Related Topics
Take Another Quiz

MIS 564

203 Questions
Management Quizzes & Trivia
Questions and Answers
  • 1. 
    Modern (1990s and beyond) data communication networks are characterized by:
    • A. 

      Decks of punch cards

    • B. 

      Online terminals for batch processing

    • C. 

      Isolated (stand-alone) personal computers

    • D. 

      Batch I/O devices

    • E. 

      Distributed systems that rely heavily on networking

  • 2. 
    In 1983, the Internet was split into two parts, one dedicated solely to the military and one dedicated to university research centers. The two parts were called:
    • A. 

      Intranet and Extranet

    • B. 

      BITNET and NSFNET

    • C. 

      Milnet and Internet

    • D. 

      ARPANET and Milnet

    • E. 

      None of the above

  • 3. 
    Which of the following is not true about a server?
    • A. 

      Stores data and software that can be accessed by the client.

    • B. 

      Is the pathway through which messages travel.

    • C. 

      In client/server computing they work together over the network with client computers to support the business application.

    • D. 

      Can only perform one function on a network.

    • E. 

      Stores documents and graphics that can be accessed from any Web browser.

  • 4. 
    Networks that are designed to connect similar computers that share data and software with each other are called:
    • A. 

      Client/server networks

    • B. 

      Peer-to-peer networks

    • C. 

      Host networks

    • D. 

      Client networks

    • E. 

      Local area networks

  • 5. 
    The function of the file server is to :
    • A. 

      Store data and software programs that can be used by client computers on the network.

    • B. 

      Manage all printing requests from clients on the network.

    • C. 

      Transfer e-mail messages to other servers on the network.

    • D. 

      Store HTML documents for an Internet or intranet web site.

    • E. 

      Coordinate the communication of client and servers on the network.

  • 6. 
    A local area network is:
    • A. 

      A large central network that connects other networks in a distance spanning exactly 5 miles.

    • B. 

      A group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.

    • C. 

      A network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles).

    • D. 

      A network spanning a large geographical area (up to 1000s of miles).

    • E. 

      A network spanning exactly 10 miles with common carrier circuits.

  • 7. 
    A backbone network is:
    • A. 

      A high speed central network that connects other networks in a distance spanning up to several miles.

    • B. 

      A group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.

    • C. 

      A network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles).

    • D. 

      A network spanning a large geographical area (up to 1000s of miles).

    • E. 

      A network spanning exactly 200 miles with common carrier circuits.

  • 8. 
    A metropolitan area network is:
    • A. 

      A high speed central network, built with privately owned media, which connects other networks in a distance spanning up to several miles.

    • B. 

      A group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.

    • C. 

      A network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.

    • D. 

      A network spanning a large geographical area (up to 1000s of miles).

    • E. 

      A network spanning exactly 543.56 miles with private media.

  • 9. 
    Which of the following is not a property of a WAN:
    • A. 

      Connects backbone networks and MANS.

    • B. 

      Spans hundreds or thousands of miles

    • C. 

      Provides data transmission speeds from 56Kbps to 10Gbps.

    • D. 

      Connects a group of computers in a small geographic area such as room, floor, building or campus.

    • E. 

      Uses lease lines from IXCs like ATT, MCI, Sprint.

  • 10. 
    Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?
    • A. 

      Presentation Layer

    • B. 

      Transport Layer

    • C. 

      Physical Layer

    • D. 

      Session Layer

    • E. 

      Application Layer

  • 11. 
    Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?
    • A. 

      Presentation Layer

    • B. 

      Transport Layer

    • C. 

      Physical Layer

    • D. 

      Session Layer

    • E. 

      Application Layer

  • 12. 
    The ____________ layer of the OSI model is responsible for data format translation.
    • A. 

      Session

    • B. 

      Presentation

    • C. 

      Physical

    • D. 

      Application

    • E. 

      Transport

  • 13. 
    In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model.
    • A. 

      Data link and network

    • B. 

      Session, presentation and application

    • C. 

      Application layer

    • D. 

      Application and presentation

    • E. 

      Network, transport and presentation

  • 14. 
    Which is not a function of the physical layer:
    • A. 

      Transmission of bits.

    • B. 

      Defining the rules by which one and zeroes are transmitted.

    • C. 

      Providing error-free transmission of data.

    • D. 

      Providing the physical connection between sender and receiver.

    • E. 

      Specifying the type of connection and type of signals, waves or pulses that pass though it.

  • 15. 
    The _________ layer is responsible for routing of messages from the sender to the final destination.
    • A. 

      Data communication layer

    • B. 

      Resident layer

    • C. 

      Application layer

    • D. 

      Network layer

    • E. 

      Physical layer

  • 16. 
    Which of the following is not a function of the data link layer?
    • A. 

      Deciding when to transmit messages over the media

    • B. 

      Formatting the message by indicating where messages start and end, and which part is the address

    • C. 

      Detecting and correcting any errors that have occurred in the transmission of the message

    • D. 

      Specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it

    • E. 

      Controlling the physical layer by determining when to transmit

  • 17. 
    Which of the following is a function of the transport layer?
    • A. 

      Linking the physical layer to the network layer

    • B. 

      Formatting messages by indicating where they start and end

    • C. 

      Deciding which route the message should take

    • D. 

      Breaking long messages into several smaller messages

    • E. 

      Specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it

  • 18. 
    Which of the following is a term used to group together the physical and data link layers?
    • A. 

      Internetwork layers

    • B. 

      Hardware layers

    • C. 

      Software layers

    • D. 

      Middleware layers

    • E. 

      Application layers

  • 19. 
    Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?
    • A. 

      IP

    • B. 

      TCP

    • C. 

      Ethernet

    • D. 

      HTTP

    • E. 

      FTP

  • 20. 
    In which layer of the Internet model would the HTTP standard be used?
    • A. 

      Physical

    • B. 

      Application

    • C. 

      Transport

    • D. 

      Network

    • E. 

      Data link

  • 21. 
    A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.
    • A. 

      Agreement

    • B. 

      Standard

    • C. 

      Protocol

    • D. 

      Regulations

    • E. 

      Policy

  • 22. 
    The network layer of the Internet model uses the _____________ protocol to route messages though the network.
    • A. 

      TCP

    • B. 

      HTTP

    • C. 

      FTP

    • D. 

      SMTP

    • E. 

      IP

  • 23. 
    The primary reason for networking standards is to:
    • A. 

      Simplify cost accounting for networks

    • B. 

      Ensure that hardware and software produced by different vendors can work together

    • C. 

      Make it more difficult to develop hardware and software that link different networks

    • D. 

      Ensure that all network components of a particular network can be provided by only one vendor

    • E. 

      Lock customers into buying network components from one vendor

  • 24. 
    Which of the following is not true about de juro standards?
    • A. 

