RCDD Chapter 16 Data Network Design

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Letad1
L
Letad1
Community Contributor
Quizzes Created: 13 | Total Attempts: 6,880
| Attempts: 255 | Questions: 137
Please wait...
Question 1 / 137
0 %
0/100
Score 0/100
1. The software associated with general-purpose servers on a network is called Network Operating System (NOS) software.

Explanation

The statement is true because Network Operating System (NOS) software is indeed the software associated with general-purpose servers on a network. NOS software provides the necessary tools and functionalities to manage and control network resources, such as file sharing, printer sharing, security, and user management. It allows multiple computers to communicate and share resources efficiently, making it an essential component of a network infrastructure.

Submit
Please wait...
About This Quiz
RCDD Quizzes & Trivia

This RCDD Chapter 16 quiz assesses key aspects of data network design, focusing on routing criteria, frame processing, and the role of routers. It evaluates understanding of metrics, datagram processing, and common hardware-software networking components, crucial for network design professionals.

Personalize your quiz and earn a certificate with your name on it!
2. The abbreviation for rack unit is sometimes given as:

Explanation

The correct abbreviation for rack unit is RU. This is a commonly used term in the field of computer hardware and refers to the standardized measurement for the height of a rack-mounted equipment. It is used to describe the vertical space that a device occupies within a rack. The abbreviation RA, UR, and UofR are not commonly used or recognized in this context.

Submit
3. A router may be configured to use both static and dynamic tables

Explanation

A router can be configured to use both static and dynamic tables. Static routing involves manually configuring the routing table, where the network administrator specifies the routes. Dynamic routing, on the other hand, uses protocols such as RIP, OSPF, or BGP to automatically update the routing table based on network changes. By using both static and dynamic tables, the router can have a combination of manually configured routes and routes that are dynamically learned and updated. This allows for more flexibility and control over the routing process.

Submit
4. The objective of the OSI model is to provide a ____________ approach for the development of all types of networks.

Explanation

The objective of the OSI model is to provide a structured approach for the development of all types of networks. This means that the model aims to organize and categorize the different functions and protocols involved in networking in a systematic and logical manner. By providing a structured approach, the OSI model helps ensure that networks are designed and implemented in a consistent and standardized way, making them easier to understand, manage, and troubleshoot.

Submit
5. Video conferencing is bandwidth intense.

Explanation

Video conferencing requires a significant amount of bandwidth because it involves transmitting and receiving live audio and video data in real-time. This data needs to be sent and received quickly to maintain a smooth and uninterrupted video conference experience. The higher the quality of the audio and video, the more bandwidth is required. Additionally, video conferencing often involves multiple participants, each requiring their own stream of data, further increasing the bandwidth demands. Therefore, it is true that video conferencing is bandwidth intense.

Submit
6. Servers can be classified according to their physical form and size as follows:

Explanation

The correct answer is "All of the above" because the question is asking for the classification of servers based on their physical form and size. The options provided - tower servers, rack-mount servers, appliance servers, and blade servers - cover all the possible classifications. Therefore, all of these options are correct as they represent different types of servers based on their physical form and size.

Submit
7. What are the three types of messages that most network devices are capable of issuing:

Explanation

Most network devices are capable of issuing three types of messages: unicast, broadcast, and multicast. Unicast refers to a message sent from one device to another specific device on the network. Broadcast is a message sent from one device to all devices on the network. Multicast is a message sent from one device to a specific group of devices on the network.

Submit
8. A port on a switch can be described as a ___________ connection

Explanation

A port on a switch can be described as a dedicated connection because it is exclusively assigned to a single device. This means that the bandwidth and resources of the port are dedicated solely to that device, ensuring a consistent and reliable connection without any interference or competition from other devices.

Submit
9. Linking the networks located at two or more sites within a city (50 miles) creates a:

Explanation

A Metropolitan Area Network (MAN) is a network that connects multiple local area networks (LANs) within a city or metropolitan area, typically spanning up to 50 miles. It provides high-speed connectivity and allows for the sharing of resources and data between the connected LANs. In this case, linking the networks located at two or more sites within a city would create a MAN, as it involves connecting LANs within a metropolitan area.

Submit
10. Email resides at which layer of the OSI model

Explanation

Layer 7 of the OSI model is the application layer. This layer is responsible for providing network services to applications, such as email, file transfer, and web browsing. It interacts directly with the end-user and provides a means for applications to access the network services. Since email is an application that relies on network services, it resides at layer 7 of the OSI model.

Submit
11. Lower layers of the OSI model provide services to upper layers.

Explanation

The lower layers of the OSI model, such as the physical layer, data link layer, and network layer, are responsible for providing services to the upper layers. These services include establishing and maintaining network connections, managing data transfer, and addressing and routing data packets. The upper layers, such as the transport layer, session layer, presentation layer, and application layer, rely on the services provided by the lower layers to ensure efficient and reliable communication across a network. Therefore, the statement that the lower layers of the OSI model provide services to upper layers is true.

Submit
12. Which type of frame processing is the most reliable, but slowest.

Explanation

Store-and-forward frame processing is the most reliable but slowest method. In this method, the switch receives the entire frame before forwarding it to the destination. It checks the frame for errors, discards any corrupted frames, and only forwards error-free frames. This process ensures that the destination receives the complete and error-free frame, making it the most reliable method. However, because the switch has to wait for the entire frame before forwarding, it introduces additional latency, making it the slowest method compared to cut-through and modified cut-through processing.

Submit
13. A port on a hub is referred to as a ___________ connection

Explanation

A port on a hub is referred to as a shared connection because in a hub, all the ports are connected to a single shared network. This means that the bandwidth and resources of the network are shared among all the devices connected to the hub. Any data transmitted through one port is broadcasted to all other ports, which can lead to collisions and slower transmission speeds. Therefore, a port on a hub is considered a shared connection.

Submit
14. For an organizational network to support voice applications it must be:

Explanation

For an organizational network to support voice applications, it must be capable of providing quality of service (QoS). QoS ensures that voice traffic is prioritized and given sufficient bandwidth, low latency, and minimal packet loss to maintain a high level of call quality. Without QoS capabilities, voice applications may suffer from poor audio quality, delays, and dropped calls, making it essential for the network to prioritize voice traffic over other types of data. Packet switching, VLAN capability, and convergence are also important for efficient network communication, but QoS is specifically required for supporting voice applications.

Submit
15. A __________ covers an area generally associated with an individual workspace. (33 ft)

Explanation

A Personal Area Network (PAN) is a network that covers an area generally associated with an individual workspace. This type of network is designed for personal use and typically includes devices such as computers, smartphones, and tablets that are connected wirelessly or through a wired connection. A PAN allows for communication and data sharing between these devices within a limited range, usually up to 33 feet. This range ensures that the network is confined to the immediate vicinity of the individual's workspace, making PAN the correct answer.

Submit
16. In the OSI  model, each layer provides ________ to the layer above.

Explanation

In the OSI model, each layer provides services to the layer above. This means that each layer performs specific functions and tasks to support the layer above it in the communication process. These services include protocols, error handling, data encryption, and other functionalities that ensure reliable and secure communication between the layers. By providing services, the layers in the OSI model work together to enable effective communication and data transfer between network devices.

Submit
17. Modified versions of desktop PCs have been developed to make networks more secure and easier to administer. A variety of terms are used to describe such stations, including:

Explanation

The given answer, "All of the above," is correct because all the terms mentioned (thin client, network appliance, managed PC, network computer or Net PC) refer to modified versions of desktop PCs that have been developed to enhance network security and administration. These terms are used interchangeably to describe these stations, indicating that they all fall under the category of modified desktop PCs designed for these purposes.

