gigabit

Answer:A

48. A logical bus topology: a. is always used by token ring protocol LANsb. has all computers connected to each otherin point-to-point connectionsc. is limited to short distances since deviceslike a hub or repeater cannot be used withthis type of topologyd. permits every message to be received byevery computer on the bus, even when thosemessages are intended for other computerse. has a central control device, such as amainframe

Answer:D

Page 5: 634 Multi Final

49. A metropolitan area network is:a. a high speed central network, built withprivately owned media, which connects othernetworks in a distance spanning up to severalmiles. b. a group of microcomputers or terminalslocated in the same general area andconnected by a common cable(communication circuit) so they canexchange information.c. a network that spans a geographical areathat usually encompasses a city or countyarea (3 to 30 miles) and that typically usescommon carrier circuits.d. a network spanning a large geographicalarea (up to 1000s of miles).e. a network spanning exactly 543.56 mileswith private media.

Answer:C

50. A network switch failure is an example of a(n)________ threat.a. internalb. disruptivec. causald. intrusione. disaster

Answer:B

51. A peer-to-peer LAN: a. has more capability than a dedicated serverb. supports a higher number of computersthan a dedicated serverc. is generally cheaper in hardware andsoftware than a dedicated serverd. is not appropriate for sharing resources ina small LANe. is often much faster than dedicated servernetworks

Answer:C

52. A phase hit is likely to be: a. spikesb. a short term shift out of phasec. intermodulation noised. white noise e. Gaussian noise

Answer:B

53. A special packet called a(n) _____________packet is sent to the receiver requesting theestablishment of a connectiona. ACKb. NAKc. SYNd. ARQe. FIN

Answer:C

54. A special type of message that is used whensending the same message to all computers ona specific LAN or subnet is called a: a. unicast messageb. multicast messagec. broadcast messaged. guided messagee. radiated message

Answer:C

55. A star topology is: a. difficult to manage because the centralcomputer receives and routes all messages inthe networkb. dependent upon the capacity of the centralcomputer for its performance c. always slower than a ring networkd. less susceptible to traffic problems thanother architecturese. not affected if the central computer fails

Answer:B

56. A subnet mask of ___________ means thatall computers with only the same first twobytes in their IPv4 addresses are on the samesubnet. a. 11111111.0.0.0b. 255.255.255.0c. 255.0.0.0d. 255.255.0.0e. 255.255.255.255

Answer:D

57. A tornado that eliminates a network controlcenter would be an example of a natural__________a. disasterb. disruptionc. controlled chaosd. destructione. intrusion

Answer:A

58. A typical TCP packet has a _______ header ofcontrol information. a. 32-bitb. 64-bitc. 160-bitd. 192-bite. 32-byte

Answer:D

59. A virtual circuit is established in the___________ routing method. a. asynchronous b. connection-orientedc. frequency divisiond. application nete. connectionless

Answer:B

Page 6: 634 Multi Final

60. A(n) ________ refers to a group ofcomputers that are logically grouped togetherby IP number. a. IPv6 groupb. subnetc. data link groupd. TCP groupe. application net

Answer:B

61. A(n) _________ is a type of application levelfirewall that is transparent so that no othercomputer notices that it is on the network.a. ANI systemb. NAT proxy server c. IP spoofing bridged. packet level firewalle. smart hub

Answer:B

62. A(n) __________ circuit is another namefor a multipoint configuration.a. analogb. dedicatedc. point-to-pointd. sharede. simplex

Answer:D

63. A(n) __________ is any potential adverseoccurrence that can do harm, interrupt thesystem using the network to cause monetaryloss to the organization.a. assetb. service level agreementc. threatd. security plane. network design

Answer:C

64. A(n) ___________ divides one high-speedcommunication circuit into several lowerspeed circuits for the primary reason ofsaving communication line costs.a. transponderb. multiplexer c. inverse multiplexer d. codece. intelligent terminal

Answer:B

65. A(n) ___________ is a radio transceiverthat plays the same role as a hub or switch ina wired network and connects the WLAN tothe wired network.a. Ethernet NICb. antennaec. wireless NICd. access pointe. hub

Answer:D

66. A(n) _____________ is required to connecta computer to WLAN.a. Ethernet NICb. antennaec. wireless NICd. access pointe. hub

Answer:C

67. A(n) _________-tiered architecture usesonly two sets of computers: one set of clientsand one set of servers.a. oneb. twoc. threed. fivee. n

Answer:B

68. An advantage of centralized routing is: a. routing does reflect changing networkconditions, such as computers that areoverloaded by many messagesb. if anything happens to the computerdeveloping the routing table, the routingtables cannot be changed until that computeris fixed, or until a new computer is selected toperform the functionc. routing decisions are simple d. the routing tables are stored at allcomputers in the networke. it requires more processing by eachcomputer or router in the network thandynamic routing

Answer:C

69. An example of _____ of data would be if acomputer virus eliminated files on thatcomputer.a. disruptionb. controlled chaosc. intrusiond. destruction e. disaster

Answer:D

70. An N-tiered architecture: a. is generally more "scalable" than a three-tiered architectureb. is generally less "scalable" than a three-tiered architecturec. uses only two sets of computers in whichthe clients are responsible for the applicationand presentation logic, and the servers areresponsible for the datad. uses exactly three sets of computers inwhich the client is responsible forpresentation, one set of servers is responsiblefor data access logic and data storage, andapplication logic is spread across two ormore different sets of serverse. puts less load on a network than a two-tiered architecture because there tends to beless communication among the servers

Answer:A

Page 7: 634 Multi Final

71. Another term for impulse noise is: a. Gaussian noiseb. spikes c. attenuationd. cross-talk e. intermodulation noise

Answer:B

72. ARQ means that: a. a receiver that detects an error in amessage simply asks the sender to retransmitthe message until it is received without errorb. the common carrier Automatically ReturnsQueries to the subscriber upon receipt ofsuch queriesc. a sender is using a data link protocol calledAsynchronous Repeating reQuestd. a fiber optic cable meets the AmericanRegistered Quality, a certification standardfor use in high-quality data communicationtransmission linese. a sender is using a parity scheme calledArray Resource Quality