      They are always developed before de facto standards.

    • B. 

      One example exists for network layer software (IP).

    • C. 

      They can be developed by an official industry body.

    • D. 

      They can take several years to develop.

    • E. 

      They can be developed by a government body.

  • 25. 
    Which of the following is not true about de facto standards?
    • A. 

      They never evolve into de juro standards.

    • B. 

      They are those standards that emerge in the marketplace.

    • C. 

      They tend not to be developed by an official industry or government body.

    • D. 

      They are generally supported by more than one vendor but de facto standards have no official standing.

    • E. 

      They tend to emerge based upon the needs/response of the marketplace.

  • 26. 
    The three stages of the de juro standardization process are ______________________.
    • A. 

      Specification, identification of choices and acceptance.

    • B. 

      Planning, implementing and acceptance.

    • C. 

      Brainstorming, identification and implementing.

    • D. 

      Specification, formalization, and acceptance.

    • E. 

      None of the above.

  • 27. 
    Which of the following is true about ISO:
    • A. 

      It makes technical recommendations about data communications interfaces

    • B. 

      Its name stands for International Organization for Standardization

    • C. 

      It is based in Geneva, Switzerland

    • D. 

      It is one of the most important standards-making bodies

    • E. 

      All of the above

  • 28. 
    Which of the following is not true about ITU-T:
    • A. 

      It is the technical standards-setting organization of the United Nations International Telecommunications Union

    • B. 

      It is the International Telecommunications Union – Telecommunications Group

    • C. 

      Its membership is limited to U.S. telephone companies

    • D. 

      It is based in Geneva, Switzerland

    • E. 

      Its membership is comprised of representatives from over 200 member countries

  • 29. 
    The internet standards organization that will allow anyone to join is __________________.
    • A. 

      ANSI

    • B. 

      ISO

    • C. 

      IETF

    • D. 

      IEEE

    • E. 

      ITU-T

  • 30. 
    Which standards body is responsible for the development of local area network (LAN) standards?
    • A. 

      ANSI

    • B. 

      ISO

    • C. 

      IETF

    • D. 

      IEEE

    • E. 

      ITU-T

  • 31. 
    Which of the following is not an important future trend in communication and networking?
    • A. 

      Development of online batch systems

    • B. 

      Integration of voice, video, and data

    • C. 

      Pervasive networking

    • D. 

      Provision of new information services on rapidly expanding networks

    • E. 

      Development of extremely high speed broadband networks

  • 32. 
    The integration of voice, video, and data communications is also known as __________.
    • A. 

      Convergence

    • B. 

      Peer-to-peer networks

    • C. 

      Metropolitan wide networks

    • D. 

      Regional bell operating company

    • E. 

      Intranet

  • 33. 
    A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network
    • A. 

      Anonymous FTP

    • B. 

      Data access logic

    • C. 

      Fat client

    • D. 

      Application architecture

    • E. 

      Response status architecture

  • 34. 
    A ________ is a group of computers linked together so that they act as one computer
    • A. 

      Workstation

    • B. 

      Transaction terminal

    • C. 

      Cluster

    • D. 

      Network computer

    • E. 

      Transaction terminal

  • 35. 
    ______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.
    • A. 

      Data storage

    • B. 

      Data access logic

    • C. 

      Application logic

    • D. 

      Presentation logic

    • E. 

      Application access storage

  • 36. 
    ________ is the presentation of information to the user and the acceptance of the user’s commands.
    • A. 

      Data storage

    • B. 

      Data access logic

    • C. 

      Application logic

    • D. 

      Presentation logic

    • E. 

      Application access storage

  • 37. 
    Client-server architectures:
    • A. 

      Cannot connect computers that use different hardware

    • B. 

      Are one of the least used network architectures today

    • C. 

      Can use middleware to provide a standard way of communicating between software from more than one vendor

    • D. 

      Assign the responsibility for the presentation logic to the server

    • E. 

      Were the earliest type of network architectures

  • 38. 
    In a client-server network, _________ gets software from different vendors to work together.
    • A. 

      A front-end processor

    • B. 

      Serverware

    • C. 

      Middleware

    • D. 

      Centerware

    • E. 

      Programmer

  • 39. 
    In the three tier architecture the software on the client computer is responsible for____________.
    • A. 

      Presentation logic

    • B. 

      Application logic

    • C. 

      Data access logic

    • D. 

      Data storage

    • E. 

      Application storage

  • 40. 
    A “thin client” architecture approach:
    • A. 

      Always is a two-tier network architecture

    • B. 

      Always is an n-tiered architecture

    • C. 

      Places all or almost all of the application logic on the client

    • D. 

      Places all or almost all of the application logic on the server

    • E. 

      Refers to the size of the cable connecting the clients to the network

  • 41. 
    With the “thin client” architecture, when an application changes, only the _________ with the application logic needs to be updated.
    • A. 

      Client

    • B. 

      Server

    • C. 

      Middleware

    • D. 

      Hardware

    • E. 

      Software

  • 42. 
    The idea for a special hypertext network, called the World Wide Web, was conceived of by:
    • A. 

      Microsoft in 1994 as part of the Windows 95 project

    • B. 

      Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989

    • C. 

      Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET

    • D. 

      Howard Flieshman of IBM in 1982 as part of the development of the IBM PC

    • E. 

      The University of Minnesota as an extension of Gopher

  • 43. 
    Marc Andreessen led a team that developed the first graphical Web browser, which was called:
    • A. 

      Internet Explorer

    • B. 

      Mosaic

    • C. 

      Firebird

    • D. 

      Netscape Navigator

    • E. 

      Mozilla

  • 44. 
    To interact with the World Wide Web, a client computer needs an application layer software package called a:
    • A. 

      Web browser

    • B. 

      Web server

    • C. 

      Telnet package

    • D. 

      Uniform Resource Locator package

    • E. 

      Router package

  • 45. 
    Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.
    • A. 

      Browser

    • B. 

      Application web

    • C. 

      Web server

    • D. 

      Operating system

    • E. 

      None of the above

  • 46. 
    To get a page from the Web, a user must type in a URL, which stands for:
    • A. 

      Unknown Resource Locator

    • B. 

      Unknown Router Location

    • C. 

      Uniform Router Location

    • D. 

      Uniform Resource Locator

    • E. 

      Uniform Resource Library

  • 47. 
    The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.
    • A. 

      Hypertext Transfer Protocol

    • B. 

      File Transfer Protocol

    • C. 

      Simple Mail Transfer Protocol

    • D. 

      Internet Message Access Protocol

    • E. 

      Hyperlink Transfer Protocol.

  • 48. 
    There are optional and required parts of an HTTP request. They are:
    • A. 

      Request address, request body

    • B. 