Submit
18. In unicast messaging, each message is addressed to how many recipients:

Explanation

In unicast messaging, each message is addressed to only one recipient. Unicast is a one-to-one communication model, where a message is sent from a sender to a specific receiver. Unlike broadcast or multicast messaging, unicast messaging ensures that the message is delivered to a single device or recipient. Therefore, the correct answer is 1.

Submit
19. The layers in the OSI model are commonly described as being connected to each other in vertical form, also called a _____________.

Explanation

The layers in the OSI model are commonly described as being connected to each other in vertical form, also called a protocol stack. A protocol stack refers to a set of protocols that work together to provide network services. Each layer in the stack performs specific functions and interacts with the layers above and below it to ensure efficient communication between network devices.

Submit
20. What term is used to describe the device with which a user accesses an organizational network.

Explanation

A station is the term used to describe the device with which a user accesses an organizational network. This can refer to a computer, laptop, or any other device that allows a user to connect to and access the network. The station acts as an interface between the user and the network, providing access to resources and allowing communication within the organization.

Submit
21. What is the objective of the OSI model?

Explanation

The objective of the OSI model is to provide a structured approach for the development of all types of networks. This means that the model serves as a guideline or framework for designing, implementing, and maintaining network architectures. It helps in organizing the various components of a network, such as protocols, hardware, and software, into distinct layers, which simplifies the process of network development and allows for interoperability between different systems. The OSI model does not directly provide protocols or tests for network communication, but rather offers a conceptual framework for their development.

Submit
22. Who oversees internet naming and addressing

Explanation

ICANN is responsible for overseeing internet naming and addressing. They manage and coordinate the Domain Name System (DNS), which is the system that translates domain names into IP addresses. ICANN also plays a crucial role in assigning unique identifiers and managing the allocation of IP addresses and top-level domains. They work to ensure the stability and security of the internet's naming and addressing systems, as well as promote competition and choice in the domain name market.

Submit
23. Which type of design is referred to as a top down design

Explanation

Functional design is referred to as a top-down design because it starts with the overall system or product and then breaks it down into smaller components or modules. This approach focuses on understanding the desired functionality and requirements of the system before diving into the details of how it will be implemented. It allows for a systematic and structured approach to designing complex systems, where the high-level design decisions are made first and then refined and detailed at lower levels. This helps ensure that the final design aligns with the intended functionality and goals of the system.

Submit
24. A switch operates at what layer of the OSI model:

Explanation

A switch operates at the data link layer of the OSI model. This layer is responsible for the reliable transmission of data between adjacent network nodes. Switches use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address in the incoming packet and forward it to the appropriate port based on the MAC address table. Therefore, switches operate at the data link layer to provide efficient and reliable data transmission within a network.

Submit
25. What approach does the OSI model use to illustrate and explain the message exchange process?

Explanation

The OSI model uses the approach of layering to illustrate and explain the message exchange process. Layering involves dividing the communication process into different layers, each responsible for specific functions. This allows for a modular and organized approach to network communication, where each layer builds upon the services provided by the layer below it. Layering helps in understanding and troubleshooting the communication process by isolating and addressing issues at specific layers, making it easier to comprehend and manage complex network systems.

Submit
26. The technologies used in switching have also been applied to ________, resulting in devices called layer 3 switches.

Explanation

The technologies used in switching, such as packet switching and routing, have also been applied to routers. Routers are devices that connect multiple networks and make decisions on how to route data packets between them. They operate at the network layer (layer 3) of the OSI model and use routing tables to determine the best path for data transmission. Layer 3 switches, on the other hand, combine the features of both switches and routers, allowing for efficient and fast data forwarding based on IP addresses.

Submit
27. Which type of message is sent to all devices:

Explanation

Broadcast messages are sent to all devices on a network. This means that the message is broadcasted to every device in the network, regardless of their location or specific address. It is a one-to-all communication method, where the sender does not need to know the specific address of each device. Broadcast messages are commonly used for tasks such as network discovery, updates, or announcements that need to reach all devices simultaneously.

Submit
28. In video conferencing what is the role of the gatekeeper

Explanation

The gatekeeper in video conferencing is responsible for managing videoconferencing-related operations on a network. This includes tasks such as controlling access to the network, managing bandwidth allocation, and ensuring the quality of the video conferencing sessions. The gatekeeper acts as a central point of control and coordination, facilitating the smooth operation of video conferencing sessions and optimizing network resources.

Submit
29. A standard equipment rack with 42U capacity can contain how many servers

Explanation

A standard equipment rack with 42U capacity can contain 168 servers. Each U (unit) in the rack can accommodate one server, therefore, multiplying the number of U's (42) by the number of servers per U (1), we get a total of 42 servers.

Submit
30. IETF stands for

Explanation

The correct answer is "Internet Engineering Task Force." The IETF is an open international community of network designers, operators, vendors, and researchers that develops and promotes Internet standards. It is responsible for the development and maintenance of protocols, such as TCP/IP, that are fundamental to the functioning of the Internet. The organization focuses on creating and improving standards through a consensus-driven process that involves working groups, meetings, and discussions among its members.

Submit
31. On a hub, all ports connect to a ________ communication channel.

Explanation

On a hub, all ports connect to a single communication channel. This means that all the devices connected to the hub share the same channel for communication. Unlike switches or routers, hubs do not have the capability to direct traffic to specific ports based on the destination address. Instead, they simply broadcast all incoming data to all connected devices. Therefore, a hub operates on a single communication channel, allowing all devices to communicate with each other on the same channel.

Submit
32. The hardware component that connects a station to the network medium is called:

Explanation

A NIC (Network Interface Card) is the hardware component that connects a station (such as a computer or device) to the network medium. It allows the station to send and receive data over the network. A NIC is typically installed inside the station and provides the necessary physical connection to the network medium, such as Ethernet cables. It acts as an interface between the station and the network, enabling communication and data transfer.

Submit
33. The NIC connects a station to what:

Explanation

The NIC (Network Interface Card) connects a station to the network medium. The network medium refers to the physical infrastructure that allows data to be transmitted between devices, such as cables or wireless signals. The NIC acts as the interface between the station and the network medium, enabling the transmission and reception of data. It provides the necessary hardware and software components to establish a connection and communicate with other devices on the network.

Submit
34. Routers operate at which layer of the OSI

Explanation

Routers operate at Layer 3 of the OSI model, also known as the network layer. This layer is responsible for logical addressing and routing of data packets across different networks. Routers use IP addresses to determine the best path for forwarding data packets from the source to the destination network. They make decisions based on network layer information, such as IP addresses, to direct traffic between different networks. Therefore, routers operate at Layer 3 to facilitate inter-network communication.

Submit
35. MAC addresses are ______ bits in length ( ____ hex digits)

Explanation

MAC addresses are unique identifiers assigned to network devices. They consist of 48 bits in length, which is equivalent to 12 hex digits. Hex digits are used to represent the 16 possible values (0-9, A-F) in a single digit, making it a convenient way to express the MAC address. Therefore, the correct answer is 48 bits, 12 hex digits.

Submit
36. A _______ covers an area generally associated with some or all of the space within a building.

Explanation

A Local Area Network (LAN) is a network that covers an area generally associated with some or all of the space within a building. It is a network that connects computers and devices within a limited geographical area, such as a home, office, or school building. LANs are commonly used to share resources, such as files and printers, and to provide internet access to multiple devices.

Submit
37. Which type of frame processing is the fastest, but least reliable.

Explanation

Cut-through frame processing is the fastest method as it starts forwarding the frame as soon as the destination address is received, without waiting for the complete frame. However, it is also the least reliable method as it doesn't perform any error checking before forwarding the frame. This means that if there are any errors in the frame, they will be propagated to the destination, potentially causing data corruption.