Answer:A

73. As part of the five-layer network model usedin this textbook, the data link layer sitsdirectly between: a. the physical and the application layersb. the network and the application layersc. the network and transport layersd. the physical and the application layerse. the physical and the network layers

Answer:E

74. Asynchronous transmission: a. is used to transmit each charactersimultaneously with all other charactersb. has a pre-determined, fixed time betweensending charactersc. is typically used on multipoint half duplexcircuitsd. uses a continuous series of start bits as anidle signale. is also known as start-stop transmission

Answer:E

75. At the top of the Internet structure arenational ___________, such as AT&T andSprint.a. Network Access Pointsb. Internet service providersc. bridgesd. LATAse. digital subscriber lines

Answer:B

76. Breaking a network into smaller parts iscalled network: a. fragmentationb. segmentationc. localizationd. allocatione. mitigation

Answer:B

77. CA*Net3 was developed by a Canadianorganization known as:a. IETFb. ARDNOCc. ADSLd. RFCe. UCAID

Answer:B

78. Client-server architectures: a. cannot connect computers that usedifferent hardware b. are one of the least used networkarchitectures todayc. can use middleware to provide a standardway of communicating between software frommore than one vendor d. assign the responsibility for thepresentation logic to the servere. were the earliest type of networkarchitectures

Answer:C

79. Cross-talk: a. occurs when one circuit picks up signals inanother b. is always bothersome because it has a highsignal strengthc. decreases with increased proximity of twowiresd. decreases during wet or damp weather e. increases with lower frequency signals

Answer:A

80. CSMA/CA is an acronym for:a. Carrier Sense Multiple Access withCollision Acknowledgmentb. Carrier Sense Mode Access with CarrierAvoidancec. Carrier Sense Multiple Access withCollision Avoidanced. Carrier Sensory Multiple Access withoutCollision Acknowledgment e. Carrier Sense Multiple Acknowledgmentwith Collision Avoidance

Answer:C

81. Data communication standards enable eachlayer in the sending computer tocommunicate with its corresponding layer inthe receiving computer.

Answer:True

82. Devices in a rack are connected togetherusing ___________. a.) patch cablesb.) stringc.) serversd.) modules e.) chassis switches

Answer:A

Page 8: 634 Multi Final

83. Digital Subscriber Line:a. is a fairly recent approach to providehigher data transmission rates acrosstraditional voice circuits in the local loopb. combines analog transmission andfrequency division multiplexingc. involves the use of a customer premisesequipment (CPE)d. uses a combination of amplitude and phasemodulatione. all of the above

Answer:E

84. Dynamic addressing: a. assigns a permanent network layer addressto a client computer in a networkb. makes network management morecomplicated in dial-up networks c. has only one standard, bootpd. is always performed for servers onlye. can solve many updating headaches fornetwork managers who have large, growing,changing networks

Answer:E

85. Each of the circuits connected to a switch is aseparate _______________ circuitconnecting the switch to a device on thenetwork.a. multipoint b. point-to-pointc. sharedd. ringe. star

Answer:B

86. Equipment used to transform analog voicesignals to digital signals and digital signals toanalog signals.a. voice converterb. modemc. codecd. multiplexere. demodulator

Answer:C

87. Errors on a network can occur: a. only on dial-up type of circuits b. because of noise on the line c. only on poorly maintained networksd. only due to Gaussian noisee. only due to lightning strikes

Answer:B

88. Ethernet LAN was developed by: a. IBMb. ARPANETc. DEC, Xerox, and Inteld. University of Minnesotae. CERN laboratory in Geneva

Answer:C

89. Frequency division multiplexing: a. operates by statistically time slicing thesignal b. operates by dividing the signal intodifferent frequencies c. uses a codec that divides signals intodifferent channelsd. operates by time slicing the signale. operates by light dividing the signal

Answer:B

90. Gateways: a. process all messages, even if the messagesare not explicitly addressed to them b. can translate one network protocol intoanotherc. are less complex than bridgesd. are most often used as the interfacebetween two or more networks that havesimilar data link and network layer protocolse. cannot perform a routing function

Answer:B

91. Having a conversation with someone using acellular phone is an example of _________transmission.a. simplexb. full-duplexc. half-duplexd. analoge. digital

Answer:B

92. How are the application architecturefunctions split up in a client-server network? a. the presentation logic and data storage areon the client, while the data access logic is onthe serverb. the data storage, data access, andpresentation logic are on the clientc. the presentation logic is on the client, whilethe data storage and data access logic are onthe serverd. the data storage and data access logic areon the client, while the presentation logic areon the servere. the presentation logic and data access logicare on the client, and the data storage is onthe server

Answer:C

93. If a signal with a frequency of 500 MHzcombines with a another signal of 1500 MHzand they form a new signal of 2000 MHz; thisis an example of:a. intermodulation noiseb. attenuationc. echod. jittere. harmonic distortion

Answer:A

Page 9: 634 Multi Final

94. IMAP (Internet Message Access Protocol):a. is a set of standards that define how emailis to be processed between mail servers b. is exactly the same as SMTPc. copies an e-mail message from the clientcomputer's hard disk, deletes it from theclient, and stores it on the mail serverd. is exactly the same as POPe. permits an e-mail message to remain storedon the mail server even after they have beenread by a client computer

Answer:E

95. In ______ geometric layout for a network,every computer is connected to every othercomputer often by point-to-point dedicatedcircuits.a. full mesh design b. ring designc. star designd. bus designe. partial mesh design

Answer:A

96. In a client-server network, _________ getssoftware from different vendors to worktogether.a. a front-end processorb. serverwarec. middlewared. centerwaree. programmer

