Uploaded by Edward Kononov

Тест

advertisement
Тест для сдачи долгов по лабам
Часть 1
1. In the OSI model, the
layer is concerned with finding the best
path for the data from one point to the next within the network.
a.
Data Link
b.
Network
c.
Physical
d.
Application
2. The
layer can perform ASCII to non-ASCII character
conversions.
a.
Transport
b.
Data Link
c.
Presentation
d.
Application
3. Large networks that encompass parts of states, multiple states, countries and the world are
called:
a.
MANs
b.
LANs
c.
PANs
d.
WANs
4. What is the baud rate of a digital signal that employs Differential Manchester
encoding and has a data rate of 1000bps?
a.
500 baud
b.
1000 baud
c.
2000 baud
d.
4000 baud
5. Which category of UTP cable is the most current and commonly implemented?
a.
Category 4
b.
Category 5
c.
Category 5e
d.
Category 6
6. The
of a signal is the number of times a signal makes a complete
cycle within a given time frame.
a.
Bandwidth
b.
Frequency
c.
Amplitute
d.
Spectrum
7. In the OSI model, which layer performs encryption or data compression?
a.
Application
b.
Network
c.
Data Link
d.
Presentation
9. The loss of signal strength is called:
a.
Attenuation
b.
Amplitute
c.
Noise
d.
Crosstalk
10. The
class of digital encoding schemes solves the
synchronization problem by ensuring that each bit has some type of signal change.
a.
Manchester
b.
NRZ
c.
4B/5B
d.
Both a and b.
11. Ethernet is said to be non-deterministic because of which of the following?
a.
It is not possible to determine how long it will take to get a frame from one
device to another.
b.
It is not possible to determine whether an error has occurred during the
transmission of a frame.
c.
It is not possible to determine if another device wishes to transmit.
d.
It is not possible to determine the maximum time a device will have to
wait to transmit.
12.
technology can be applied to wireless communications, making
them virtually impervious to interception.
a.
Pulse code modulation
b.
Frequency modulation
c.
Spread Spectrum
d.
None of the above
13. Electromagnetic interference is often generated by:
a.
Motors
b.
Fluorescent lights
c.
Power lines
d.
All of the above
14. The
component of the interface standard describes the function
of each pin or circuit that is used in a particular interface.
a.
Electrical
b.
Mechanical
c.
Functional
d.
Procedural
15.
identifies terminating devices such as terminals and computers.
a.
DTE
b.
DCE
c.
CSU
d.
DSU
16. The multiplexer creates a frame that contains data only from those input sources that have
something to send in
multiplexing.
a.
Frequency Division
b.
Statistical Time Division
c.
Synchronous Time Division
d.
Dense Wavelength
17. In frequency division multiplexing, the medium must be capable of carrying a range of
frequencies that can support the
ranges
a.
Difference
b.
Sum
c.
Product
d.
None of the above
of all the individual frequency
18. ISDN basic rate interface (BRI) multiplexes only
separate
channels.
a.
One
b.
Two
c.
Three
d.
Four
19. Error detection is performed at the
a.
Data Link
b.
Transport
c.
Network
d.
Both a and b
21. In a
layer of the OSI model?
topology the workstations are connected by a linear coaxial
cable.
a.
Bus
b.
Star-wired bus
c.
Star-wired ring
d.
Ring
22. Which protocol requires that a host cease to transmit for a random interval once a
collision is detected on the wire?
a.
CSMA/CD
b.
Round robin
c.
Reservation
d.
All of the above
23. Which layer addresses do routers use to determine a packet's path?
a.
Data Link
b.
Network
c.
Physical
d.
Application
24. Which type of bridge observes network traffic flow and uses this information to make
future decisions regarding frame forwarding?
a.
Remote
b.
Source routing
c.
Transparent
d.
Spanning tree
25. Learning network addresses and converting frame formats are the function of which
device?
a.
Switch
b.
Hub
c.
MAU
d.
Bridge
26. The device that can operate in place of a hub is a:
a.
Switch
b.
Bridge
c.
Router
d.
Gateway
27. The CSMA/CD network is described by which frame specification?
a.
IEEE 802.2
b.
IEEE 802.3
c.
IEEE 802.4
d.
IEEE 802.5
28. In a
subnet, no unique dedicated physical path is established to
transmit the data packets across the subnet?
a.
Circuit-switched
b.
Packet-switched
c.
Large
d.
Heavily loaded
29. A dial-up telephone system uses which type of subnet?
a.
Circuit-switched
b.
Packet-switched
c.
Broadcast
d.
Logically switched
30. The postal system is a good example of which type of communication?
a.
Broadcast
b.
Connection oriented
c.
Connectionless
d.
Both a and c
31. Which type of routing allows each node to maintain its own routing table?
a.
