Тест для сдачи долгов по лабам Часть 1 1. In the OSI model, the layer is concerned with finding the best path for the data from one point to the next within the network. a. Data Link b. Network c. Physical d. Application 2. The layer can perform ASCII to non-ASCII character conversions. a. Transport b. Data Link c. Presentation d. Application 3. Large networks that encompass parts of states, multiple states, countries and the world are called: a. MANs b. LANs c. PANs d. WANs 4. What is the baud rate of a digital signal that employs Differential Manchester encoding and has a data rate of 1000bps? a. 500 baud b. 1000 baud c. 2000 baud d. 4000 baud 5. Which category of UTP cable is the most current and commonly implemented? a. Category 4 b. Category 5 c. Category 5e d. Category 6 6. The of a signal is the number of times a signal makes a complete cycle within a given time frame. a. Bandwidth b. Frequency c. Amplitute d. Spectrum 7. In the OSI model, which layer performs encryption or data compression? a. Application b. Network c. Data Link d. Presentation 9. The loss of signal strength is called: a. Attenuation b. Amplitute c. Noise d. Crosstalk 10. The class of digital encoding schemes solves the synchronization problem by ensuring that each bit has some type of signal change. a. Manchester b. NRZ c. 4B/5B d. Both a and b. 11. Ethernet is said to be non-deterministic because of which of the following? a. It is not possible to determine how long it will take to get a frame from one device to another. b. It is not possible to determine whether an error has occurred during the transmission of a frame. c. It is not possible to determine if another device wishes to transmit. d. It is not possible to determine the maximum time a device will have to wait to transmit. 12. technology can be applied to wireless communications, making them virtually impervious to interception. a. Pulse code modulation b. Frequency modulation c. Spread Spectrum d. None of the above 13. Electromagnetic interference is often generated by: a. Motors b. Fluorescent lights c. Power lines d. All of the above 14. The component of the interface standard describes the function of each pin or circuit that is used in a particular interface. a. Electrical b. Mechanical c. Functional d. Procedural 15. identifies terminating devices such as terminals and computers. a. DTE b. DCE c. CSU d. DSU 16. The multiplexer creates a frame that contains data only from those input sources that have something to send in multiplexing. a. Frequency Division b. Statistical Time Division c. Synchronous Time Division d. Dense Wavelength 17. In frequency division multiplexing, the medium must be capable of carrying a range of frequencies that can support the ranges a. Difference b. Sum c. Product d. None of the above of all the individual frequency 18. ISDN basic rate interface (BRI) multiplexes only separate channels. a. One b. Two c. Three d. Four 19. Error detection is performed at the a. Data Link b. Transport c. Network d. Both a and b 21. In a layer of the OSI model? topology the workstations are connected by a linear coaxial cable. a. Bus b. Star-wired bus c. Star-wired ring d. Ring 22. Which protocol requires that a host cease to transmit for a random interval once a collision is detected on the wire? a. CSMA/CD b. Round robin c. Reservation d. All of the above 23. Which layer addresses do routers use to determine a packet's path? a. Data Link b. Network c. Physical d. Application 24. Which type of bridge observes network traffic flow and uses this information to make future decisions regarding frame forwarding? a. Remote b. Source routing c. Transparent d. Spanning tree 25. Learning network addresses and converting frame formats are the function of which device? a. Switch b. Hub c. MAU d. Bridge 26. The device that can operate in place of a hub is a: a. Switch b. Bridge c. Router d. Gateway 27. The CSMA/CD network is described by which frame specification? a. IEEE 802.2 b. IEEE 802.3 c. IEEE 802.4 d. IEEE 802.5 28. In a subnet, no unique dedicated physical path is established to transmit the data packets across the subnet? a. Circuit-switched b. Packet-switched c. Large d. Heavily loaded 29. A dial-up telephone system uses which type of subnet? a. Circuit-switched b. Packet-switched c. Broadcast d. Logically switched 30. The postal system is a good example of which type of communication? a. Broadcast b. Connection oriented c. Connectionless d. Both a and c 31. Which type of routing allows each node to maintain its own routing table? a. Distributive b. Adaptive c. Centralised d. Static 32. The length of an IP address is: a. 8 bits b. 16 bits c. 32 bits d. 48 bits 33. is a set of codes inserted into a document intended for display on a web browser a. HTML b. HTTP c. FTP d. Telnet 34. The protocol that allows dynamic assignment of IP Addresses to workstations