Answer:C

97. In a packet switched network, permanentvirtual circuits that look very similar to a_____________ (for hardware-baseddedicated circuits) move packets through thenetwork.a. cloud-based ring designb. cloak-based mesh designc. cloud-based mesh design d. common carrier ring designe. common carrier bus design

Answer:C

98. In connection-oriented routing, the_________ layer sets up a virtual circuitbetween the sender and the receiver. a. transportb. networkc. physicald. data linke. connection

Answer:A

99. In general, controlled approaches: a. work better than contention approachesfor small networks that have low usageb. work better than contention approachesfor large networks that have high usagec. work better than contention approachesfor all sizes of networks d. do not require a host, server, or activemonitor to assign media access controle. have many collisions

Answer:B

100. In general, local ISPs make money bycharging ________.a. customersb. ICANNc. UCAIDd. the DSLAMe. CSUs/DSUs

Answer:A

101. In its simplest form, the __________ hastwo columns: the first column lists everycomputer and device in the network, whilethe second column lists the computer ordevice to which that computer should sendmessages, if they are destined for thecomputer in the first column. a. linking loaderb. routing tablec. configuration listing d. bus header assignment liste. file allocation table

Answer:B

102. In recent years, management's concern aboutthe adequacy of current control and securitymechanisms used in a data communicationsenvironment has: a. decreased because the new sophisticatedtechnology is far more secure than the oldmanual methodsb. remained the same because managementwas always deeply interest in control andsecurityc. decreased because of the change in moraland ethical codes in the U.S. to a kinder andgentler societyd. increased because this commitment todata communications has changed thepotential vulnerability of the organization'sassetse. remained the same because there are veryfew threats to data communications

Answer:D

103. In the Internet model, the application layercorresponds to the ________, layer(s) s ofthe OSI model.a. data link and networkb. session, presentation and applicationc. application layerd. application and presentatione. network, transport and presentation

Answer:B

Page 10: 634 Multi Final

104. In the three tier architecture the software onthe client computer is responsiblefor____________.a. presentation logicb. application logicc. data access logicd. data storagee. application storage

Answer:A

105. In which layer of the Internet model wouldthe HTTP standard be used?a. physicalb. applicationc. transportd. networke. data link

Answer:B

106. In which type of modulation is a 1distinguished from a 0 by shifting thedirection in which the wave begins?a. bandwidth modulationb. amplitude modulationc. frequency modulationd. phase modulatione. codec modulation

Answer:D

107. Internet 2 is also known as:a. CA*Net3b. IETFc. Next Generation Internetd. the Abilene networke. passive optical networking

Answer:D

108. Inverse multiplexing means: a. combining several low speed circuits toenable them to be transmitted across onehigh speed circuitb. multiplexing from the terminal to the host,rather than from the host to the terminalc. combining high speed circuits to enablethem to be transmitted across one low speedcircuitd. inverting the frequencies used fortransmission across a low speed circuit forswitching to a digital circuite. multiplexing to a codec, rather than to amodem

Answer:A

109. IP: a. performs packetizing functions b. does not have a header c. is currently in use with only one packetform or structured. performs routing functionse. performs error control functions

Answer:D

110. Marc Andreessen led a team that developedthe first graphical Web browser, which wascalled:a. Internet Explorerb. Mosaicc. Firebirdd. Netscape Navigatore. Mozilla

Answer:B

111. Media access control refers to:a. the price of fiber optic cableb. security over floppy disks in a userenvironmentc. the ability for a user to use multimediaequipment in a LANd. controlling access to a media by more thanone computer in a LANe. the control over coax cable installed by acable service provider

Answer:D

112. Media access control: a. is not very important in point-to-pointwith full duplex configuration b. is not very important in local areanetworksc. is not very important in a point-to-pointwith a half duplex configurationd. is not very important in a multipointconfiguration e. does not control when computers transmit

Answer:A

113. Mesh networks: a. usually provide relatively long routesthrough the network (compared to ringnetworks)b. require more processing by each computerin the network than in star or ring networksc. do not use decentralized routingd. do not have much capacity wasted bynetwork status information e. do not have many possible routes throughthe network to prevent one circuit frombecoming overloaded

Answer:B

114. Microwave transmission: a. is a type of high frequency radiocommunicationb. requires a clear line-of-sight pathc. is typically used for long distance datatransmissiond. does not require the laying of any cablee. all of the above

Answer:E

Page 11: 634 Multi Final

115. National ISPs connect together and exchangedata at ___________.a. Network Access Pointsb. cable modem termination systemendpointsc. distribution hubsd. the Internet engineering task forceheadquarterse. the Internet Society network center

Answer:A

116. Network demand will not be reduced by:a. restricting (or moving) applications suchas desktop videoconferencingb. using network devices to ensure thatbroadcast messages do not go to othernetworksc. encouraging the use of applications suchas medical imagingd. sending status information to allcomputers on all LANs in the backbonenetworke. restricting (or moving) applications suchas multimedia

Answer:C

117. Networks that are designed to connectsimilar computers that share data andsoftware with each other are called:a. client/server networksb. peer-to-peer networksc. host networksd. client networkse. local area networks

Answer:B

118. Of the following, which is not true about fiberoptic cable?a. it is thinner than unshielded twisted paircableb. it is lighter than unshielded twisted paircablec. it has a very low capacityd. it is more expensive than CAT5 unshieldedtwisted pair cablee. it is a type of guided media

Answer:C

119. Often, incidents of ___________ involveemployees of the organization, surprisinglyenough.a. intrusion b. disruptionc. controlled chaosd. destructione. disaster

Answer:A

120. On digital circuits, we use _________ toreshape the incoming signal and preventattenuation.a. amplifiersb. repeatersc. multiplexersd. digitizerse. modems

Answer:B

121. One disadvantage of the ____________architecture is that places a greater load onthe network.a. two-tierb. three tierc. one-tierd. n-tiere. layered

Answer:D

122. One drawback to dynamic routing is: a. Routing usually does not reflect changingnetwork conditions, such as computers thatare overloaded by many messagesb. It cannot be used with non-governmentnetworksc. The transmission of status information"wastes" network capacity that could be usedto send user messages d. It is the job of the network manager, notthe computers or devices themselves, tomaintain the routing table.e. It requires less processing by eachcomputer than static routing.