Submit
38. ONU stands for:

Explanation

ONU stands for Optical Network Unit. This is a device used in fiber optic communication systems to convert optical signals into electrical signals. It is typically used in passive optical networks (PONs) to connect end-user devices to the network. The ONU receives the optical signal from the central office and converts it into an electrical signal that can be used by the connected device. Therefore, Optical Network Unit is the correct answer.

Submit
39. What layer of the OSI model do routers operate at:

Explanation

Routers operate at the network layer of the OSI model. The network layer is responsible for logical addressing and routing of data packets between different networks. Routers use this layer to determine the best path for forwarding data packets based on the destination IP address. They make decisions about which route to take and how to handle traffic congestion. Therefore, routers operate at the network layer to facilitate communication between different networks.

Submit
40. What distributes all incoming and outgoing message traffic among the aggregated NICs in a server.

Explanation

Load balancing is the process of evenly distributing incoming and outgoing message traffic among the aggregated NICs (Network Interface Cards) in a server. This ensures that the workload is efficiently distributed across multiple network connections, preventing any single NIC from becoming overwhelmed. Load balancing helps to optimize performance, enhance fault tolerance, and improve overall network efficiency.

Submit
41. What are the two types of routing tables used by a router.

Explanation

The two types of routing tables used by a router are static tables and dynamic tables. Static tables are manually configured by the network administrator and do not change unless modified by the administrator. They are suitable for small networks with stable routes. Dynamic tables, on the other hand, are automatically updated based on information received from neighboring routers using routing protocols. They are suitable for larger networks where routes can change frequently.

Submit
42. What two types of design processes are required to produce a comprehensive set of designs for a proposed network.

Explanation

To produce a comprehensive set of designs for a proposed network, two types of design processes are required: functional and physical. The functional design process involves determining the network's requirements, functionalities, and how it will meet the intended purpose. On the other hand, the physical design process focuses on the actual implementation of the network, including the hardware, cabling, and physical layout. Both these design processes are crucial in ensuring that the network meets all the functional requirements while also being feasible and practical to implement.

Submit
43. Which standard associated with VoIP addresses coding and compression and converting speech into a 64 kb/s data stream

Explanation

G.711 is the correct answer because it is a standard associated with VoIP that addresses coding and compression. It specifically focuses on converting speech into a 64 kb/s data stream, which is important for maintaining the quality of voice communication over IP networks. G.521, G.642, and G.802 are not relevant to the specific requirements mentioned in the question.

Submit
44. The higher the latency, the higher the rated performance of the port or switch.

Explanation

The lower the latency, the higher the rated performance

Submit
45. Which recommendation (nonzero dispersion shifted optical fiber) was introduced in the early 1990's, optimized for emerging dense wave division multiplexing (DWDM) applications.

Explanation

ITU-T Recommendation G.655 was introduced in the early 1990s and was optimized for emerging dense wave division multiplexing (DWDM) applications. This recommendation specifically focuses on nonzero dispersion shifted optical fiber, which is designed to minimize the effects of dispersion in high-speed optical communication systems. By reducing dispersion, G.655 fiber allows for higher data transmission rates and increased capacity in DWDM systems, making it an ideal choice for the evolving telecommunications industry in the 1990s.

Submit
46. What allows replacement of any server NIC without powering down the server.

Explanation

Hot swap refers to the ability to replace a component, such as a server NIC (Network Interface Card), without needing to power down the server. This means that the server can continue running without any interruption or downtime. Hot swap technology allows for easy and convenient replacement of faulty or outdated components, ensuring continuous operation and minimizing disruptions to the system.

Submit
47. Which architecture standard applies to aWireless LAN (WLAN) Working Groupa

Explanation

The correct answer is 802.11. This is because 802.11 is the standard that applies to Wireless LAN (WLAN) technology. It specifies the protocols and procedures for wireless communication in a local area network. The other options, such as 802.15, 802.4, 802.6, and 802.10, are standards that apply to different types of networks or technologies, but not specifically to WLAN.

Submit
48. What is a combination of hardware and software, typically in the form of a specialized device:

Explanation

A router is a combination of hardware and software that is typically in the form of a specialized device. It is used to connect multiple networks together and direct data packets between them. Routers use routing tables and protocols to determine the best path for data transmission. They are commonly used in homes and businesses to connect to the internet and create local area networks (LANs). Routers are essential for efficient and secure data communication between different networks.

Submit
49. The 12 bits assigned to the VLAN identifier (VID) subfield makes it possible to create _________ different VLANs on a single physical network.

Explanation

The 12 bits assigned to the VLAN identifier (VID) subfield allows for a total of 4096 different VLANs to be created on a single physical network. Each VLAN can be uniquely identified by a 12-bit number, which allows for a large number of VLANs to coexist on the same network infrastructure. This provides flexibility in network segmentation and allows for better management and control of network traffic.

Submit
50. What can be described as the equivalent of link aggregation using two or more servers.

Explanation

Clustering can be described as the equivalent of link aggregation using two or more servers. Clustering involves combining multiple servers into a single system, allowing them to work together and share resources. This increases the overall performance, reliability, and availability of the system. Similarly, link aggregation combines multiple network links to create a single, high-bandwidth connection. Both techniques aim to improve performance and redundancy by pooling resources together.

Submit
51. Which type of message is sent to a select number of devices:

Explanation

Multicast is the correct answer because it refers to the type of message that is sent to a select number of devices within a network. Unlike unicast, which sends messages to a single device, or broadcast, which sends messages to all devices within a network, multicast allows for targeted communication to a specific group of devices. This is useful in scenarios where multiple devices need to receive the same message simultaneously, such as video streaming or software updates.

Submit
52. What are the connection points between layers called:

Explanation

Service access points (SAP) are the connection points between layers in a network. These points allow communication and data transfer between different layers. Each layer has its own set of SAPs that provide access to the services offered by that layer. SAPs act as interfaces between adjacent layers and enable the exchange of information and data between them. They play a crucial role in ensuring the smooth functioning of the network by facilitating the flow of data and services between layers.

Submit
53. How many server blades can you place into a chassis occupying three rack units.

Explanation

A server blade is a compact, modular server unit that can be inserted into a chassis. In this question, the chassis occupies three rack units. Each rack unit can accommodate four server blades. Therefore, to determine the number of server blades that can be placed into the chassis occupying three rack units, we multiply the number of rack units (3) by the number of server blades per rack unit (4), which equals 12.

Submit
54. Internet protocol version 4 (IPv4) network addresses are ____ bits in length.

Explanation

IPv4 network addresses are 32 bits in length. This means that an IPv4 address is composed of 32 binary digits or bits. Each bit can be either a 0 or a 1, allowing for a total of 2^32 (approximately 4.3 billion) unique addresses. This addressing scheme is used to identify devices on a network and facilitate communication between them.

Submit
55. In what year did the ISO introduce a framework for classifying all of the processes associated with message exchange on a network.

Explanation

In 1978, the ISO introduced a framework for classifying all of the processes associated with message exchange on a network. This framework provided a standardized way to categorize and organize the various processes involved in network communication. It helped to streamline and improve the efficiency of message exchange on networks, leading to more effective and reliable communication between systems.

Submit
56. If you see a picture of a network and it includes a picture of a house that is labeled ahomea what does the picture refer to.

Explanation

The picture refers to Ethernet in the first mile (802.3ah). This is because the picture includes a house labeled "ahome," which suggests that it represents a residential or home network. Ethernet in the first mile (802.3ah) is a standard that specifically addresses the last mile connectivity for residential and small business networks, making it the most appropriate choice based on the given information.

Submit
57. What provides the performance benefits associated with physical LAN segmentation without the need to connect a given station, server, or shared peripheral device to a specific switch port.