Distributive
b.
Adaptive
c.
Centralised
d.
Static
32. The length of an IP address is:
a.
8 bits
b.
16 bits
c.
32 bits
d.
48 bits
33.
is a set of codes inserted into a document intended for display
on a web browser
a.
HTML
b.
HTTP
c.
FTP
d.
Telnet
34. The protocol that allows dynamic assignment of IP Addresses to workstations is known
as:
a.
ICMP
b.
DHCP
c.
SMTP
d.
SNMP
35.
is a packet-switched network designed for transmitting data
over fixed lines.
a.
ATM
b.
ADSL
c.
SONET
d.
Frame Relay
37. Which type of virus mutates with every infection, thus making it difficult to locate?
a.
Macro
b.
Trojan horse
c.
Polymorphic
d.
Worm
38. A commonly employed encryption method used by businesses to send and receive secure
transactions is:
a.
Manchester encoding
b.
Data Encryption Standard (DES)
c.
Pulse Code Modulation
d.
Kerberos
39. The equation to calculate availability is?
a.
(Total Time Available + Downtime) * Total Time Available
b.
(Total Time Available - Downtime)
c.
(Total Time Available + Downtime)
d.
(Total Time Available - Downtime) / Total Time Available
40. The average time a device or system will operate before it will fail is called the:
a.
MTBF
b.
MTTR
c.
Reliability
d.
None of the above
Часть 2
1. The main difference between infrared and Bluetooth transmission is that Bluetooth
needs line of site whilst infrared does not.
a.
b.
true
false
2. 4B/5B encoding is more efficient than Manchester encoding.
a.
b.
true
false
3. Synchronous Time Division multiplexing will not allocate a time slot to a source
that is idle.
a.
b.
true
false
4. Dumb terminals are used for simple data entry and data retrieval operations.
a.
b.
true
false
5. The bottom layer in the OSI model, the data link layer, handles the transmission of bits
over a communications channel.
a.
b.
true
false
6. The physical organization of a star-wired ring is actually not circular.
a.
b.
true
false
7. A source routing bridge keeps an internal table.
a.
b.
true
false
8. In a virtual circuit packet-switched subnet, all packets that belong to a logical connection
can follow the same path through the network.
a.
b.
true
false
9. Every object on the Internet has a unique URL.
a.
b.
true
false
10. Ciphertext is data before any encryption has been performed.
a.
b.
true
false
Часть 3
1. Multiplexing occurs at the
layer of the OSI reference model.
2. The three basic components of all signals are
and
,
.
3.
noise is a non-constant noise that is one of the most difficult
errors to detect because it can occur randomly.
4. Transmitting multiple signals on one medium is called
.
5.
data and signals are represented as continuous waveforms that
can be at an infinite number of points between some given minimum and maximum.
6. The
Model is a communications architectural model that
incorporates TCP/IP and has 4 layers.
7.
coaxial technology uses digital signaling in which the cable
carries only one channel of digital data
8.
microwave transmission systems transmit tightly focused beams
of radio signals from one ground-based microwave transmission antenna to another.
9. In an
connection, a single character, or byte of data, is the unit of
transfer between sender and receiver.
10. The
is the stretch of telephone wire that runs between a house
and the telephone company's exchange.
11.
multiplexing allows multiple users to share a common set of
frequencies by assigning unique digital codes to each user.
12. A
results when two or more workstations listen to the medium at
the same moment, hear nothing, and then transmit their data at the same moment.
13. Modern star-wired bus topology logically acts as a bus, but
looks like a star.
14. A
is a device that interconnects two or more workstations in a
star-wired bus local area network and broadcasts incoming data onto all outgoing
connections.
15. The process of adding transport header information on the front of the data packet is
called
.
16. A
network application provides some guarantee that information
traveling through the network will not be lost and the information packets will be delivered to
the intended receiver.
17. The
communications lines.
is a massive collection of networks, routers, and
18. The
protocol takes an IP address in an IP datagram and
translates it into the appropriate CSMA/CD address for delivery on a local area network.
19. A
attack is one where a computer site is bombarded with so
many messages that the site cannot perform its normal duties.
20.
involves generating system statistics in a controlled environment
and then comparing those statistics against known measurements.
Часть 5
1. Name and briefly define the seven layers of the OSI model.
Answer
3. Describe the function of a switch. At what layer of the OSI model does it operate?
Answer
4. What are the advantages and disadvantages of fibre optic cable?
Answer
5. What is the difference between a deterministic and non-deterministic protocol?
Answer
6. What is the data transfer rate in bps of a signal that is encoded using phase
modulation with eight different phase angles and a baud rate of 3000?
Answer
7. Name four (4) types of multiplexing giving a brief explanation of each.
Answer
8. Define the main differences between the TCP and UDP protocols.
Answer
Download