Answer:C

123. One underlying problem with a host-basednetwork is that: a. there are economies of scale because allcomputer resources are centralized b. the server can get overloaded since it mustprocess all messagesc. the architecture is relatively simple andworks welld. the server is the one point of control whichsimplifies securitye. clients (terminals) do not requiresophisticated hardware/software becausethey do not perform most of the work in thistype of architecture

Answer:B

124. Pervasive networking means that: a. the five-layer network model will be used todesign all networksb. all networks of the future will be developedby a monopolistic organization c. the cost of computers will be higher in thefutured. virtually all computers will be networkedin some way to other computers and be ableto transmit data at staggeringly fast ratese. cable companies will offer more than 150network selections for viewers

Answer:D

Page 12: 634 Multi Final

125. Routers: a. operate at the application layer b. operate only at the physical layerc. cannot connect two or more networks thatuse the same type of cabled. may also be called TCP/IP gateways e. operate only at the data link layer

Answer:D

126. Server name resolution is done using the:a. Address Resolution Protocolb. Border Gateway Protocolc. Internet Control Message Protocold. Routing Information Protocol e. Domain Name Service

Answer:E

127. Some of the new applications beingdeveloped for a high-speed Internet includea.) Tele-immersionb.) Tele-conferencingc.) QoSd.) Broadbande.) Tele-phoning

Answer:A

128. Switched Ethernet:a. always has a lower capacity than sharedEthernet.b. operates at 50% of capacity beforeperformance becomes a problem.c. operates at about 95% of capacity beforeperformance becomes a problem.d. is affected by the increased collisionscaused by using a switched LAN design.e. decreases network performance becauseeach computer is connected via a commonmultipoint circuit.

Answer:C

129. Switched Ethernet: a. uses a hub to connect computersb. has a physical topology of a ringc. has a logical topology of a ringd. has a logical topology of a buse. usually enables all attached circuits tosend or receive packets simultaneously

Answer:E

130. Synchronous transmission: a. cannot be used on multipoint circuits b. is used to send one character at a timec. uses start bits before each character to besentd. uses stop bits after each character to besente. is used to transmit a "frame" or "packet"of data at a time

Answer:E

131. TCP uses _____________ so that thedestination station can reassemble thepackets into the correct order.a. IP addressesb. sequence numbersc. port numbersd. packet numberse. reassembly value

Answer:B

132. TCP/IP: a. is the least commonly used networkprotocol for LANs because it cannot becombined with Ethernetb. performs packetizing, as well as routingand addressing functions c. is not very efficient and is prone to errorsd. is compatible with only one type of datalink protocol, SDLCe. refers to Telephone ControlProcedures/Inter-exchange Procedures

Answer:B

133. The _________ is the connection from ahome or business to the telephone companyend office. a. distribution hubb. RFCc. UCAIDd. local loope. CA*net 3

Answer:D

134. The _________ layer is responsible forrouting of messages from the sender to thefinal destination.a. data communication layerb. resident layerc. application layerd. network layere. physical layer

Answer:d

135. The ____________ layer links theapplication layer with the network layer isresponsible for end-to-end delivery ofmessages.a. physicalb. transportc. sessiond. presentatione. data link

Answer:B

136. The ____________ layer of the OSI model isresponsible for data format translation.a. sessionb. presentationc. physicald. applicatione. transport

Answer:B

Page 13: 634 Multi Final

137. The ability to transmit in both directions, butonly in one direction at a time is an exampleof _______________ transmission.a. simplexb. full-duplexc. half-duplexd. analoge. digital

Answer:C

138. The closest the Internet has to an "owning"organization is the ___________.a. Internet Service Providerb. Abilene networkc. CA*Net3d. University Corporation for AdvancedInternet Developmente. Internet Society

Answer:E

139. The direction in which the sound wavebegins is known as:a. amplitude, which our ears detect asloudnessb. frequency, which our ears detect as pitchc. phased. bandwidthe. furlong

Answer:C

140. The earliest type of fiber optic systems were: a. Graded index multimodeb. Attenuatedc. Multimoded. Single modee. Step mode

Answer:C

141. The familiar background static on radiosand telephones is called: a. echoes b. intermodulation noisec. line outages d. cross-talke. white noise

Answer:E

142. The fourth layer of the OSI model is called the__________ layer.a. network b. transport c. session d. data linke. presentation

Answer:B

143. The height of a sound wave is called its:a. frequencyb. phasec. amplituded. bandwidthe. furlong

Answer:C

144. The high bandwidth requirements (highcommunications needs) for video haveslowed its integration into computernetworks.