      Request address, request header, request body

    • C. 

      Request line, request header

    • D. 

      Request line, request body

    • E. 

      Request line, request header, request body

  • 49. 
    There are required and optional parts of an HTTP response. They are:
    • A. 

      Response status, response header, response body

    • B. 

      Response address, response header, response body

    • C. 

      Response status, response body

    • D. 

      Response address, response header

    • E. 

      Response status, response header

  • 50. 
    A response status code of 404 means:
    • A. 

      The requested page was not found

    • B. 

      The server is currently unavailable

    • C. 

      The sever is currently busy

    • D. 

      Your browser is incompatible with the Web server software.

    • E. 

      Your browser needs to be updated to the latest version.

  • 51. 
    The acronym, HTML, refers to:
    • A. 

      Header Markup Language

    • B. 

      Hypertext Markup Locator

    • C. 

      Hypertext Markup Language

    • D. 

      Hypertext Markup Library

    • E. 

      Hypertext Modulating Language

  • 52. 
    The most commonly used e-mail standard is:
    • A. 

      Simple Mail Transfer Protocol

    • B. 

      X.400

    • C. 

      CMC

    • D. 

      Post Office Protocol

    • E. 

      Telnet

  • 53. 
    In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail:
    • A. 

      Message transfer agent

    • B. 

      Router agent

    • C. 

      User agent

    • D. 

      Webcast package

    • E. 

      Gateway agent

  • 54. 
    Which of the following is not a user agent package?
    • A. 

      Outlook Express

    • B. 

      Microsoft Word

    • C. 

      Fedora

    • D. 

      Netscape Messenger

    • E. 

      Microsoft Outlook

  • 55. 
    Another term for a user agent is:
    • A. 

      Message transfer agent

    • B. 

      Router agent

    • C. 

      E-mail client

    • D. 

      Webcast package

    • E. 

      Web client

  • 56. 
    IMAP (Internet Message Access Protocol):
    • A. 

      Is a set of standards that define how email is to be processed between mail servers

    • B. 

      Is exactly the same as SMTP

    • C. 

      Copies an e-mail message from the client computer’s hard disk, deletes it from the client, and stores it on the mail server

    • D. 

      Is exactly the same as POP

    • E. 

      Permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

  • 57. 
    In a ___________ architecture, computers are both client and server, thus sharing the work.
    • A. 

      Host-based

    • B. 

      Client-based

    • C. 

      Client-server

    • D. 

      Peer-to-peer

    • E. 

      Network

  • 58. 
    With a _____________, one computer acts as several servers.
    • A. 

      Mainframe

    • B. 

      Virtual server

    • C. 

      Terminal

    • D. 

      Network computer

    • E. 

      Transaction terminal

  • 59. 
    The acronym, MIME, refers to:
    • A. 

      Multimedia Internet Mail Enterprise

    • B. 

      Multiple Internet Media Extension

    • C. 

      Multipurpose Internet Mail Extension

    • D. 

      Media Internet Mail Extension

    • E. 

      Multimedia Internet Mime Extension

  • 60. 
    Which of the following is not true about Telnet?
    • A. 

      Telnet requires an application layer program on the client computer and an application layer program on the server or host computer.

    • B. 

      Telnet poses no security threat.

    • C. 

      Telnet was designed in the early days of the Internet.

    • D. 

      You are using a host-based architecture with Telnet.

    • E. 

      One program that conforms to the Telnet standard is EWAN.

  • 61. 
    _________ is a special type of one directional videoconferencing in which content is sent from the server to the user.
    • A. 

      Broadcasting

    • B. 

      Instant messaging

    • C. 

      Webcasting

    • D. 

      H.323

    • E. 

      Net Meeting

  • 62. 
    The software that runs on the mail server is referred to as the ____________
    • A. 

      Mail transfer agent

    • B. 

      Mail user agent

    • C. 

      Microsoft Outlook

    • D. 

      Web server

    • E. 

      SMTP

  • 63. 
    Two fundamentally different types of data are:
    • A. 

      DSL and ADSL

    • B. 

      Asymmetric and symmetric

    • C. 

      Microsoft and IBM

    • D. 

      Digital and analog

    • E. 

      Local area and wide area

  • 64. 
    Which of the following is not a key advantage of digital transmission?
    • A. 

      It permits only low transmission rates.

    • B. 

      It is more efficient.

    • C. 

      It is simpler to integrate voice, video, and data on the same circuit.

    • D. 

      It is more secure.

    • E. 

      It produces fewer errors.

  • 65. 
    A(n) __________ circuit is another name for a multipoint configuration.
    • A. 

      Analog

    • B. 

      Dedicated

    • C. 

      Point-to-point

    • D. 

      Shared

    • E. 

      Simplex

  • 66. 
    Which is not true about point-to-point circuits?
    • A. 

      Point-to-point circuits are dedicated to the use of the two computers.

    • B. 

      Point-to-point circuits are more expensive than multipoint circuits.

    • C. 

      Point-to-point circuits are called dedicated circuits.

    • D. 

      Point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.

    • E. 

      Point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit.

  • 67. 
    Having a conversation with someone using a cellular phone is an example of _________ transmission.
    • A. 

      Simplex

    • B. 

      Full-duplex

    • C. 

      Half-duplex

    • D. 

      Analog

    • E. 

      Digital

  • 68. 
    The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.
    • A. 

      Simplex

    • B. 

      Full-duplex

    • C. 

      Half-duplex

    • D. 

      Analog

    • E. 

      Digital

  • 69. 
    The two basic types of media are:
    • A. 

      Statistical and frequency

    • B. 

      Guided and wireless

    • C. 

      Local and wide area

    • D. 

      Attenuator and Gaussian

    • E. 

      Duplexed and non-duplexed

  • 70. 
    The type of media usually installed on homes and businesses by the telephone company is called ____________.
    • A. 

      Fiber optic cable

    • B. 

      Coaxial cable

    • C. 

      Twisted pair

    • D. 

      Phone cable

    • E. 

      Phone wire

  • 71. 
    Another term for the weakening of a signal over distance is:
    • A. 

      Turnaround time

    • B. 

      Propagation delay

    • C. 

      Dispersion

    • D. 

      Insulation

    • E. 

      Attenuation

  • 72. 
    Which of the following media can best withstand harsh environmental conditions?
    • A. 

      Shielded twisted pair

    • B. 

      Unshielded twisted pair

    • C. 

      Cat 5 twisted pair

    • D. 

      Coaxial cable

    • E. 

      Fiber optic cable

  • 73. 
    __________ is a line-of-sight type of wireless media.
    • A. 

      Coaxial cable

    • B. 

      Microwave

    • C. 

      Radio

    • D. 

      Twisted pair

    • E. 