Explanation

VLANs (Virtual Local Area Networks) provide the performance benefits associated with physical LAN segmentation without the need to connect a given station, server, or shared peripheral device to a specific switch port. VLANs allow for logical segmentation of a network, where devices can be grouped together based on their function or department, even if they are physically connected to different switch ports. This allows for improved network performance, increased security, and easier network management.

Submit
58. What technique do print servers commonly use that is a combination of hardware and software that intercepts any file sent to a network printer and stores it temporarily on a network storage device.

Explanation

Spooling is a technique commonly used by print servers that combines both hardware and software components. It intercepts any file sent to a network printer and temporarily stores it on a network storage device. This allows the print server to efficiently manage the printing process by queuing the print jobs and sending them to the printer at a later time when it is ready to process them. Spooling helps prevent bottlenecks and allows multiple users to send print jobs simultaneously without disrupting the printing process.

Submit
59. When a NIC configures itself to operate at the maximum operating rate of the hub or switch it is set to:

Explanation

When a NIC configures itself to operate at the maximum operating rate of the hub or switch, it is set to autonegotiate (AUTONEG). Autonegotiation is a feature that allows network devices to automatically negotiate and select the highest possible data rate and communication settings that both devices support. This ensures optimal performance and compatibility between the NIC and the hub or switch. By using autonegotiation, the NIC can adjust its operating rate to match the capabilities of the hub or switch, allowing for efficient and reliable communication.

Submit
60. To improve the performance of data transfer a NIC can use a technique known as:

Explanation

Traffic prioritization is a technique used by a NIC (Network Interface Card) to improve the performance of data transfer. It involves assigning different levels of priority to different types of network traffic based on their importance or urgency. This allows the NIC to allocate more resources and bandwidth to high-priority traffic, ensuring that it is transmitted and received quickly and efficiently. By prioritizing traffic, the NIC can optimize data transfer and improve overall network performance.

Submit
61. What is used to describe the amount of time it takes a port or switch to process a frame

Explanation

Latency is the correct answer because it refers to the amount of time it takes for a port or switch to process a frame. It is a measure of the delay or time lag experienced in data transmission. Latency can be affected by various factors such as network congestion, distance, and processing capabilities of the devices involved. By understanding and minimizing latency, network administrators can optimize the efficiency and performance of their networks.

Submit
62. What type of network is created when a PC can be configured to operate as both a station and a server.

Explanation

When a PC can be configured to operate as both a station and a server, it creates a peer-to-peer network. In a peer-to-peer network, each computer can function as both a client and a server, allowing for direct communication and file sharing between the computers without the need for a central server. This type of network is commonly used in small-scale environments where there is no dedicated server and each computer has equal capabilities and responsibilities.

Submit
63. A servers _______ is an integrated set of programs designed to control and coordinate all access to network resources.

Explanation

A server's NOS (Network Operating System) is an integrated set of programs designed to control and coordinate all access to network resources. It helps manage and control network operations, such as file sharing, user authentication, and network security. The NOS ensures efficient communication and resource allocation between different devices connected to the network.

Submit
64. Which architecture standard applies to aWireless Personal Area Network (WPAN)a Working Groups

Explanation

The correct answer is 802.15. The 802.15 standard applies to Wireless Personal Area Network (WPAN) Working Groups. This standard specifically focuses on short-range wireless communication technologies, such as Bluetooth and Zigbee, which are commonly used in personal devices and home automation systems. It defines the physical layer (PHY) and medium access control (MAC) layer specifications for WPANs, ensuring interoperability and efficient communication between devices in a small area.

Submit
65. Routing _________, also referred to as routing _________, are used to dynamically configure and update routing tables

Explanation

Routing protocols are used to dynamically configure and update routing tables. These protocols determine the best path for data packets to travel from one network to another. Algorithms, on the other hand, are the mathematical formulas or sets of rules used by these routing protocols to make routing decisions. Therefore, both protocols and algorithms play a crucial role in the dynamic configuration and updating of routing tables.

Submit
66. Three practical power source options for power of balanced twisted pair are:

Explanation

The three practical power source options for power of balanced twisted pair are VoIP switches with integrated power supplies, Midspan units, and Local power sources. VoIP switches with integrated power supplies refer to switches that have built-in power supplies specifically designed for Voice over Internet Protocol (VoIP) applications. Midspan units are devices that can be added to an existing network to provide power over Ethernet (PoE) capabilities. Local power sources refer to power supplies that are located near the devices being powered, such as individual power adapters or batteries. These options provide different ways to supply power to balanced twisted pair systems depending on the specific requirements and setup.

Submit
67. The process of placing VLAN data into the appropriate fields in a frame is referred to as:

Explanation

VLAN tagging is the process of placing VLAN data into the appropriate fields in a frame. This allows network devices to identify and handle VLAN traffic correctly. By adding a VLAN tag, the frame can be associated with a specific VLAN, enabling the network to segregate and prioritize traffic based on VLAN membership. VLAN tagging is essential for implementing VLANs in a network and ensuring that data is routed accurately to the intended VLAN.

Submit
68. For VLAN tagging, a NIC is capable of tagging frames

Explanation

A NIC (Network Interface Card) is capable of tagging frames for VLAN (Virtual Local Area Network) tagging. VLAN tagging is a method used to identify and separate different VLANs on a network. By tagging frames, the NIC can assign a VLAN identifier to each frame, allowing for proper routing and segregation of network traffic. Therefore, the statement is true.

Submit
69. A ________ is created by linking the LANs located in two or more buildings that are in close proximity.

Explanation

A Campus Area Network (CAN) is created by linking the LANs located in two or more buildings that are in close proximity. This type of network is commonly found in universities, large corporate campuses, or military bases where multiple buildings are located within a confined area. A CAN allows for efficient communication and sharing of resources between the different buildings, providing a seamless network experience for users.

Submit
70. What does ISO stand for

Explanation

ISO stands for International Organization for Standardization. This organization is responsible for developing and publishing international standards in various fields, such as technology, manufacturing, and services. The name "International Organization for Standardization" is used instead of "International Standards Organization" to maintain consistency with the organization's acronym in different languages. The other options, International Systems Operation and International Support Organization, do not accurately represent the purpose and scope of ISO.

Submit
71. A physcial design is also referred to as a ___________ design.

Explanation

A physical design refers to the actual implementation of a system or product. It involves the detailed arrangement and placement of components, materials, and other physical aspects. The term "bottom up" is commonly used to describe an approach where the design starts from the individual components or smaller elements and gradually builds up to create the complete system. Therefore, "bottom up" is an appropriate term to refer to a physical design as it emphasizes the incremental construction process.

Submit
72. In video conferencing, what is the role of the Multipoint control unit (MCU)

Explanation

The role of the Multipoint control unit (MCU) in video conferencing is to manage videoconferencing sessions involving 3 or more participants. The MCU acts as a central hub that receives video and audio streams from multiple participants and then combines and distributes them to all other participants in the conference. It ensures that all participants can see and hear each other in real-time, facilitating effective communication and collaboration in a multi-party video conference.

Submit
73. What is used to forward datagrams to their destination.

Explanation

Routing tables are used to forward datagrams to their destination. These tables contain information about the network topology, including the available routes and their associated metrics. When a datagram arrives, the routing table is consulted to determine the best path for forwarding the datagram to its intended destination. The routing table helps routers make decisions about which interface to send the datagram out of and which next hop to use. By using the information in the routing table, routers can efficiently and accurately route data packets across networks.

Submit
74. Who manages the internet

Explanation

The Internet Engineering Task Force (IETF) manages the internet. They are responsible for developing and promoting internet standards and protocols. The IETF consists of a large community of engineers and researchers who collaborate to ensure the smooth functioning and evolution of the internet. They work on various technical aspects such as designing protocols, addressing security concerns, and improving network performance. Their efforts play a crucial role in maintaining the interoperability and reliability of the internet.