Answer:True

145. The idea for a special hypertext network,called the World Wide Web, was conceived ofby:a. Microsoft in 1994 as part of the Windows95 projectb. Tim Berners-Lee at the EuropeanLaboratory for Particle Physics (CERN) in1989c. Vinton Cerf, for the U.S. Department ofDefense in 1969 as a network of fourcomputers called ARPANETd. Howard Flieshman of IBM in 1982 as partof the development of the IBM PCe. the University of Minnesota as anextension of Gopher

Answer:B

146. The integration of voice, video, and datacommunications is also known as__________. a. convergenceb. peer-to-peer networksc. metropolitan wide networksd. regional bell operating companye. intranet

Answer:A

147. The loss of power a signal suffers as it travelsfrom the transmitting computer to areceiving computer is: a. jitterb. spikingc. attenuation d. intermodulation noisee. echo

Answer:C

148. The negotiation by the transport layer at thesender with the transport layer at thereceiver to determine what size packetsshould be set up is done via establishing a(n)___________ between the sender andreceiver.a. network layer address resolutionb. one way handshakec. SNA messaged. TCP connectione. DNS server request

Answer:D

149. The network layer of the Internet model usesthe _____________ protocol to routemessages though the network.a. TCPb. HTTPc. FTPd. SMTPe. IP

Answer:E

Page 14: 634 Multi Final

150. The newer form of IP, version 6 (Ipv6) is: a. running out of address space to supportthe growth of the Internetb. has a 20 byte headerc. has an increased address size from 32 bitsto 128 bitsd. does not include version number in itsheadere. does not include hop limit in its header

Answer:C

151. The older version of IP has a ________header of control information. a. 128-bitb. 192-bitc. 1024-bitd. 160-bite. 320-bit

Answer:B

152. The primary reason for networkingstandards is to:a. simplify cost accounting for networks b. ensure that hardware and softwareproduced by different vendors can worktogetherc. make it more difficult to develop hardwareand software that link different networksd. ensure that all network components of aparticular network can be provided by onlyone vendore. lock customers into buying networkcomponents from one vendor

Answer:B

153. The primary source of error in datacommunications is: a. echoesb. intermodulation noisec. spikesd. jitter e. cross-talk

Answer:C

154. The probability of detecting an error, giventhat one has occurred, using parity checkingis about: a. 100%b. 0%c. 50%d. 75%e. 98%

Answer:C

155. The representation of the character A by thegroup of 8 bits, 01000001, is an example of:a. digital codingb. phase modulationc. binary modulation d. analog transmissione. pitch variation

Answer:A

156. The server version of the Network OperatingSystem does not: a. provide the software that performs thefunctions associated with the physical layerb. provide the software that performs thefunctions associated with the data link layerc. provide the software that performs thefunctions associated with the applicationlayerd. provide the software that performs thefunctions associated with the network layere. usually provide the software that performsthe functions associated with the computer'sown operating system

Answer:A

157. The source destination port identifier tellsthe destination station _____________.a. which computer sent the TCP packet.b. which application layer program that thepacket should be sentc. which application layer process the packetis from.d. the IP address of the source computer.e. the IP address of the destinationcomputer.

Answer:C

158. The three basic network access points intomost organizational networks are from theInternet, from LANs inside of theorganization and ________________.a. dial-up access through a modem b. intranetc. extranetd. WANe. none of the above

Answer:A

159. The three fundamental approaches torouting are: a. circuitous, flat, and direct routingb. connectionless, static, and connection-orientedc. subordinate, master, and insubordinateroutingd. host, client, and client-server routinge. centralized, static routing, and dynamicrouting

Answer:E

160. The three stages of the formalstandardization process are______________________.a. specification, identification of choices andacceptance.b. planning, implementing and acceptance.c. brainstorming, identification andimplementing.d. specification, formalization, andacceptance.e. none of the above.

Answer:A

Page 15: 634 Multi Final

161. The transport layer must break messagesfrom the application layer into several_____ that can be sent to the data link layer.a. bitsb. bytesc. framesd. packetse. strings

Answer:D

162. The two basic types of media are: a. statistical and frequencyb. guided and wireless (radiated)c. local and wide aread. attenuator and Gaussiane. duplexed and non-duplexed

Answer:B

163. The type of logical topology that Ethernetuses is a: a. ringb. busc. stard. meshe. interconnected

Answer:B

164. The type of media usually installed on homesand businesses by the telephone company iscalled ____________.a. fiber optic cableb. coaxial cablec. twisted paird. phone cablee. phone wire

Answer:C

165. The type of multiplexer that divides thecircuit horizontally into different lightfrequencies that are transmittedsimultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexerd. frequency division multiplexere. statistical frequency division multiplexer

Answer:A

166. Threat of intrusion comes from____________.a. the governmentb. crackersc. outside of the organizationd. both inside and outside of theorganizatione. inside of the organization

Answer:D

167. To get a page from the Web, a user must typein a URL, which stands for:a. Unknown Resource Locatorb. Unknown Router Locationc. Uniform Router Locationd. Uniform Resource Locatore. Uniform Resource Library

Answer:D

168. To get more "bandwidth" in a digitaltransmission, you must:a. increase the range of frequencies availablefor a transmission b. increase the loudness per transmissionc. decrease the bits per second transmissionspeedd. increase the phase shifts per transmissione. increase the baud rate per transmission

Answer:A

169. To interact with the World Wide Web, aclient computer needs an application layersoftware package called a:a. Web browser b. Web serverc. Telnet packaged. Uniform Resource Locator packagee. Router package

Answer:A

170. To snare intruders, many organizations nowuse _________ techniques.a. entrapmentb. hackerc. Trojan horsed. crackere. DES

Answer:A

171. Transmission Control Protocol/InternetProtocol was developed for ________ in1974. a. ARPANET b. IBMc. Hewlett-Packardd. University of Minnesotae. Xerox

Answer:A

172. Transmission speeds:a. are the same among all mediab. are not a factor in selecting a mediabecause all media have more than enoughspeed to serve current communicationdemandsc. are a constant, 56Kbps, for all media typesd. differ widely among mediae. always have a direct correlation withsecurity

Answer:D

173. Using parity, the probability for detecting anerror, given that one has occurred, is: a. about 50% for either even or odd parityb. about 70% for even parity and 30% for oddparityc. about 30% for even parity and 70% for oddparityd. about 0% for either even or odd parity e. about 100% for either even or odd parity

Answer:A

Page 16: 634 Multi Final

174. what size packets should be set up is done viaestablishing a(n) ___________ between thesender and receiver.a. network layer address resolutionb. one way handshakec. SNA messaged. TCP connectione. DNS server request