      Fiber optic

  • 74. 
    _____________ can be thought of as dividing the circuit horizontally.
    • A. 

      Frequency division multiplexing

    • B. 

      Statistical frequency division multiplexing

    • C. 

      Statistical time division multiplexing

    • D. 

      Time division multiplexing

    • E. 

      Wavelength division multiplexing

  • 75. 
    Microwave transmission:
    • A. 

      Is a type of high frequency radio communication

    • B. 

      Requires a clear line-of-sight path

    • C. 

      Is typically used for long distance data transmission

    • D. 

      Does not require the laying of any cable

    • E. 

      All of the above

  • 76. 
    ______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission).
    • A. 

      Line-of-sight effect

    • B. 

      Multimode index

    • C. 

      Saturation effect

    • D. 

      Raindrop attenuation

    • E. 

      Propagation delay

  • 77. 
    Which of the following is not an important factor to consider when selecting media to be used in a network?
    • A. 

      Prestige value of the type of media

    • B. 

      Type of network

    • C. 

      Cost

    • D. 

      Transmission distance

    • E. 

      Security

  • 78. 
    Which of the following is the most secure wired media?
    • A. 

      Coaxial cable

    • B. 

      Unshielded twisted pair

    • C. 

      Shielded twisted pair

    • D. 

      Fiber optic cable

    • E. 

      Infrared

  • 79. 
    A coding scheme that uses 10 bits to represent each character is capable of representing_________ different characters.
    • A. 

      256

    • B. 

      20

    • C. 

      200

    • D. 

      512

    • E. 

      1024

  • 80. 
    ____________ is one of the most commonly used coding schemes used in data transmission.
    • A. 

      ASCII

    • B. 

      ISDN

    • C. 

      MAU

    • D. 

      ATM

    • E. 

      FDM

  • 81. 
    The representation of the character A by the group of 8 bits, 01000001, is an example of:
    • A. 

      Digital coding

    • B. 

      Phase modulation

    • C. 

      Binary modulation

    • D. 

      Analog transmission

    • E. 

      Pitch variation

  • 82. 
    Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?
    • A. 

      Phase

    • B. 

      Attenuation

    • C. 

      Bipolar

    • D. 

      Bandwidth

    • E. 

      Codec

  • 83. 
    The height of a sound wave is called its:
    • A. 

      Frequency

    • B. 

      Phase

    • C. 

      Amplitude

    • D. 

      Bandwidth

    • E. 

      Furlong

  • 84. 
    _____________ is not a form of modulation used to transform digital data into analog signals.
    • A. 

      Synchronous time division

    • B. 

      Amplitude shift keying

    • C. 

      Amplitude modulation

    • D. 

      Frequency modulation

    • E. 

      Phase modulation

  • 85. 
    ____________ refers to changing the shape of the signal waves in different ways to represent a 1 or a 0.
    • A. 

      Digitizing

    • B. 

      Sampling

    • C. 

      Modulation

    • D. 

      Demodulation

    • E. 

      Shaping

  • 86. 
    With respect to converting digital data into analog signals, AM stands for:
    • A. 

      Asynchronous Manchester

    • B. 

      Analog Multimode

    • C. 

      Amplitude Modulation

    • D. 

      Anomaly Multiplexing

    • E. 

      Analytical Mosaic

  • 87. 
    If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is :
    • A. 

      890 Hz

    • B. 

      8900 HZ

    • C. 

      9100 Hz

    • D. 

      9Khz

    • E. 

      890 KHz

  • 88. 
    The acronym, Modem, stands for _________________.
    • A. 

      Multiplexing/demultiplexing

    • B. 

      More/demote

    • C. 

      Mode-M technique

    • D. 

      Modulator/demodulator

    • E. 

      Mod emulation technique

  • 89. 
    Equipment used to transform analog voice signals to digital signals and digital signals to analog signals.
    • A. 

      Voice converter

    • B. 

      Modem

    • C. 

      Codec

    • D. 

      Multiplexer

    • E. 

      Demodulator

  • 90. 
    If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is?
    • A. 

      128 Kbps

    • B. 

      64 Kbps

    • C. 

      12800 bps

    • D. 

      96 Kbps

    • E. 

      32000 bps

  • 91. 
    A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.
    • A. 

      Transponder

    • B. 

      Multiplexer

    • C. 

      Inverse multiplexer

    • D. 

      Codec

    • E. 

      Intelligent terminal

  • 92. 
    Frequency division multiplexing:
    • A. 

      Operates by statistically time slicing the signal

    • B. 

      Operates by dividing the signal into different frequencies

    • C. 

      Uses a codec that divides signals into different channels

    • D. 

      Operates by time slicing the signal

    • E. 

      Operates by light dividing the signal

  • 93. 
    Time (non-statistical) division multiplexing differs from frequency division multiplexing because it:
    • A. 

      Does not share a communication circuit

    • B. 

      Splits the communication circuit vertically (with time slots) instead of horizontally

    • C. 

      Increases the wavelength and phase angles of the baseband frequency used for transmission

    • D. 

      Moves the baseband of a circuit by shifting it to a higher frequency

    • E. 

      Reduces baseband signal velocity more than frequency division multiplexing

  • 94. 
    As part of the five-layer network model used in this textbook, the data link layer sits directly between:
    • A. 

      The physical and the application layers

    • B. 

      The network and the application layers

    • C. 

      The network and transport layers

    • D. 

      The physical and the application layers

    • E. 

      The physical and the network layers

  • 95. 
    ____________ is not a function of a data link protocol.
    • A. 

      Media access control

    • B. 

      Message delineation

    • C. 

      Amplitude shift keying

    • D. 

      Indicating when a message starts and stops

    • E. 

      Error control

  • 96. 
    Media access control:
    • A. 

      Is not very important in point-to-point with full duplex configuration

    • B. 

      Is not very important in local area networks

    • C. 

      Is not very important in a point-to-point with a half duplex configuration

    • D. 

      Is not very important in a multipoint configuration

    • E. 

      Does not control when computers transmit

  • 97. 
    Which of the following is not a controlled access method of media access control?
    • A. 

      Token passing

    • B. 

      CSMA/CD

    • C. 

      Polling

    • D. 

      Roll call polling

    • E. 

      Hub polling

  • 98. 
    Which of the following is true about roll call polling?
    • A. 

      It can not be modified to increase priority of clients or terminals.

    • B. 

      It does not require a server or host or special device that performs the polling.

    • C. 

      It is also called token passing.

    • D. 

      It is a type of contention approach to media access control.

    • E. 

      It typically involves some waiting because the server has to wait for a response from the polled client or terminal.

  • 99. 
    With contention:
    • A. 

      Computers wait until the circuit is free before they send data

    • B. 

      The server or front end processor works consecutively through a list of clients to determine who should have access to the media

    • C. 

