Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 1. SIP signaling protocol for VoIP and Video-over-IP allows for a connection to be modified. Which of these is an example of a session modification?: Adding an additional participant. - SIP allows for sessions to be modified, including adding additional participants to a call. 2. Of the three QoS models, which is the least likely to be used in a busy home based network?: Best-Effort -There are no QoS policies set up on the Best-Effort model, thus would not be ideal for a busy network at home. We have so many wireless devices in our homes that it could get quite messy without any kind of proper QoS. 3. Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications?: RTP -RTP works in conjunction with signaling protocols - SIP, specifically - to deliver real-time data between the two devices in use. 4. Ethernet usually permits each node in the network to transmit data packets at any time which can cause _____: Data collision -Ethernet usually permits each node in the network to transmit data packets at any time without any system of waiting. This creates a high possibility for data collisions. 5. The _____ of a network describes how the connections appear to the end user or how signals are passed across the network.: logical topology 6. What is a star-wired ring hybrid topology?: It's set of star topologies are connected by a ring topology as the adjoining topology 7. Which two protocols are NOT backward compatible?: 802.11a Protocol 802.11b -802.11a and 802.11b which are the earlier versions in the 802.11 family are not backward compatible. 8. What is a VPN?: A network that is only accessible with the correct credentials 1/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 9. A _____ is a group of network devices that look like they are all connected to a single network even if they are not in the same location.: VLAN -A VLAN can be very beneficial for many purposes, which is why many businesses that have multiple locations tend to use them. Not being limited to a single location helps makes VLANs such an essential tool for many. 10. When it comes to home networks, how is the primary IP address generated for all devices?: The ISP assigns a static address to the location, which is translated through a NAT. -The ISP provides the base IP address to your location and must be translated through the router via a NAT. The router sends and receives all information on a wireless network; therefore, it must send the same IP address in order for the devices to communicate with the router. 11. IMAP can allow a user with multiple devices to _____: access their emails simultaneously from any of the devices. -IMAP allows users to access email on multiple devices. The email client on each device is automatically synchronized with the email server, making multi-device access seamless. 12. Redundancy in a network is necessary _____: To ensure throughput and connectivity through multiple nodes and pathways. -Redundant networks can withstand losses of nodes due to multiple nodes and paths offering lanes for traffic. 13. A PCMCIA LAN card typically goes where?: Inside a laptop 14. An advantage of VLAN over LAN is _____.: nodes within the same VLAN need not be in the same physical location 15. A specially designed server operating system can serve:: numerous concurrent clients connections 16. Of the options listed, which is the most used WAN (Wide Area Network) carrier?: MPLS 17. What are two common WAN (Wide Area Network) design types?: Hub and spoke; Full mesh topology 2/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 18. Which network topology uses concentration routers to interconnect star network WANs?: Tiered topology 19. What type of bit is used with an asynchronous transmission to signal the beginning and end of a byte of data?: Control 20. What is the maximum number of zones that can be associated to a firewall?: Firewalls can have many zones associated to them. 21. According to network security engineers and other experts in the security field, the likelihood of eliminating all security threats is _____.: not likely 22. What legal and regulatory system governs the way data is handled in a medical office?: HIPAA 23. Which of these is NOT true?: High latency is better than low latency 24. Which of these statements is true?: You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency 25. What does Mbps stand for?: Mbps stands for megabits per second 26. Computer networks can be connected via cables or: wirelessly 27. Computers on a network are called:: nodes 28. Which of the following is a medium used by internet service providers to transmit data?: Copper wire 29. In the OSI model, the application layer is:: the seventh layer 30. Which option contains the name of the layer responsible for translating, encrypting and compressing data within the OSI model?: Presentation 31. In some situations, the presentation layer of the OSI model may have two sub-layers associated with its operation. Which option below lists both of these sublayers?: CASE and SASE 32. Which protocol provides error recovery and flow control services for the transport layer?: TCP 33. Which type of signaling protocol is considered the standard in multimedia VoIP and Video-over-IP sessions?: H.323 34. How are the inherent weaknesses of star, ring, and bus topologies addressed in a hybrid topology?: When a combination of two or more of the basic topologies is made into a hybrid network topology, the weaknesses of a given topology is addressed by another 3/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 35. Which of the following is an example of network topology?: Bus 36. A data measurement unit that contains 8 bits of information is known as which of the following?: Byte 37. What is one of the major differences between a DSL network and a cable network?: DSL only worked well if the modem was close to the main service area, cable does not have such restrictions. 38. If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?: A full mesh design. 39. What factors should you consider in selecting a WAN (Wide Area Network) service provider?: all of these 40. What is a server?: A computer that hosts data and other resources for clients 41. A typical communication network may consist of __________.: servers, internet connectivity devices, computers, routers and smart devices 42. Which of the following is NOT a basic component of a telecommunication network?: Remote control unit 43. Which of these is not a design issue for the network layer?: Handling session information 44. Which of the following terms refers to defining the rules for communication between two computers to prevent overload?: Flow Control 45. Which descriptive term best describes reception quality when impacted by 'packet loss'?: poor 46. What does layer five of the OSI model do?: Establishes, manages and terminates communicative sessions. 