Answer:D

175. When a person uses a regular modem tomake a connection to an Internet serviceprovider through POTS, the data travels overa: a. dedicated circuit b. dialed circuitc. ISDN circuitd. VPN circuite. T-1 carrier circuit

Answer:B

176. When a signal is reflected back to thetransmitting equipment, it is called a(n)_________.a. jitterb. echoc. crosstalkd. attenuatione. impulse noise

Answer:B

177. When all bits of a character are transferredone after another, the bits are transferred in___________ mode.a. serialb. frequency divisionc. multiplexingd. parallele. full complex

Answer:A

178. When TCP/IP translates a network layeraddress into a data link layer address, itsends a special ____________ to allcomputers in the subnet. a. physical layer packetb. multicast messagec. X.25 messaged. broadcast message e. application layer packet

Answer:D

179. When TCP/IP translates an application layeraddress into an IP address, it sends a special__________ to the nearest DNS server. a. broadcast messageb. DNS request packetc. SNA packetd. IPX messagee. X.25 packet

Answer:B

180. When the output signal from an amplifier ona circuit is different from the input signal,this is called _________________.a. intermodulation noiseb. attenuationc. echod. jittere. harmonic distortion

Answer:E

181. Which is not a function of the physical layer:a. transmission of bits.b. defining the rules by which one and zeroesare transmitted.c. providing error-free transmission of data.d. providing the physical connection betweensender and receiver.e. specifying the type of connection and typeof signals, waves or pulses that pass thoughit.

Answer:C

182. Which is not true about point-to-pointcircuits?a. point-to-point circuits are dedicated to theuse of the two computers.b. point-to-point circuits are more expensivethan multipoint circuits.c. point-to-point circuits are called dedicatedcircuits.d. point-to-point circuits reduce the amountof cable required and use the circuit moreefficiently than multipoint circuits.e. point-to-point circuits are used when thecomputers generate enough traffic to fill thecapacity of the communication circuit.

Answer:D

183. Which layer of the OSI model is responsiblefor ensuring flow control so that thedestination station does not receive morepackets that it can process at any given time?a. presentation Layerb. transport Layerc. physical Layerd. session Layere. application Layer

Answer:B

184. Which layer of the OSI model is responsiblefor ensuring that all packets sent arereceived by the destination station by dealingwith end-to-end issues?a. presentation Layerb. transport Layerc. physical Layerd. session Layere. application Layer

Answer:B

Page 17: 634 Multi Final

185. Which of the following can connect twodifferent networks that utilize the same ordifferent data link and network layerprotocols as well as the same or differentcable type?a.) Switchb.) Routerc.) Gatewayd.) Hube.) NIC

Answer:C

186. Which of the following can provide faulttolerance for the storage space on a server?a. RAIDb. SCSIc. IDEd. USBe. EIDE

Answer:A

187. Which of the following devices is the mostcomplex? a. Gatewayb. Routerc. Layer 3 switchesd. Switche. Multiprotocol router

Answer:A

188. Which of the following groups developedInternet 2?a. MCI WorldComb. ARDNOCc. UCAIDd. Yipese. ISOC

Answer:C

189. Which of the following is a characteristic ofsound waves that can be modulated toconvert digital data into analog signals?a. phaseb. attenuationc. bipolard. bandwidthe. codec

Answer:A

190. Which of the following is a function of thetransport layer?a. linking the physical layer to the networklayerb. formatting messages by indicating wherethey start and endc. deciding which route the message shouldtaked. breaking long messages into severalsmaller messagese. specifying the type of connection and theelectrical signals, radio waves, or light pulsesthat pass through it

Answer:d

191. Which of the following is a primaryadvantage of a VPN?a. low costb. inflexibilityc. unpredictable traffic congestiond. securitye. complexity to the user

Answer:A

192. Which of the following is a term used togroup together the physical and data linklayers? a. Internetwork layersb. Hardware layersc. Software layersd. Middleware layerse. Application layers

Answer:B

193. Which of the following is not a basicarchitecture for dedicated circuit networks?a. ringb. partial meshc. busd. stare. full mesh

Answer:C

194. Which of the following is not a basic LANcomponent? a. clientb. PADc. serverd. network interface carde. network operating system

Answer:B

195. Which of the following is not a benefit ofpacket switched services? a. The data transmission rates tend to belower than dial-up or dedicated circuits.b. You don't have to set up dedicated circuitsbetween each end point from and to whichyou wish to transmit data and/or voice.c. You have the flexibility to send datathrough a temporary circuit between twoconnections that will be disconnected assoon as the digital transmission iscompleted.d. All circuits are less susceptible to a greatdeal of noise because they are digital.e. You don't have to specify all theinterconnecting services you need for yourWAN when you buy the service.

Answer:A

196. Which of the following is not a controlledaccess method of media access control? a. Token passingb. CSMA/CDc. pollingd. roll call polling e. hub polling

Answer:B

Page 18: 634 Multi Final

197. Which of the following is not a criticalsoftware component in a dedicated serverLAN? a. application software on server computersb. network operating system in the dedicatedserverc. network communication software on theclientd. LAN metering softwaree. application software on client computers

Answer:D

198. Which of the following is not a function of thedata link layer?a. deciding when to transmit messages overthe mediab. formatting the message by indicatingwhere messages start and end, and whichpart is the addressc. detecting and correcting any errors thathave occurred in the transmission of themessaged. specifying the type of connection, and theelectrical signals, radio waves, or light pulsesthat pass through ite. controlling the physical layer bydetermining when to transmit

Answer:d

199. Which of the following is not a key advantageof digital transmission?a. It permits only low transmission rates.b. It is more efficient.c. It is simpler to integrate voice, video, anddata on the same circuit.d. It is more secure.e. It produces fewer errors.