      The front end processor must wait for a response from the polled client or terminal

    • D. 

      One computer starts the poll and passes it to the next computer on the multipoint circuit

    • E. 

      There is never a chance for ¡°collision,¡± or two computers trying to send data at the same time

  • 100. 
    In general, controlled approaches:
    • A. 

      Work better than contention approaches for small networks that have low usage

    • B. 

      Work better than contention approaches for large networks that have high usage

    • C. 

      Work better than contention approaches for all sizes of networks

    • D. 

      Do not require a host, server, or active monitor to assign media access control

    • E. 

      Have many collisions

  • 101. 
    Errors on a network can occur:
    • A. 

      Only on dial-up type of circuits

    • B. 

      Because of noise on the line

    • C. 

      Only on poorly maintained networks

    • D. 

      Only due to Gaussian noise

    • E. 

      Only due to lightning strikes

  • 102. 
    Which of the following media is least susceptible to noise?
    • A. 

      Fiber optic cable

    • B. 

      Coaxial cable

    • C. 

      Twisted pair

    • D. 

      Unshielded twisted pair

    • E. 

      Shielded twisted pair

  • 103. 
    ____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.
    • A. 

      Contracted bits

    • B. 

      Polled bits

    • C. 

      Inverse multiplexed bits

    • D. 

      Flipped bits

    • E. 

      Bit delineation

  • 104. 
    The familiar background static on radios and telephones is called:
    • A. 

      Echoes

    • B. 

      Intermodulation noise

    • C. 

      Impulse noise

    • D. 

      Cross-talk

    • E. 

      White noise

  • 105. 
    Cross-talk:
    • A. 

      Occurs when one circuit picks up signals in another

    • B. 

      Is always bothersome because it has a high signal strength

    • C. 

      Decreases with increased proximity of two wires

    • D. 

      Decreases during wet or damp weather

    • E. 

      Increases with lower frequency signals

  • 106. 
    The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is:
    • A. 

      White noise

    • B. 

      Spiking

    • C. 

      Attenuation

    • D. 

      Intermodulation noise

    • E. 

      Echo

  • 107. 
    _____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise.
    • A. 

      Shielding wires

    • B. 

      Adding fluorescent lights

    • C. 

      Adding repeaters to a circuit

    • D. 

      Adding amplifiers to a circuit

    • E. 

      Shorting a circuit

  • 108. 
    _____________ is an effective way to prevent attenuation.
    • A. 

      Shielding wires

    • B. 

      Adding fluorescent lights

    • C. 

      Adding repeaters or amplifiers to a circuit

    • D. 

      Changing multiplexing techniques

    • E. 

      Shorting a circuit

  • 109. 
    On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation.
    • A. 

      Amplifiers

    • B. 

      Repeaters

    • C. 

      Multiplexers

    • D. 

      Digitizers

    • E. 

      Modems

  • 110. 
    Which of the following is not an error detection method used in the data link layer?
    • A. 

      Parity checking

    • B. 

      Cyclic redundancy checking

    • C. 

      CRC-32

    • D. 

      Pulse code checking

    • E. 

      Odd parity

  • 111. 
    With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect?
    • A. 

      01101011

    • B. 

      00011011

    • C. 

      00100101

    • D. 

      10110110

    • E. 

      11111110

  • 112. 
    The probability of detecting an error, given that one has occurred, using parity checking is about:
    • A. 

      100%

    • B. 

      0%

    • C. 

      50%

    • D. 

      75%

    • E. 

      98%

  • 113. 
    The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:
    • A. 

      75%

    • B. 

      0%

    • C. 

      Exactly 100%

    • D. 

      50%

    • E. 

      > 99%

  • 114. 
    ARQ means that:
    • A. 

      A receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error

    • B. 

      The common carrier Automatically Returns Queries to the subscriber upon receipt of such queries

    • C. 

      A sender is using a data link protocol called Asynchronous Repeating reQuest

    • D. 

      A fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines

    • E. 

      A sender is using a parity scheme called Array Resource Quality

  • 115. 
    In ARQ, a NAK:
    • A. 

      Is sent by the recipient if the message was received without error

    • B. 

      Is sent by the sender at the same time as it sends a data packet

    • C. 

      Is sent by the recipient if the message contains an error

    • D. 

      Refers to non-asynchronous Kermit technique

    • E. 

      Means that the sender should continue with sending the next message

  • 116. 
    Stop-and-wait ARQ uses ___________ type of data flow.
    • A. 

      Full simplex

    • B. 

      Half complex

    • C. 

      Full duplex

    • D. 

      Half duplex

    • E. 

      Full complex

  • 117. 
    Asynchronous transmission:
    • A. 

      Is used to transmit each character simultaneously with all other characters

    • B. 

      Has a pre-determined, fixed time between sending characters

    • C. 

      Is typically used on multipoint half duplex circuits

    • D. 

      Uses a continuous series of start bits as an idle signal

    • E. 

      Is also known as start-stop transmission

  • 118. 
    Synchronous transmission:
    • A. 

      Cannot be used on multipoint circuits

    • B. 

      Is used to send one character at a time

    • C. 

      Uses start bits before each character to be sent

    • D. 

      Uses stop bits after each character to be sent

    • E. 

      Is used to transmit a ¡°frame¡± or ¡°packet¡± of data at a time

  • 119. 
    Which of the following is true about the data link protocol, SDLC:
    • A. 

      It is a client-server protocol developed by Compaq in 1996

    • B. 

      It is a byte-count-oriented protocol

    • C. 

      It uses a special bit pattern called a flag at the beginning and end of every frame (or packet)

    • D. 

      It uses a contention media access control protocol

    • E. 

      It does not have a problem with transparency

  • 120. 
    Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)?
    • A. 

      It is not very popular

    • B. 

      It is a bit-oriented protocol

    • C. 

      It uses block check characters for error detection

    • D. 

      Newer version permits jumbo frames

    • E. 

      It uses parity bits for error detection

  • 121. 
    Which of the following is true about the data link protocol, PPP?
    • A. 

      It is commonly used in WANs

    • B. 

      It is a bit-oriented protocol

    • C. 

      It uses block check characters for error detection

    • D. 

      It was developed in the 1970s

    • E. 

      It uses parity bits for error detection

  • 122. 
    In communication protocols, _________ are used to convey the user¡¯s meaning.
    • A. 

      Information bits

    • B. 

      Overhead bits

    • C. 

      Stop bits

    • D. 

      Start bits

    • E. 

      Flag bits

  • 123. 
    _________________ is defined as the total number of information bits divided by the total number of bits in the transmission.
    • A. 

      Asynchronous rate

    • B. 

      Protocol percentage

    • C. 

      Throughput

    • D. 