is known as: a. ICMP b. DHCP c. SMTP d. SNMP 35. is a packet-switched network designed for transmitting data over fixed lines. a. ATM b. ADSL c. SONET d. Frame Relay 37. Which type of virus mutates with every infection, thus making it difficult to locate? a. Macro b. Trojan horse c. Polymorphic d. Worm 38. A commonly employed encryption method used by businesses to send and receive secure transactions is: a. Manchester encoding b. Data Encryption Standard (DES) c. Pulse Code Modulation d. Kerberos 39. The equation to calculate availability is? a. (Total Time Available + Downtime) * Total Time Available b. (Total Time Available - Downtime) c. (Total Time Available + Downtime) d. (Total Time Available - Downtime) / Total Time Available 40. The average time a device or system will operate before it will fail is called the: a. MTBF b. MTTR c. Reliability d. None of the above Часть 2 1. The main difference between infrared and Bluetooth transmission is that Bluetooth needs line of site whilst infrared does not. a. b. true false 2. 4B/5B encoding is more efficient than Manchester encoding. a. b. true false 3. Synchronous Time Division multiplexing will not allocate a time slot to a source that is idle. a. b. true false 4. Dumb terminals are used for simple data entry and data retrieval operations. a. b. true false 5. The bottom layer in the OSI model, the data link layer, handles the transmission of bits over a communications channel. a. b. true false 6. The physical organization of a star-wired ring is actually not circular. a. b. true false 7. A source routing bridge keeps an internal table. a. b. true false 8. In a virtual circuit packet-switched subnet, all packets that belong to a logical connection can follow the same path through the network. a. b. true false 9. Every object on the Internet has a unique URL. a. b. true false 10. Ciphertext is data before any encryption has been performed. a. b. true false Часть 3 1. Multiplexing occurs at the layer of the OSI reference model. 2. The three basic components of all signals are and , . 3. noise is a non-constant noise that is one of the most difficult errors to detect because it can occur randomly. 4. Transmitting multiple signals on one medium is called . 5. data and signals are represented as continuous waveforms that can be at an infinite number of points between some given minimum and maximum. 6. The Model is a communications architectural model that incorporates TCP/IP and has 4 layers. 7. coaxial technology uses digital signaling in which the cable carries only one channel of digital data 8. microwave transmission systems transmit tightly focused beams of radio signals from one ground-based microwave transmission antenna to another. 9. In an connection, a single character, or byte of data, is the unit of transfer between sender and receiver. 10. The is the stretch of telephone wire that runs between a house and the telephone company's exchange. 11. multiplexing allows multiple users to share a common set of frequencies by assigning unique digital codes to each user. 12. A results when two or more workstations listen to the medium at the same moment, hear nothing, and then transmit their data at the same moment. 13. Modern star-wired bus topology logically acts as a bus, but looks like a star. 14. A is a device that interconnects two or more workstations in a star-wired bus local area network and broadcasts incoming data onto all outgoing connections. 15. The process of adding transport header information on the front of the data packet is called . 16. A network application provides some guarantee that information traveling through the network will not be lost and the information packets will be delivered to the intended receiver. 17. The communications lines. is a massive collection of networks, routers, and 18. The protocol takes an IP address in an IP datagram and translates it into the appropriate CSMA/CD address for delivery on a local area network. 19. A attack is one where a computer site is bombarded with so many messages that the site cannot perform its normal duties. 20. involves generating system statistics in a controlled environment and then comparing those statistics against known measurements. Часть 5 1. Name and briefly define the seven layers of the OSI model. Answer 3. Describe the function of a switch. At what layer of the OSI model does it operate? Answer 4. What are the advantages and disadvantages of fibre optic cable? Answer 5. What is the difference between a deterministic and non-deterministic protocol? Answer 6. What is the data transfer rate in bps of a signal that is encoded using phase modulation with eight different phase angles and a baud rate of 3000? Answer 7. Name four (4) types of multiplexing giving a brief explanation of each. Answer 8. Define the main differences between the TCP and UDP protocols. Answer