Answer:A

200. Which of the following is not a problem withdialed circuits?a. Data transmission rates on dialed circuitsare relatively low.b. Dialed circuits may vary in quality.c. Transmission rates for dialed circuits canvary with each call. d. It is hard to predict if a given connectionwill be clear or noisy.e. Use of these circuits is very simple.

Answer:E

201. Which of the following is not a property of aWAN:a. connects backbone networks and MANS.b. spans hundreds or thousands of milesc. provides data transmission speeds from56Kbps to 10Gbps.d. connects a group of computers in a smallgeographic area such as room, floor,building or campus.e. uses lease lines from IXCs like ATT, MCI,Sprint.

Answer:D

202. Which of the following is not a type ofhardware device that can be used tointerconnect networks? a. switchesb. routersc. multiprotocol routersd. 'dumb' terminalse. gateways

Answer:D

203. Which of the following is not a type of VPN?a. intranet VPNb. extranet VPNc. access VPNd. T-1 VPNe. a VPN that enables employees to access anorganization's network from a remotelocation

Answer:D

204. Which of the following is not a way that arouter differs from a switch? a. routers can connect two or more networksthat use the same data link protocol b. routers only process messages that arespecifically addressed to itc. routers operate at the network layer d. routers perform more processing on eachmessage than switche. routers can choose the "best" routebetween networks for forwarding a packet

Answer:A

205. Which of the following is not a way to reducenetwork demand? a. shifting network usage from high costtimes to lower cost timesb. using data compression techniques for alldata in the networkc. requiring a network impact statement forall application software developed by theorganizationd. moving data further from the applicationsand people who use theme. shifting network usage from peak to lowerdemand times

Answer:D

206. Which of the following is not an advantage ofa WLAN?a. The ability to use the network in placeswhere it is impractical to install a wirednetwork.b. WLANs enable mobile users to work atdifferent locations within an office buildingand stay connected to the network.c. WLANs enable business travelers toconnect the Internet from within waitingareas.d. WLANs allow users to work more securelythan a wired LAN.e. WLANs cost less to install and operate inmost cases (except new buildings) thanwired networks.

Answer:D

Page 19: 634 Multi Final

207. Which of the following is not an applicationlayer standard?a. HTTPb. POPc. T1d. IMAPe. HTML

Answer:C

208. Which of the following is not an effective wayto reduce LAN network demand: a. move files to client computersb. use disk caching on the client machinesc. find an application that places a largedemand on the network and run it a timewhen the network is lightly loadedd. add hidden nodese. shift the users' routines

Answer:D

209. Which of the following is not an importantfuture trend in communication andnetworking? a. development of online batch systems b. integration of voice, video, and datac. pervasive networking d. provision of new information services onrapidly expanding networks e. development of extremely high speedbroadband networks

Answer:A

210. Which of the following is not given to a clientcomputer when it is first installed on aTCP/IP network so that it has theappropriate routing/addressinginformation? a. application layer address b. subnet maskc. its own IP addressd. IP address of its DNS servere. IP address of a gateway, router, or a switchoutside of its subnet

Answer:A

211. Which of the following is not one of the majorcategories (or sub-categories) into whichnetwork security threats can be placed? a. disruptionb. destructionc. controlled chaos d. intrusione. disaster

Answer:C

212. Which of the following is not true aboutCSMA/CD? a. The acronym refers to Carrier SenseMultiple Access with Collision Detectionb. It is used in token ring protocol LANsc. It is a contention-based media accesscontrol techniqued. When a collision has occurred, thecomputers that wish to transmit wait arandom amount of time after a collidingmessage before attempting to retransmite. Computers on the circuit 'listen' beforetransmitting

Answer:B

213. Which of the following is not true about defacto standards? a. They never evolve into formal standards.b. They are those standards that emerge inthe marketplace.c. They tend not to be developed by an officialindustry or government body.d. They are generally supported by more thanone vendor but de facto standards have noofficial standing.e. They tend to emerge based upon theneeds/response of the marketplace.

Answer:A

214. Which of the following is not true aboutformal standards?a. They are always developed before de factostandards.b. One example exists for network layersoftware (IP).c. They can be developed by an officialindustry body.d. They can take several years to develop. e. They can be developed by a governmentbody.

Answer:A

215. Which of the following is not true aboutswitched backbones?a. performance is improved over traditional(bridged or routed) backbone networksb. each connection into the switch is aseparate point-to-point circuit whichsupports simultaneous access by the LANsconnected to the switchc. there are many more networking devices ina switched backbone networkd. if the switch fails, so does the entirebackbone network e. the backbone essentially exists in theswitch; there is no backbone cable

Answer:C

Page 20: 634 Multi Final

216. Which of the following is not true aboutswitched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub.c. It has faster connections (almostimmediate) than traditional Ethernet.d. It essentially provides a point-to-pointconnection between computers.e. It has forwarding tables in which entriesare learned over time.

Answer:A

217. Which of the following is true about roll callpolling? a. It can not be modified to increase priorityof clients or terminals. b. It does not require a server or host orspecial device that performs the polling. c. It is also called token passing. d. It is a type of contention approach tomedia access control.e. It typically involves some waiting becausethe server has to wait for a response from thepolled client or terminal.

Answer:E

218. Which of the following is true about the datalink protocol, Ethernet (IEEE 802.3)?a. it is not very popularb. it is a bit-oriented protocolc. it uses block check characters for errordetectiond. newer version permits jumbo framese. it uses parity bits for error detection

Answer:D

219. Which of the following is true regardingswitched backbones?a. They place all network devices for one partof the building physically in the same room,often in a rack of equipmentb. They have an advantage of requiring lesscablec. They make it more difficult to movecomputers from one LAN to anotherd. Network capacity is always tied to thephysical location of the computerse. They are harder to maintain and upgradethan a BN that is not rack-based

Answer:A

220. Which of the following is true with respect tothe data link layer? a. It accepts streams of bits from theapplication layer.b. It is responsible for getting a message fromone computer to another (one node toanother) without errors.c. It does not perform error detection.d. It performs routing functions.e. It organizes data from the physical layerand passes these coherent messages to theapplication layer.