      Transmission Rate of Information Bits

    • E. 

      Transmission efficiency

  • 124. 
    Calculating the actual throughput of a data communication network is:
    • A. 

      Not normally required for synchronous networks because they are so fast

    • B. 

      Complex because many factors affect throughput

    • C. 

      Simple because packet size is the primary factor affecting throughput

    • D. 

      Not needed for satellite-based networks

    • E. 

      Far less complicated if the system operates on a contention basis

  • 125. 
    TRIB, an acronym that relates to throughput, stands for:
    • A. 

      Throughput Reduction of Information Barriers

    • B. 

      Transmission Rate of Information Bits

    • C. 

      Throughput Rate of Iso-synchronous Bytes

    • D. 

      Transmission Regulation for Inverse-multiplexing Bands

    • E. 

      Trellis-coded Regulation of Information Bits

  • 126. 
    The ____________ layer links the application layer with the network layer and is responsible for end-to-end delivery of messages.
    • A. 

      Physical

    • B. 

      Transport

    • C. 

      Session

    • D. 

      Presentation

    • E. 

      Data link

  • 127. 
    __________ is NOT a function of the transport layer.
    • A. 

      End-to-end delivery of the message

    • B. 

      Taking messages from the application layer

    • C. 

      Routing

    • D. 

      Breaking long messages into smaller packets

    • E. 

      Interfacing with the network layer

  • 128. 
    _______ is the dominant network protocol today.
    • A. 

      SDLC

    • B. 

      SNA

    • C. 

      IPX/SPX

    • D. 

      TCP/IP

    • E. 

      X.25

  • 129. 
    Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.
    • A. 

      ARPANET

    • B. 

      IBM

    • C. 

      Hewlett-Packard

    • D. 

      University of Minnesota

    • E. 

      Xerox

  • 130. 
    TCP/IP:
    • A. 

      Is the least commonly used network protocol for LANs because it cannot be combined with Ethernet

    • B. 

      Performs packetizing, as well as routing and addressing functions

    • C. 

      Is not very efficient and is prone to errors

    • D. 

      Is compatible with only one type of data link protocol, SDLC

    • E. 

      Refers to Telephone Control Procedures/Inter-exchange Procedures

  • 131. 
    A typical TCP packet has a _______ header of control information.
    • A. 

      32-bit

    • B. 

      64-bit

    • C. 

      160-bit

    • D. 

      192-bit

    • E. 

      32-byte

  • 132. 
    The source port number tells the destination station _____________.
    • A. 

      Which computer sent the TCP packet.

    • B. 

      Which application layer program that the packet should be sent

    • C. 

      Which application layer process the packet is from.

    • D. 

      The IP address of the source computer.

    • E. 

      The IP address of the destination computer.

  • 133. 
    TCP uses _____________ so that the destination station can reassemble the packets into the correct order.
    • A. 

      IP addresses

    • B. 

      Sequence numbers

    • C. 

      Port numbers

    • D. 

      Packet numbers

    • E. 

      Reassembly value

  • 134. 
    The older version of IP has a ________ header of control information.
    • A. 

      128-bit

    • B. 

      192-bit

    • C. 

      1024-bit

    • D. 

      160-bit

    • E. 

      320-bit

  • 135. 
    The newer form of IP, version 6 (Ipv6):
    • A. 

      Is running out of address space to support the growth of the Internet

    • B. 

      Has a 20 byte header

    • C. 

      Has an increased address size from 32 bits to 128 bits

    • D. 

      Does not include version number in its header

    • E. 

      Does not include hop limit in its header

  • 136. 
    Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:
    • A. 

      Data link layer address

    • B. 

      Port number

    • C. 

      Application layer address

    • D. 

      Network address

    • E. 

      IP address

  • 137. 
    The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer.
    • A. 

      Bits

    • B. 

      Bytes

    • C. 

      Frames

    • D. 

      Packets

    • E. 

      Strings

  • 138. 
    The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver.
    • A. 

      Network layer address resolution

    • B. 

      One way handshake

    • C. 

      SNA message

    • D. 

      TCP connection

    • E. 

      DNS server request

  • 139. 
    Which of the following is not a protocol used at the application layer.
    • A. 

      HTTP

    • B. 

      SMTP

    • C. 

      FTP

    • D. 

      Telnet

    • E. 

      UDP

  • 140. 
    UDP is not commonly used for:
    • A. 

      Network management control messages

    • B. 

      RIP messages

    • C. 

      DHCP addressing messages

    • D. 

      HTTP requests

    • E. 

      Routing control messages

  • 141. 
    With QoS routing different __________ are defined, each with different priorities.
    • A. 

      Classes of service

    • B. 

      Domain names

    • C. 

      Application layer addresses

    • D. 

      Data link layer addresses

    • E. 

      Classes of Internet addresses

  • 142. 
    An application layer address using TCP/IPv4 looks like:
    • A. 

      128.192.78.5

    • B. 

      Www.cba.uga.edu

    • C. 

      [email protected]

    • D. 

      00-0F-00-81-14-00

    • E. 

      Building 4, Room 2, User 3

  • 143. 
    A client computer is assigned a data link layer address by:
    • A. 

      Hardware manufacturers

    • B. 

      Software manufacturers

    • C. 

      Middleware manufacturers

    • D. 

      Network managers who configure a file in a computer¡¯s network layer software package

    • E. 

      ISO

  • 144. 
    ICANN:
    • A. 

      Developed the IPX/SPX network layer protocol

    • B. 

      Assigns data link layer addresses

    • C. 

      Approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet

    • D. 

      Developed X.25 network layer protocol

    • E. 

      Refers to Interchange Computer Addressing Networks and Nodes

  • 145. 
    A(n) ________ refers to a group of computers that are logically grouped together by IP number.
    • A. 

      IPv6 group

    • B. 

      Subnet

    • C. 

      Data link group

    • D. 

      TCP group

    • E. 

      Application net

  • 146. 
    A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.
    • A. 

      11111111.0.0.0

    • B. 

      255.255.255.0

    • C. 

      255.0.0.0

    • D. 

      255.255.0.0

    • E. 

      255.255.255.255

  • 147. 
    Dynamic addressing:
    • A. 

      Assigns a permanent network layer address to a client computer in a network

    • B. 

      Makes network management more complicated in dial-up networks

    • C. 

      Has only one standard, bootp

    • D. 

      Is always performed for servers only

    • E. 

      Can solve many updating headaches for network managers who have large, growing, changing networks

  • 148. 
    ___________ is the translation of application layer addresses into IP addresses.
    • A. 

      Network interface card reversal

    • B. 

      IPv6

    • C. 

      Server name resolution

    • D. 

      Subnet masking

    • E. 

      Name service coding

  • 149. 
    Server name resolution is done using the:
    • A. 