Submit
75. In June 2003 IEEE approved what standard that deals with aData Terminal Equipment (DTE) Power via Media Dependent Interface (MDI)

Explanation

IEEE approved the 802.3af standard in June 2003, which deals with Data Terminal Equipment (DTE) Power via Media Dependent Interface (MDI). This standard specifies the method for supplying power to network devices, such as IP phones, wireless access points, and network cameras, through Ethernet cables. It enables the delivery of power over existing Ethernet infrastructure, eliminating the need for separate power cables and simplifying network installations.

Submit
76. In the OSI model what layer addresses signaling over a wired or wireless medium:

Explanation

Layer 1 of the OSI model, also known as the Physical layer, is responsible for addressing signaling over a wired or wireless medium. This layer deals with the physical transmission of data, including the electrical, mechanical, and functional aspects of the network. It defines the physical characteristics of the medium, such as cables, connectors, and network devices, and ensures that data is transmitted reliably and efficiently across the network.

Submit
77. What makes it possible for multiple NICs to operate together as a single connection, increasing the data transfer rate of the server in addition to providing fault tolerance.

Explanation

Link aggregation makes it possible for multiple NICs to operate together as a single connection, increasing the data transfer rate of the server in addition to providing fault tolerance. This technology combines the bandwidth of multiple network interfaces into a single logical link, allowing for improved performance and redundancy. By distributing network traffic across multiple links, link aggregation ensures that if one link fails, the traffic can be automatically rerouted through the remaining links, minimizing downtime and improving reliability.

Submit
78. What is created by linking the networks located at two or more sites distributed over geographic distances.

Explanation

A Wide Area Network (WAN) is created by linking the networks located at two or more sites distributed over geographic distances. WANs are designed to connect computers and other devices across large areas, such as cities, countries, or even continents. They utilize various communication technologies, such as leased lines, satellites, or internet connections, to enable the exchange of data and information between the connected sites. Unlike Local Area Networks (LANs) or Metropolitan Area Networks (MANs), which cover smaller areas, WANs provide connectivity over larger distances.

Submit
79. What does OSI stand for?

Explanation

The correct answer is Open Systems Interconnection. OSI stands for Open Systems Interconnection, which is a conceptual framework that standardizes the functions of a communication system into seven different layers. These layers help in ensuring that different types of computer systems can communicate with each other effectively. It provides a model for understanding and designing network protocols and is widely used in the field of networking.

Submit
80. Frames are used on what layer of the OSI model

Explanation

Frames are used on Layer 2 of the OSI model. Layer 2, also known as the Data Link layer, is responsible for the reliable transmission of data between adjacent network nodes. It provides error detection and correction, as well as flow control mechanisms. Frames are the units of data that are transmitted at this layer, encapsulating the data from the upper layers and adding necessary control information such as source and destination addresses.

Submit
81. Protocol stacks provide which of the following:

Explanation

Protocol stacks provide service access points (SAPs) as the connection points between layers. SAPs allow communication between the different layers of the protocol stack by providing a standardized interface for exchanging data and requests. Each layer in the protocol stack can access the services provided by the layer below it through these SAPs. Therefore, the correct answer is that SAPs are the connection points between layers in a protocol stack.

Submit
82. When using RIP, each router transmits its entire routing table every _____ seconds.

Explanation

In the Routing Information Protocol (RIP), routers exchange their routing tables with neighboring routers. This exchange occurs at regular intervals called update intervals. In RIP, the default update interval is 30 seconds, which means that each router transmits its entire routing table every 30 seconds to its neighboring routers. This allows the routers to stay updated with the latest routing information and make informed decisions about the best paths to forward network traffic.

Submit
83. A hub is classified as a Layer ___ device.

Explanation

A hub is classified as a Layer 1 device because it operates at the physical layer of the OSI model. The physical layer is responsible for the transmission and reception of raw data bits over a physical medium. A hub simply receives incoming data signals and broadcasts them to all connected devices, without any intelligence or processing. It does not have the capability to interpret or analyze data packets at higher layers of the OSI model, making it a Layer 1 device.

Submit
84. When connected to a switch port, a NIC can be configured for which modes of operation:

Explanation

A NIC (Network Interface Card) can be configured for both full duplex and half duplex modes of operation when connected to a switch port. In full duplex mode, the NIC can transmit and receive data simultaneously, allowing for faster and more efficient communication. In half duplex mode, the NIC can either transmit or receive data at any given time, but not both simultaneously. Simplex mode, on the other hand, only allows for data transmission in one direction. Therefore, the correct answer is "Both A and B" as the NIC can be configured for both full duplex and half duplex modes.

Submit
85. Geographic distance is the best measure for choosing a routing path

Explanation

Rarely is geographic distance the best measure

Submit
86. Routers process ________ by examining layer 3 addressing information

Explanation

Routers process datagrams by examining layer 3 addressing information. Routers are network devices that operate at the network layer of the OSI model. They receive packets (datagrams) from one network and determine the best path to forward them to the destination network based on the layer 3 addressing information, such as IP addresses. Routers make decisions based on this addressing information to efficiently route the packets to their intended destinations.

Submit
87. Encryption and compression occur at which layer of the OSI.

Explanation

Encryption and compression occur at the Presentation layer of the OSI model. This layer is responsible for formatting and presenting data to the application layer. Encryption is the process of converting data into a secret code to protect it from unauthorized access, while compression reduces the size of data to optimize transmission and storage. Both of these processes are typically performed at the Presentation layer before the data is passed on to the application layer for further processing.

Submit
88. Packets contain how many bits

Explanation

Packets in computer networking typically contain a fixed number of bits. In this case, the correct answer is 32 bits. This means that each packet carries 32 binary digits of data. These packets are used to transmit information across a network, and the size of the packet can vary depending on the specific network protocol being used. In this scenario, the packets are specifically designed to carry 32 bits of information.

Submit
89. NICS that are capable of operating at different data rates are said to have:

Explanation

NICS that are capable of operating at different data rates are said to have multi-rate operations. This means that the network interface cards can support multiple data rates, allowing for flexibility and compatibility with various network speeds. This feature is useful in environments where different devices or networks may have different data rate capabilities, ensuring seamless communication between them.

Submit
90. OSPF stands for

Explanation

OSPF stands for Open Shortest Path First. It is a routing protocol used in computer networks to determine the best path for data packets to travel from one network to another. It calculates the shortest path based on the cost metric assigned to each network link. OSPF is widely used in large enterprise networks due to its scalability, fast convergence, and support for multiple routing areas.

Submit
91. The criteria used to choose routes are known as:

Explanation

Metrics are the criteria used to choose routes. Metrics refer to the various parameters or measurements that are used to evaluate and compare different routes. These metrics can include factors such as bandwidth, delay, reliability, and load. By considering these metrics, network administrators can determine the most efficient and reliable route for data transmission.

Submit
92. A managed hub is capable of being monitored, but not controlled through network management software.

Explanation

can be managed and controlled

Submit
93. Who manages the IETF

Explanation

The IETF (Internet Engineering Task Force) is managed by the Internet Engineering Steering Group (IESG). The IESG is responsible for the overall management and coordination of the technical work carried out within the IETF. They oversee the development of Internet standards and protocols, review and approve proposed standards, and provide guidance and direction to working groups. The IESG consists of area directors who are appointed by the Internet Architecture Board (IAB) and work together to ensure the smooth operation and progress of the IETF.

Submit
94. What is used to manage the rate of exchange of frames between full-duplex ports on a switch.

Explanation

Flow control is used to manage the rate of exchange of frames between full-duplex ports on a switch. It ensures that the sender does not overwhelm the receiver with too many frames, preventing data loss or congestion. Flow control allows the receiver to notify the sender when it is ready to receive more frames, regulating the flow of data between the ports. This helps to maintain a balanced and efficient communication between the devices connected to the switch.