Answer:B

221. Which of the following is way to reduce oreliminate crosstalk on a circuit,a. changing multiplexing techniques b. adding repeaters or amplifiers to a circuitc. reducing the length of the cabled. adding fluorescent lightse. shorting a circuit

Answer:A

222. Which of the following media can bestwithstand harsh environmental conditions? a. shielded twisted pair b. unshielded twisted pair c. Cat 5 twisted paird. coaxial cablee. fiber optic cable

Answer:E

223. Which of the following media has the lowesterror rates and the highest transmissionspeeds?a. coaxial cableb. unshielded twisted pairc. shielded twisted paird. fiber optic cablee. infrared

Answer:D

224. Which of the following media is leastsusceptible to noise? a. fiber optic cableb. coaxial cablec. twisted paird. unshielded twisted paire. shielded twisted pair

Answer:A

225. Which of the following new Internet effortswas started by 34 universities? a. CA*net 3b. ARDNOCc. vBNSd. NGIe. UCAID

Answer:E

226. Which of the following statements is correct?a. Parallel transmission is most often usedfor sending data on a circuit that is made upof one wire.b. Parallel transmission is distinguishedfrom serial transmission by the fact that thetransmitting device sends a single bit, then asecond bit, and so on, until all the bits aretransmitted.c. Parallel transmission is only used foranalog data.d. Serial transmission is slower than paralleltransmission.e. Parallel transmission is the same as serialtransmission.

Answer:D

Page 21: 634 Multi Final

227. Which of the following type of media is leastsusceptible to eavesdropping? a. fiber optics b. twisted pair c. microwaved. infrarede. coaxial cable

Answer:A

228. Which of the following type of media is mostcommonly used in backbone networksbecause of its high capacity? a. fiberb. infrared frequenciesc. coax cabled. unshielded twisted paire. shielded twisted pair

Answer:A

229. Which of the following type of networkspermit packets from separate messages to beinterleaved?a. circuit switched networkb. dedicated circuit networkc. dial up circuit networkd. packet switched networke. Fractional T-1 network

Answer:D

230. Which of the following would be a standardused at the Data Link layer of the Internet orOSI model?a. IPb. TCPc. Ethernetd. HTTPe. FTP

Answer:C

231. Which of the following would be considered atype of wireless media? a. unshielded twisted pair b. shielded twisted pairc. coaxial cabled. microwavee. fiber optics

Answer:D

232. Which type of digital signaling wouldexperience fewer errors because it has moredistinct signals?a. unipolarb. serialc. bipolar d. attenuatione. Huffman encoding signal

Answer:C

233. With __________ ARQ, the senderimmediately sends the next message orpacket of data. a. continuous b. immediatec. open windowd. stop-and-waite. halt and be recognized (HBR)

Answer:A

234. With __________ ARQ, the sender pausesfor a response from the receiver to alter eachmessage or packet of data. a. open window b. halt and be recognized (HBR)c. sliding windowd. stop and waite. continuous

Answer:D

235. With a client-based network, onefundamental problem is that: a. the clients each must store all the datab. the server does not have any data storagecapabilityc. the host or server must performpresentation logic, application logic, anddata access logic at the same time d. all data on the server must travel to theclient for processinge. the clients must perform the data storagelogic

Answer:D

236. With a switched backbone network, theequipment is usually placed in a ______.a.) server b.) NIC c.) cabinet d.) basement e.) rack

Answer:E

237. With a virtual private network, users createpermanent virtual circuits through theInternet called:a. burstsb. cellsc. tunnelsd. ringse. clouds

Answer:C

238. With contention: a. computers wait until the circuit is freebefore they send datab. the server or front end processor worksconsecutively through a list of clients todetermine who should have access to themediac. the front end processor must wait for aresponse from the polled client or terminald. one computer starts the poll and passes itto the next computer on the multipointcircuite. there is never a chance for "collision," ortwo computers trying to send data at thesame time

Answer:A

Page 22: 634 Multi Final

239. With odd parity (assume that the parity bit(in bold) has been placed at the end of each ofthe following) and a 7-bit ASCII code, whichof the following is incorrect? a. 0110101 1b. 0001101 1c. 0010010 1d. 1011011 0e. 1111111 0

Answer:B

240. With QoS routing different __________ aredefined, each with different priorities. a. classes of service b. domain namesc. application layer addressesd. data link layer addressese. classes of Internet addresses

Answer:A

241. With respect to converting digital data intoanalog signals, AM stands for:a. Asynchronous Manchesterb. Analog Multimodec. Amplitude Modulation d. Anomaly Multiplexinge. Analytical Mosaic

Answer:C

242. With respect to costs for a client-servernetwork, which of the following is true?a. Personal computers used as clients in aclient-server network cost about the same asmainframes for the same amount ofcomputing power. b. More network capacity, which costs moremoney, is required for client-server networksthan for client-based networks.c. Experts believe that client serverarchitectures can be complex, but thatdeveloping application software for hostbased architectures is usually cheaper. d. Updating the network with new version ofsoftware tends to be less expensive in aclient-server network since the software iscentralized in one client. e. None of the above

Answer:C

243. With the "thin client" architecture, when anapplication changes, only the _________with the application logic needs to beupdated.a. clientb. serverc. middlewared. hardwaree. software

Answer:B

244. With the two-tier client-server architecture,the client is responsible for the ________logic and the server is responsible for the________ logic.a. Application; presentationb. Presentation; data accessc. Data access; presentationd. Application; data accesse. Presentation; application storage

Answer:B

245. With which type of digital signaling does thesignal always return to zero volts after eachbit?a. Non-return-to-zero signalingb. Unipolar signalingc. Return-to-zero signalingd. Data rate signalinge. Huffman encoding signal

Answer:C