47. Which of the following was NOT a function of IANA?: Designing web pages 48. An IP address is written in the form of _____ notation.: Dotted Decimal 49. Which of the communication channel types would be the ideal choice for making a phone call?: Full-duplex 50. Which option below lists the function(s) of a modem?: modulation and demodulation 51. Time multiplexing is _____.: A Sharing Technique 52. An office operates on 3 floors of a building. It comprises 4 different departments. Which of the following network implementation will most suit the office needs?: 4 VLANs on 4 switches with trunk link connections 4/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 53. How does the use of a router differ from a bridge in telecommunication?: A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic. 54. Individuals and social networking platforms have the ability to store Terabytes of data away from local devices by the use of the _____.: Cloud 55. The OSI Model is used to:: describe how communications happen across a network 56. What is the purpose of load balancing in a network?: It distributes traffic to allow for a balance in the network keeping services available. 57. IMAP can allow a user with multiple devices to _____: access their emails simultaneously from any of the devices. 58. Which of these is a type of attack that can start off as passive then turn active?: Sniffer 59. The use of _____ might include a fingerprint scan to complete a bank transaction via a mobile application.: Biometrics 60. WPA2 Enterprise uses a _____ server for logins.: RADIUS 61. Which of the following are NOT a method to deliver network security?: Over the telephone 62. Which of the following technologies use microwaves?: Cellular 63. Which of the following wireless technologies would fit under the WAN category?: Cellular 64. Which of the following are valid configurations of a Wireless Access Point?: IP address, NAT and Firewall 65. How do signals travel between a GPS satellite and an on-the-ground GPS receiver?: Only from the satellite to the receiver 66. MPLS makes use of _____ to make a faster and more efficient network.: Short path labels 67. What type of architecture does the Media Gateway Control Protocol (or MGCP) signaling protocol take?: Master-slave 68. SIP signaling protocol for VoIP and Video-over-IP allows for a connection to be modified. Which of these is an example of a session modification?: Adding an additional participant. 5/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 69. Which of the following tools is best suited for live-streaming video?: Webcam 70. Which command helps to identify whether a given system is connected to a network?: ping 71. In WANs, what advantage does the ring topology have over the bus topology?: Data transmission is unidirectional 72. What unit of data measurement is used with synchronous transmissions?: Block 73. In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?: Coaxial 74. Feedback-based flow control ____.: makes sure a message is sent back to the sender when it is ready to accept more data 75. In the OSI model, all of the following are protocols of the application layer except:: ICANN 76. The Internet is defined as _____.: the network of networks consisting of millions of devices communicating globally 77. Science and engineering orbital data are made accessible to the general public by use of the _____: Internet-to-orbit 78. Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?: Switch 79. Which of the following is NOT a standard Wi-Fi communications standard?: 802.11x 80. Although security is important, why is there a need to use Wireless Access Point as a pass-through set-up which allows any server to get connected to the network?: To enable the peer devices to exchange data without much difficulty. 81. Which of the following is/are true?: Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity. 82. Watching a YouTube video on the web is an example of which video-over-IP service?: Streaming video 83. In order for voice packets to be routed correctly through the Internet, they have to have detailed what?: Labels 84. What type of video-over-IP service relies on two-way communication?: Video conferencing 6/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 85. PSTN stands for:: Public Switched Telephone Network 86. The core strand of an optical fiber can be made of what type of material?: Glass or Plastic 87. Which option below lists the type of signal generated when a dog barks or a cat meows?: analog 88. Which of the communication channel types allows for information to flow in both directions at the same time?: Full-duplex 89. Which of the following is true about TCP/IP or Transmission Control Protocol/Internet Protocol?: TCP/IP is a communication protocol that enables you to send and receive information over the Internet. 90. A single point of failure (SPF) is _____.: A lone link in a network that can bring down the whole network if it fails 91. What is one disadvantage of cloud computing?: Security 92. Why is Telnet discouraged as an access method?: Telnet is unsecure. 93. Where does the cloud concept originate?: Network diagram 94. Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?: Broadcast 95. What is variable length subnet masking used for?: It is used to create smaller networks by using variants on classful subnets. 96. What type of firewall can stop more advanced threats, such as tricks devised by hackers to bypass the firewall's access policy protection?: A next-generation firewall 97. Which of the following is a method for securing data by using special mathematical algorithms to convert the data into a scrambled code before transmission?: Encryption 98. In addition to network security operators, who might be involved with network security?: All of the answers are correct. 99. Ethernet is the _____.: LAN technology that dictates the technical specifications of hardware for connectivity 100. Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.: duplicate concurrent connections to the high level backbone routers 101. The difference between circuit switching and packet switching is _____.: with circuit switching the whole message is transmitted as one using a dedicated 7/8 Computer Science 108: Introduction to Networking Study online at https://quizlet.com/_bf3f15 path, while with packet switching the message is broken down into small components called packets 102. What is IMAP?: (IMAP) is a standard internet protocol used for the retrieval of email messages from an email server. 8/8