Submit
95. A common method for enabling communications between VLANs is to use a _____ to transfer frames from one VLAN to another.

Explanation

A router is commonly used to enable communications between VLANs by transferring frames from one VLAN to another. Routers operate at the network layer of the OSI model and can route traffic between different networks, including VLANs. Unlike switches, which operate at the data link layer and forward frames within a single VLAN, routers can direct traffic between different VLANs by examining the destination IP address and making routing decisions based on the network address. This allows for segmentation and isolation of traffic between VLANs while still allowing for inter-VLAN communication when necessary.

Submit
96. Which layer of the OSI model is divided into the LLC and MAC layers

Explanation

The correct answer is the Data link layer. The Data link layer of the OSI model is divided into two sublayers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The LLC layer is responsible for managing communication between devices over a network, while the MAC layer handles the physical addressing and access to the network media.

Submit
97. In what year did the ISO introduce the OSI model

Explanation

The ISO introduced the OSI model in 1978.

Submit
98. A distance-vector protocol makes routing decisions based on what.

Explanation

A distance-vector protocol makes routing decisions based on the number of router hops to the destination. This means that the protocol determines the best path to a destination based on the number of intermediate routers that need to be traversed. The protocol chooses the route with the fewest number of hops, assuming that shorter paths are generally faster and more reliable.

Submit
99. What are the three subscriber access network topologies where the EFM Task Force expects that ethernet can provide increased performance and functionality over traditional first mile access technologies:

Explanation

not-available-via-ai

Submit
100. Which type of frame processing is the most common:

Explanation

Modified cut through is the most common type of frame processing. In modified cut through, the switch begins forwarding the frame before it has been fully received, only after examining the destination address. This type of processing offers a balance between low latency and error checking, as it quickly forwards frames while still being able to detect and discard frames with errors. This approach is commonly used in modern networking switches to optimize performance while maintaining data integrity.

Submit
101. If a hub generates frames faster than the switch port can forward them, the switch can stop hub transmission by generating one or more false collision signals. This method is called:

Explanation

Backpressure is a method used by a switch to stop a hub from transmitting frames faster than the switch port can handle. The switch generates false collision signals, which causes the hub to back off and stop transmitting temporarily. This technique helps to regulate the flow of data and prevent congestion in the network.

Submit
102. One of the standards associated with VoIP is _______, an ITU-T coding and compression standard first issued in 1988 for converting speech into a 64 kb/s data stream.

Explanation

G.711 is the correct answer for this question. It is an ITU-T coding and compression standard that was first issued in 1988. G.711 is used for converting speech into a 64 kb/s data stream in VoIP.

Submit
103. Two examples of exterior routing protocols are:

Explanation

EGP (Exterior Gateway Protocol) and BGP (Border Gateway Protocol) are both examples of exterior routing protocols. EGP is an older protocol that was used for routing between different autonomous systems, while BGP is a more advanced and widely used protocol for routing between autonomous systems on the internet. Both protocols are designed to exchange routing information between routers in different networks, allowing for efficient and reliable routing of data packets across the internet.

Submit
104. Routing protocols designed for use within an autonomous domain can be divided into two types:

Explanation

The given answer correctly identifies the two types of routing protocols designed for use within an autonomous domain, which are distance-vector protocols and link state protocols. Distance-vector protocols, such as Routing Information Protocol (RIP), use a simple algorithm to determine the best path to a destination based on the number of hops. Link state protocols, such as Open Shortest Path First (OSPF), use a more complex algorithm that takes into account factors such as link speed and reliability to determine the best path. These two types of protocols have different advantages and disadvantages, and are used in different network environments based on their specific requirements.

Submit
105. RIP stands for:

Explanation

RIP stands for Routing Information Protocol. It is a dynamic routing protocol used in computer networks to exchange routing information between routers. RIP uses hop count as a metric to determine the best path for data packets to travel from one network to another. It is one of the oldest and simplest routing protocols, commonly used in small to medium-sized networks. RIP periodically broadcasts routing updates to neighboring routers, allowing them to update their routing tables accordingly.

Submit
106. Synchronization occurs at which layer of the OSI model

Explanation

Synchronization occurs at Layer 5 of the OSI model, also known as the Session layer. This layer is responsible for establishing, maintaining, and terminating connections between network devices. Synchronization refers to the process of coordinating the timing of data transmission between the sender and receiver. The Session layer ensures that data is sent and received in a synchronized manner, allowing for reliable communication between devices.

Submit
107. How many bits are assigned to the VLAN identifier subfield.

Explanation

The VLAN identifier subfield is assigned 12 bits. This means that within a VLAN, there can be a maximum of 4096 unique VLAN identifiers. This allows for a large number of VLANs to be created and identified within a network.

Submit
108. In June 2004, the Institute of Electrical and Electronics Engineers, Inc. (IEEE) approved what standard that extends Ethernet to the subscriber access that connects the customers building to the SP. (Ethernet in the First Mile (EFM) standard)

Explanation

The correct answer is 802.3ah. The 802.3ah standard, also known as Ethernet in the First Mile (EFM) standard, was approved by the IEEE in June 2004. This standard extends Ethernet to the subscriber access, connecting the customer's building to the Service Provider (SP).

Submit
109. Which IEEE standard deals with traffic prioritizatoin on LAN's

Explanation

The correct answer is 802.1p. This IEEE standard deals with traffic prioritization on LANs. It provides a mechanism for classifying and prioritizing different types of network traffic, allowing for better quality of service and efficient use of network resources.

Submit
110. IEEE 802.4 is used for:

Explanation

IEEE 802.4 is used for the Token bus working group. This group is responsible for developing and maintaining standards for token bus networks, which are a type of local area network (LAN) that uses a token-passing mechanism to control access to the network. The token bus working group focuses on defining the protocols and specifications necessary for the operation of token bus networks, including the physical layer, medium access control, and logical link control layers.

Submit
111. IP addresses may be assigned to devices for internal use. Such devices may also connect to the internet.

Explanation

IP addresses may be assigned to devices for internal use, such devices are not connected to the internet

Submit
112. Each port on a switch is a seperate communications channel representing a different ________ domain.

Explanation

Each port on a switch is a separate communications channel representing a different collision domain. In a collision domain, network devices share the same bandwidth and can potentially collide when they transmit data at the same time. By dividing the network into separate collision domains using switches, collisions are minimized, and network performance is improved.

Submit
113. Gigabit ethernet over PTP optical fiber provides enough bandwidth to ensure a very long life span for the network infrastructure: namely, the optical fiber infrastructure may be amortized over long periods of time ranging from ____ years or more.

Explanation

Gigabit Ethernet over PTP optical fiber provides a high-speed and reliable network connection. Optical fiber infrastructure is known for its durability and longevity. By using this technology, the network infrastructure can be utilized for a significant period of time, allowing for a long-term investment. A lifespan of 20 years or more is feasible, ensuring that the network infrastructure remains viable and efficient for an extended period.

Submit
114. Mainframes were introduced in the:

Explanation

Mainframes were introduced in the 1950's. During this time, computers were large and expensive, and were primarily used by large organizations such as government agencies and corporations. Mainframes played a crucial role in data processing and served as the backbone of many organizations' computing infrastructure. They were known for their reliability, high processing power, and ability to handle large amounts of data. The 1950's marked the beginning of the mainframe era, which continued to evolve and dominate the computing industry for several decades.