      Address Resolution Protocol

    • B. 

      Border Gateway Protocol

    • C. 

      Internet Control Message Protocol

    • D. 

      Routing Information Protocol

    • E. 

      Domain Name Service

  • 150. 
    When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server.
    • A. 

      Broadcast message

    • B. 

      DNS request packet

    • C. 

      SNA packet

    • D. 

      IPX message

    • E. 

      X.25 packet

  • 151. 
    When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.
    • A. 

      Physical layer packet

    • B. 

      Multicast message

    • C. 

      X.25 message

    • D. 

      Broadcast message

    • E. 

      Application layer packet

  • 152. 
    _________ is a specially formatted request used to perform IP address to data link address resolution.
    • A. 

      Address Resolution Protocol

    • B. 

      Domain Service Request

    • C. 

      HTTP request

    • D. 

      Link state request

    • E. 

      Autonomous System Request

  • 153. 
    ___________ is the process of determining the path that a message will travel from sending computer to receiving computer.
    • A. 

      Routing

    • B. 

      Addressing

    • C. 

      Interfacing

    • D. 

      Broadcasting

    • E. 

      Packetizing

  • 154. 
    The _____________ is used by a computer to determine how messages will travel through the network.
    • A. 

      Routing table

    • B. 

      Configuration listing

    • C. 

      Linking loader

    • D. 

      Bus header assignment list

    • E. 

      File allocation table

  • 155. 
    In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.
    • A. 

      Linking loader

    • B. 

      Routing table

    • C. 

      Configuration listing

    • D. 

      Bus header assignment list

    • E. 

      File allocation table

  • 156. 
    The three fundamental approaches to routing are:
    • A. 

      Circuitous, flat, and direct routing

    • B. 

      Connectionless, static, and connection-oriented

    • C. 

      Subordinate, master, and insubordinate routing

    • D. 

      Host, client, and client-server routing

    • E. 

      Centralized, static routing, and dynamic routing

  • 157. 
    With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.
    • A. 

      Circuitous

    • B. 

      Decentralized

    • C. 

      Distance vector

    • D. 

      Indirect

    • E. 

      Link state

  • 158. 
    _______________ is a type of dynamic routing.
    • A. 

      Static routing

    • B. 

      Circuitous routing

    • C. 

      Centralized routing

    • D. 

      Link state

    • E. 

      X.25 routing

  • 159. 
    One drawback to dynamic routing is:
    • A. 

      Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages

    • B. 

      It cannot be used with non-government networks

    • C. 

      The transmission of status information ¡°wastes¡± network capacity that could be used to send user messages

    • D. 

      It is the job of the network manager, not the computers or devices themselves, to maintain the routing table.

    • E. 

      It requires less processing by each computer than static routing.

  • 160. 
    A type of message that is used when sending a message from one computer to another computer is called a:
    • A. 

      Unicast message

    • B. 

      Multicast message

    • C. 

      Broadcast message

    • D. 

      Guided message

    • E. 

      Radiated message

  • 161. 
    A special type of message that is used when sending the same message to a specific group of computers is called a:
    • A. 

      Unicast message

    • B. 

      Multicast message

    • C. 

      Broadcast message

    • D. 

      Guided message

    • E. 

      Radiated message

  • 162. 
    A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a:
    • A. 

      Unicast message

    • B. 

      Multicast message

    • C. 

      Broadcast message

    • D. 

      Guided message

    • E. 

      Radiated message

  • 163. 
    Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?
    • A. 

      Application layer address

    • B. 

      Subnet mask

    • C. 

      Its own IP address

    • D. 

      IP address of its DNS server

    • E. 

      IP address of a gateway, router, or a switch outside of its subnet

  • 164. 
    Which of the following is not a component of a router?
    • A. 

      CPU

    • B. 

      Interface

    • C. 

      Memory

    • D. 

      Keyboard

    • E. 

      Port

  • 165. 
    A majority of routers use the following operating system:
    • A. 

      Windows 95

    • B. 

      Red Hat Linux

    • C. 

      Windows Server 2008

    • D. 

      Cisco Internetwork Operating System

    • E. 

      Linksys OSI System

  • 166. 
    A(n) _____________ is not a common type of dedicated server
    • A. 

      File server

    • B. 

      Print server

    • C. 

      Database server

    • D. 

      Collision server

    • E. 

      Remote access server

  • 167. 
    Which of the following is not a basic LAN component?
    • A. 

      Client

    • B. 

      PAD

    • C. 

      Server

    • D. 

      Network interface card

    • E. 

      Network operating system

  • 168. 
    Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs?
    • A. 

      Cost (relative to fiber)

    • B. 

      Thickness (relative to coax)

    • C. 

      Weight (relative to coax)

    • D. 

      Flexibility (relative to coax)

    • E. 

      Security (relative to fiber)

  • 169. 
    Which of the following is not a purpose for using hubs in a network?
    • A. 

      To act as a communications server

    • B. 

      To connect network cables

    • C. 

      To prevent attenuation

    • D. 

      To act as a junction box

    • E. 

      None of the above

  • 170. 
    Hubs:
    • A. 

      Usually incorporate repeaters or amplifiers

    • B. 

      Have connection points called handles

    • C. 

      Limit the distance of a network to a few meters in length

    • D. 

      Are a difficult method to connect network cables

    • E. 

      Operate at the application layer

  • 171. 
    __________ is not true with respect to network hubs.
    • A. 

      Each port in a hub has a unique number.

    • B. 

      A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand

    • C. 

      Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes

    • D. 

      Many hubs act as repeaters or amplifiers

    • E. 

      Hubs provide a complicated way to connect network cables

  • 172. 
    _____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
    • A. 

      Network Services

    • B. 

      Directory Services

    • C. 

      Client Services

    • D. 

      Computing Services

    • E. 

      Remote Access Services

  • 173. 
    A _________ is a group of related resources.
    • A. 

      Workgroup

    • B. 

      Domain

    • C. 

      Server

    • D. 

      Client

    • E. 

      Sharepoint

  • 174. 
    A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
    • A. 

      User profile

    • B. 

      User access log

    • C. 

      Network profile

    • D. 

      Network operating system

    • E. 

      Server allocation list

  • 175. 
    ___________ is how the network works conceptually.
    • A. 

      Physical topology

    • B. 

      Logical topology

    • C. 

      Network topology

    • D. 

      Ethernet

    • E. 

      Media access control

  • 176. 
    The type of logical topology that Ethernet uses is a:
    • A. 

      Ring

    • B. 

      Bus

    • C. 

      Star

    • D. 

      Mesh

    • E. 

      Interconnected

  • 177. 
    A logical bus topology:
    • A. 

      Is always used by token ring protocol LANs

    • B. 

      Has all computers connected to each other in point-to-point connections

    • C. 