Submit
115. Which architecture standard applies to aBroadband Technical Advisory Group (BBTAG)a

Explanation

not-available-via-ai

Submit
116. Frames contain how many bits

Explanation

Frames in computer networking typically contain a header and a payload. The header includes information such as source and destination addresses, error detection codes, and other control bits. The payload contains the actual data being transmitted. The size of a frame is usually measured in bits. In this case, the correct answer is 48 bits, indicating that the frames being referred to in the question have a size of 48 bits.

Submit
117. What makes it possible to configure multiple switch ports to operate as a single communication channel.

Explanation

Link aggregation makes it possible to configure multiple switch ports to operate as a single communication channel. This technology allows multiple physical connections between switches or devices to be combined into a single logical link, increasing bandwidth and providing redundancy. By aggregating the links, the switches can distribute traffic across them, improving overall network performance and reliability. This is achieved through the use of a link aggregation protocol, such as LACP (Link Aggregation Control Protocol), which enables the negotiation and management of the aggregated link.

Submit
118. Which architecture standard applies to aFiber Optic Technical Advisory Group (FOTAG)a

Explanation

not-available-via-ai

Submit
119. In the 1970's what was introduced:

Explanation

In the 1970s, minicomputers were introduced. Minicomputers were smaller and less expensive than mainframe computers, making them more accessible to businesses and institutions. They were capable of performing many of the same tasks as mainframes, such as data processing and calculations, but on a smaller scale. The introduction of minicomputers revolutionized the computing industry by bringing computing power to a wider audience and paving the way for the development of personal computers in the following decade.

Submit
120. Billing occurs at which layer of the OSI model

Explanation

Billing occurs at Layer 4 of the OSI model because Layer 4 is responsible for establishing, maintaining, and terminating connections between applications. This layer manages the flow of data and ensures that it is delivered reliably and error-free. Billing is a process that involves tracking and recording the usage of resources or services, which typically occurs at the application layer. Therefore, it makes sense for billing to occur at Layer 4, where the connections and data flow between applications are managed.

Submit
121. A switch contains a series of connections linking each port to every other port, this is referred to as a _________ or ____________.

Explanation

A switch contains a series of connections linking each port to every other port. This is commonly known as a backplane or switch matrix. The backplane is the physical infrastructure that allows for the connections between ports, while the switch matrix refers to the logical organization of these connections within the switch.

Submit
122. Select the true statements about a PAN

Explanation

A PAN (Personal Area Network) is a network that connects devices within a short range, typically up to 33 feet. Bluetooth is a wireless technology commonly used for PANs, allowing devices to communicate and transfer data over short distances. 802.15 is the IEEE standard for wireless personal area networks, which includes technologies like Bluetooth. Therefore, the true statements about a PAN in this case are 33 ft, Bluetooth, and 802.15.

Submit
123. RIP based routers broadcast their presence to their neighbor routers regularly. If a router does not advertise its status within _______ seconds, other routers can conclude that the router or the path leading to it have failed.

Explanation

RIP based routers broadcast their presence to their neighbor routers regularly. If a router does not advertise its status within 180 seconds, other routers can conclude that the router or the path leading to it have failed. This time interval allows for a reasonable amount of time for the router to broadcast its status. If the router fails to do so within 180 seconds, it indicates a potential failure in the router or the path, prompting other routers to take appropriate action.

Submit
124. What is a network access device that provides a centralized point for LAN communications and media connections.

Explanation

A hub is a network access device that provides a centralized point for LAN communications and media connections. It is a simple device that receives data packets from one device and broadcasts them to all other devices connected to it. Unlike a switch or a router, a hub does not perform any intelligent routing or filtering of data. Instead, it simply amplifies and repeats the signals it receives. This makes it a cost-effective solution for small networks where simplicity and affordability are more important than advanced features.

Submit
125. Which architecture standard applies to aToken Ring Working Groupsa

Explanation

The correct answer is 802.5. The 802.5 standard applies to Token Ring Working Groups. This standard defines the specifications for a local area network (LAN) technology that uses a token-passing access method. It specifies the physical and data link layer protocols for the Token Ring network, including the token passing mechanism, frame format, and media access control (MAC) address assignment.

Submit
126. Two standards organizations with global authority on LAN technologies and Internet connectivity are the:

Explanation

The correct answer is the Institute of Electrical and Electronics Engineers, Inc. (IEEE) and the Internet Engineering Task Force (IETF). These two organizations are globally recognized for their authority on LAN technologies and Internet connectivity. The IEEE is responsible for developing and maintaining standards for various technologies, including LAN protocols. The IETF, on the other hand, focuses on developing and promoting Internet standards, including protocols and architectures. Together, these organizations play a crucial role in shaping and advancing the field of networking and connectivity.

Submit
127. Which architecture standard applies to aDemand Priority Working Groupa

Explanation

The correct answer is 802.12. This standard, also known as Demand Priority Access Method, is an architecture standard that applies to a Demand Priority Working Group. It specifies a media access control (MAC) layer protocol for high-speed networking over twisted pair copper cabling.

Submit
128. Which architecture standard applies to aCarrier Sense Multiple Access with Collision Detection (CSMA/CD)a Working Group

Explanation

The correct answer is 802.3. The 802.3 standard applies to Carrier Sense Multiple Access with Collision Detection (CSMA/CD), which is a protocol used in Ethernet networks to manage access to the network medium and detect collisions. This standard specifies the physical layer and the media access control (MAC) layer for Ethernet networks, including the wiring, signaling, and frame formats.

Submit
129. Routers can automatically update static routing tables

Explanation

cannot update static tables

Submit
130. Which terms below are alternate terms used to describe MAC addresses:

Explanation

The terms "Ethernet address," "Hardware address," "Device address," "LAN address," and "Physical address" are all alternate terms used to describe MAC addresses. These terms refer to the unique identifier assigned to a network interface controller (NIC) by the manufacturer. MAC addresses are used in Ethernet networks to ensure that data is sent to the intended recipient.

Submit
131. Usually the route with the _________ is selected for the datagram.

Explanation

The route with the lowest overall path cost is usually selected for the datagram. This means that the route with the least amount of resource usage, such as bandwidth or processing power, is chosen. By selecting the route with the lowest overall path cost, the network can optimize its resources and ensure efficient transmission of the datagram.

Submit
132. Which architecture standard applies to aMetropolitan Area Network (MAN) Working Groupa

Explanation

The correct answer is 802.6. 802.6 is the architecture standard that applies to a Metropolitan Area Network (MAN) Working Group. This standard specifically focuses on the implementation of MANs, which are networks that cover a larger geographic area than a local area network (LAN) but smaller than a wide area network (WAN). It provides guidelines and specifications for the design and operation of MANs, including protocols and technologies to ensure efficient and reliable communication within the network.

Submit
133. When using Routing Information Protocol (RIP) the maximum number of hops allowed in a single path is _____, which makes RIP unsuitable for large internetworks.

Explanation

When using Routing Information Protocol (RIP), the maximum number of hops allowed in a single path is 15. This limitation makes RIP unsuitable for large internetworks because it cannot handle networks with more than 15 hops. RIP uses hop count as the metric to determine the best path for routing, and a hop represents a network segment or router that needs to be traversed. Therefore, if a network has more than 15 hops, RIP may not be able to accurately determine the best path, leading to inefficient routing and potential network connectivity issues.

Submit
134. Select the true statements about a switch

Explanation

A switch can also be called a multiport bridge because it operates at the data link layer and connects multiple devices together. It creates multiple collision domains because each port on the switch has its own separate collision domain, which helps to reduce collisions and improve network performance. However, a switch creates a single broadcast domain because it forwards broadcast packets to all connected devices.

Submit
135. When connected to a hub, a NIC can operate in which modes:

Explanation

When connected to a hub, a NIC can operate in half duplex mode. In this mode, data can be transmitted in both directions, but not simultaneously. It means that the NIC can either send or receive data at any given time, but not both at the same time. This is because the hub acts as a central point for all connected devices, and it cannot handle simultaneous data transmission. Therefore, half duplex mode is used to avoid data collisions and ensure smooth communication between the NIC and the hub.