      Is limited to short distances since devices like a hub or repeater cannot be used with this type of topology

    • D. 

      Permits every message to be received by every computer on the bus, even when those messages are intended for other computers

    • E. 

      Has a central control device, such as a mainframe

  • 178. 
    Media access control refers to:
    • A. 

      The price of fiber optic cable

    • B. 

      Security over floppy disks in a user environment

    • C. 

      The ability for a user to use multimedia equipment in a LAN

    • D. 

      Controlling access to a media by more than one computer in a LAN

    • E. 

      The control over coax cable installed by a cable service provider

  • 179. 
    Which of the following is not true about CSMA/CD?
    • A. 

      The acronym refers to Carrier Sense Multiple Access with Collision Detection

    • B. 

      It is used in token ring protocol LANs

    • C. 

      It is a contention-based media access control technique

    • D. 

      When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit

    • E. 

      Computers on the circuit ¡®listen¡¯ before transmitting

  • 180. 
    _________ is not a type of Ethernet specification.
    • A. 

      100Base-T

    • B. 

      10GbE

    • C. 

      1000Base-T (1GbE)

    • D. 

      10Base-T

    • E. 

      Securenet

  • 181. 
    ________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T.
    • A. 

      Mullion Ethernet

    • B. 

      Base-T Ethernet

    • C. 

      10/100 Ethernet

    • D. 

      Token ring Ethernet

    • E. 

      FDDI Ethernet

  • 182. 
    Switch-based Ethernet:
    • A. 

      Uses a hub to connect computers

    • B. 

      Has a physical topology of a ring

    • C. 

      Has a logical topology of a ring

    • D. 

      Has a logical topology of a bus

    • E. 

      Usually enables all attached circuits to send or receive packets simultaneously

  • 183. 
    A switch uses a _____________ that is very similar to a routing table used in a router.
    • A. 

      Cable plan

    • B. 

      Forwarding table

    • C. 

      Network server

    • D. 

      Reversing table

    • E. 

      Switching mullion

  • 184. 
    Which of the following is not true about layer-2 switched Ethernet?
    • A. 

      A switch replaces the hub.

    • B. 

      The physical topology is the same as the physical topology of shared Ethernet: a ring.

    • C. 

      The logical topology is a star.

    • D. 

      The switch uses a forwarding table to route the packet to the correct circuit/computer.

    • E. 

      The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily.

  • 185. 
    Which of the following is not true about switched Ethernet?
    • A. 

      The switch has a physical bus topology.

    • B. 

      It uses a switch instead of a hub.

    • C. 

      It has faster connections (almost immediate) than traditional Ethernet.

    • D. 

      It essentially provides a point-to-point connection between computers.

    • E. 

      It has forwarding tables in which entries are learned over time.

  • 186. 
    Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network.
    • A. 

      Multipoint

    • B. 

      Point-to-point

    • C. 

      Shared

    • D. 

      Ring

    • E. 

      Star

  • 187. 
    Breaking a network into smaller parts is called network:
    • A. 

      Fragmentation

    • B. 

      Segmentation

    • C. 

      Localization

    • D. 

      Allocation

    • E. 

      Mitigation

  • 188. 
    Which of the following is not a WLAN standard?
    • A. 

      802.15

    • B. 

      802.11a

    • C. 

      802.3

    • D. 

      802.11b

    • E. 

      802.11g

  • 189. 
    The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________.
    • A. 

      802.11n

    • B. 

      802.11a

    • C. 

      802.3

    • D. 

      802.11b

    • E. 

      802.11g

  • 190. 
    A(n) _____________ is used in a computer to connect it to a WLAN.
    • A. 

      Ethernet NIC

    • B. 

      Antennae

    • C. 

      Wireless NIC

    • D. 

      Access point

    • E. 

      Hub

  • 191. 
    A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network.
    • A. 

      Ethernet NIC

    • B. 

      Antennae

    • C. 

      Wireless NIC

    • D. 

      Access point

    • E. 

      Hub

  • 192. 
    How can a set of 802.11b access points be configured to operate without interference?
    • A. 

      Assigning each access point a different channel to communicate with clients

    • B. 

      Separate each access point by more than 10 meters

    • C. 

      Assign the same channel to no more than two access points

    • D. 

      Use omnidirectional antennas on some access points and directional on others.

    • E. 

      None of the above

  • 193. 
    __________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.
    • A. 

      Directional

    • B. 

      Microware

    • C. 

      Omnidirectional

    • D. 

      Radio

    • E. 

      Vertical

  • 194. 
    CSMA/CA is an acronym for:
    • A. 

      Carrier Sense Multiple Access with Collision Acknowledgment

    • B. 

      Carrier Sense Mode Access with Carrier Avoidance

    • C. 

      Carrier Sense Multiple Access with Collision Avoidance

    • D. 

      Carrier Sensory Multiple Access without Collision Acknowledgment

    • E. 

      Carrier Sense Multiple Acknowledgment with Collision Avoidance

  • 195. 
    When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the:
    • A. 

      Out of range problem

    • B. 

      Collision problem

    • C. 

      Hidden node problem

    • D. 

      Controlled access problem

    • E. 

      Media access problem

  • 196. 
    802.11g is backward compatible with which type of LAN?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.15

    • D. 

      802.3

    • E. 

      802.5

  • 197. 
    The maximum data rate of an 802.11g WLAN is
    • A. 

      24 Mbps

    • B. 

      36 Mbps

    • C. 

      11 Mbps

    • D. 

      54 Mbps

    • E. 

      9 Mbps

  • 198. 
    Which of the following standards is backward compatible with IEEE802.11a, b, and g?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

    • E. 

      802.15

  • 199. 
    Which wireless standard will become the dominant standard of all the current standards?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11n

    • D. 

      802.15

    • E. 

      None of the above

  • 200. 
    Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________.
    • A. 

      Overlay networks

    • B. 

      Bluetooth

    • C. 

      Cellular networks

    • D. 

      Mobile networks

    • E. 

      Ethernet networks

  • 201. 
    Which of the following is not determined by a site survey?
    • A. 

      Feasibility of the desired coverage

    • B. 

      Potential sources of interference

    • C. 

      The security of the WLAN

    • D. 

      Estimated number of access points needed to provide coverage

    • E. 

      Current locations of the wired network into which the WLAN will connect.

  • 202. 
    _____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN.
    • A. 

      Wardriving

    • B. 

      Chalking

    • C. 

      Warchalking

    • D. 

      Marking

    • E. 

      Identifying

  • 203. 
    With _____________, the AP permits the owner to provide a list of valid addresses that can connect.
    • A. 

      EAP

    • B. 

      SSID

    • C. 

      WEP

    • D. 

      MAC address filtering

    • E. 

      SWEP