Submit
136. Other terms to describe a hub include:

Explanation

These terms are all alternative names for a hub. A hub is a networking device that allows multiple devices to connect to a network. It receives data packets from one device and broadcasts them to all other devices connected to it. The terms "multiport repeater" and "concentrator" emphasize the hub's ability to amplify and distribute signals to multiple ports. "Wiring concentrator" refers to the hub's role in consolidating multiple network connections into a single point. "Switch" is a more advanced version of a hub that can intelligently direct data packets to their intended destinations. "Multistation access units (MAUs)" is another term used in older networking technologies to describe hubs.

Submit
137. From a software perspective, the types of software found on a network can be classified into which categories:

Explanation

The correct answer is OS software, Network services software, and Applications software. These categories represent the different types of software that can be found on a network. OS software refers to the operating system that manages the computer's hardware and software resources. Network services software includes programs that provide network-related functions such as file sharing, printing, and email. Applications software refers to programs that are designed to perform specific tasks or provide specific functionality, such as word processing, spreadsheet, or database software.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 29, 2012
    Quiz Created by
    Letad1
Cancel
  • All
    All (137)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The software associated with general-purpose servers on a network is...
The abbreviation for rack unit is sometimes given as:
A router may be configured to use both static and dynamic tables
The objective of the OSI model is to provide a ____________ approach...
Video conferencing is bandwidth intense.
Servers can be classified according to their physical form and size as...
What are the three types of messages that most network devices are...
A port on a switch can be described as a ___________ connection
Linking the networks located at two or more sites within a city (50...
Email resides at which layer of the OSI model
Lower layers of the OSI model provide services to upper layers.
Which type of frame processing is the most reliable, but slowest.
A port on a hub is referred to as a ___________ connection
For an organizational network to support voice applications it must...
A __________ covers an area generally associated with an individual...
In the OSI  model, each layer provides ________ to the layer...
Modified versions of desktop PCs have been developed to make networks...
In unicast messaging, each message is addressed to how many...
The layers in the OSI model are commonly described as being connected...
What term is used to describe the device with which a user accesses an...
What is the objective of the OSI model?
Who oversees internet naming and addressing
Which type of design is referred to as a top down design
A switch operates at what layer of the OSI model:
What approach does the OSI model use to illustrate and explain the...
The technologies used in switching have also been applied to ________,...
Which type of message is sent to all devices:
In video conferencing what is the role of the gatekeeper
A standard equipment rack with 42U capacity can contain how many...
IETF stands for
On a hub, all ports connect to a ________ communication channel.
The hardware component that connects a station to the network medium...
The NIC connects a station to what:
Routers operate at which layer of the OSI
MAC addresses are ______ bits in length ( ____ hex digits)
A _______ covers an area generally associated with some or all of the...
Which type of frame processing is the fastest, but least reliable.
ONU stands for:
What layer of the OSI model do routers operate at:
What distributes all incoming and outgoing message traffic among the...
What are the two types of routing tables used by a router.
What two types of design processes are required to produce a...
Which standard associated with VoIP addresses coding and compression...
The higher the latency, the higher the rated performance of the port...
Which recommendation (nonzero dispersion shifted optical...
What allows replacement of any server NIC without powering down the...
Which architecture standard applies to aWireless LAN (WLAN) Working...
What is a combination of hardware and software, typically in the form...
The 12 bits assigned to the VLAN identifier (VID) subfield makes it...
What can be described as the equivalent of link aggregation using two...
Which type of message is sent to a select number of devices:
What are the connection points between layers called:
How many server blades can you place into a chassis occupying three...
Internet protocol version 4 (IPv4) network addresses are ____ bits in...
In what year did the ISO introduce a framework for classifying all of...
If you see a picture of a network and it includes a picture of a house...
What provides the performance benefits associated with physical LAN...
What technique do print servers commonly use that is a combination of...
When a NIC configures itself to operate at the maximum operating rate...
To improve the performance of data transfer a NIC can use a technique...
What is used to describe the amount of time it takes a port or switch...
What type of network is created when a PC can be configured to operate...
A servers _______ is an integrated set of programs designed to control...
Which architecture standard applies to aWireless Personal Area Network...
Routing _________, also referred to as routing _________, are used to...
Three practical power source options for power of balanced twisted...
The process of placing VLAN data into the appropriate fields in a...
For VLAN tagging, a NIC is capable of tagging frames
A ________ is created by linking the LANs located in two or more...
What does ISO stand for
A physcial design is also referred to as a ___________ design.
In video conferencing, what is the role of the Multipoint control unit...
What is used to forward datagrams to their destination.
Who manages the internet
In June 2003 IEEE approved what standard that deals with aData...
In the OSI model what layer addresses signaling over a wired or...
What makes it possible for multiple NICs to operate together as a...
What is created by linking the networks located at two or more sites...
What does OSI stand for?
Frames are used on what layer of the OSI model
Protocol stacks provide which of the following:
When using RIP, each router transmits its entire routing table every...
A hub is classified as a Layer ___ device.
When connected to a switch port, a NIC can be configured for which...
Geographic distance is the best measure for choosing a routing path
Routers process ________ by examining layer 3 addressing information
Encryption and compression occur at which layer of the OSI.
Packets contain how many bits
NICS that are capable of operating at different data rates are said to...
OSPF stands for
The criteria used to choose routes are known as:
A managed hub is capable of being monitored, but not controlled...
Who manages the IETF
What is used to manage the rate of exchange of frames between...
A common method for enabling communications between VLANs is to use a...
Which layer of the OSI model is divided into the LLC and MAC layers
In what year did the ISO introduce the OSI model
A distance-vector protocol makes routing decisions based on what.
What are the three subscriber access network topologies where...
Which type of frame processing is the most common:
If a hub generates frames faster than the switch port can forward...
One of the standards associated with VoIP is _______, an ITU-T coding...
Two examples of exterior routing protocols are:
Routing protocols designed for use within an autonomous domain can be...
RIP stands for:
Synchronization occurs at which layer of the OSI model
How many bits are assigned to the VLAN identifier subfield.
In June 2004, the Institute of Electrical and Electronics Engineers,...
Which IEEE standard deals with traffic prioritizatoin on LAN's
IEEE 802.4 is used for:
IP addresses may be assigned to devices for internal use. Such devices...
Each port on a switch is a seperate communications channel...
Gigabit ethernet over PTP optical fiber provides enough bandwidth to...
Mainframes were introduced in the:
Which architecture standard applies to aBroadband Technical Advisory...
Frames contain how many bits
What makes it possible to configure multiple switch ports to operate...
Which architecture standard applies to aFiber Optic Technical Advisory...
In the 1970's what was introduced:
Billing occurs at which layer of the OSI model
A switch contains a series of connections linking each port to every...
Select the true statements about a PAN
RIP based routers broadcast their presence to their neighbor routers...
What is a network access device that provides a centralized point for...
Which architecture standard applies to aToken Ring Working Groupsa
Two standards organizations with global authority on LAN technologies...
Which architecture standard applies to aDemand Priority Working Groupa
Which architecture standard applies to aCarrier Sense Multiple Access...
Routers can automatically update static routing tables
Which terms below are alternate terms used to describe MAC addresses:
Usually the route with the _________ is selected for the datagram.
Which architecture standard applies to aMetropolitan Area Network...
When using Routing Information Protocol (RIP) the maximum number of...
Select the true statements about a switch
When connected to a hub, a NIC can operate in which modes:
Other terms to describe a hub include:
From a software perspective, the types of software found on a network...
Alert!

Advertisement