Uploaded by Del J

Introduction to Networking

advertisement
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
1. SIP signaling protocol for VoIP and Video-over-IP allows for a connection
to be modified. Which of these is an example of a session modification?: Adding an additional participant.
- SIP allows for sessions to be modified, including adding additional participants
to a call.
2. Of the three QoS models, which is the least likely to be used in a busy
home based network?: Best-Effort
-There are no QoS policies set up on the Best-Effort model, thus would not be ideal
for a busy network at home. We have so many wireless devices in our homes that
it could get quite messy without any kind of proper QoS.
3. Which part of the transport protocol works in conjunction with signaling
protocols in VoIP communications?: RTP
-RTP works in conjunction with signaling protocols - SIP, specifically - to deliver
real-time data between the two devices in use.
4. Ethernet usually permits each node in the network to transmit data packets
at any time which can cause _____: Data collision
-Ethernet usually permits each node in the network to transmit data packets at any
time without any system of waiting. This creates a high possibility for data collisions.
5. The _____ of a network describes how the connections appear to the end
user or how signals are passed across the network.: logical topology
6. What is a star-wired ring hybrid topology?: It's set of star topologies are
connected by a ring topology as the adjoining topology
7. Which two protocols are NOT backward compatible?: 802.11a Protocol
802.11b
-802.11a and 802.11b which are the earlier versions in the 802.11 family are not
backward compatible.
8. What is a VPN?: A network that is only accessible with the correct credentials
1/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
9. A _____ is a group of network devices that look like they are all connected
to a single network even if they are not in the same location.: VLAN
-A VLAN can be very beneficial for many purposes, which is why many businesses
that have multiple locations tend to use them. Not being limited to a single location
helps makes VLANs such an essential tool for many.
10. When it comes to home networks, how is the primary IP address generated for all devices?: The ISP assigns a static address to the location, which is
translated through a NAT.
-The ISP provides the base IP address to your location and must be translated
through the router via a NAT. The router sends and receives all information on
a wireless network; therefore, it must send the same IP address in order for the
devices to communicate with the router.
11. IMAP can allow a user with multiple devices to _____: access their emails
simultaneously from any of the devices.
-IMAP allows users to access email on multiple devices. The email client on each
device is automatically synchronized with the email server, making multi-device
access seamless.
12. Redundancy in a network is necessary _____: To ensure throughput and
connectivity through multiple nodes and pathways.
-Redundant networks can withstand losses of nodes due to multiple nodes and
paths offering lanes for traffic.
13. A PCMCIA LAN card typically goes where?: Inside a laptop
14. An advantage of VLAN over LAN is _____.: nodes within the same VLAN
need not be in the same physical location
15. A specially designed server operating system can serve:: numerous concurrent clients connections
16. Of the options listed, which is the most used WAN (Wide Area Network)
carrier?: MPLS
17. What are two common WAN (Wide Area Network) design types?: Hub and
spoke; Full mesh topology
2/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
18. Which network topology uses concentration routers to interconnect star
network WANs?: Tiered topology
19. What type of bit is used with an asynchronous transmission to signal the
beginning and end of a byte of data?: Control
20. What is the maximum number of zones that can be associated to a
firewall?: Firewalls can have many zones associated to them.
21. According to network security engineers and other experts in the security
field, the likelihood of eliminating all security threats is _____.: not likely
22. What legal and regulatory system governs the way data is handled in a
medical office?: HIPAA
23. Which of these is NOT true?: High latency is better than low latency
24. Which of these statements is true?: You should expect an average throughput which is less than the maximum speed, and you should expect an average
delay called latency
25. What does Mbps stand for?: Mbps stands for megabits per second
26. Computer networks can be connected via cables or: wirelessly
27. Computers on a network are called:: nodes
28. Which of the following is a medium used by internet service providers to
transmit data?: Copper wire
29. In the OSI model, the application layer is:: the seventh layer
30. Which option contains the name of the layer responsible for translating,
encrypting and compressing data within the OSI model?: Presentation
31. In some situations, the presentation layer of the OSI model may have two
sub-layers associated with its operation. Which option below lists both of
these sublayers?: CASE and SASE
32. Which protocol provides error recovery and flow control services for the
transport layer?: TCP
33. Which type of signaling protocol is considered the standard in multimedia VoIP and Video-over-IP sessions?: H.323
34. How are the inherent weaknesses of star, ring, and bus topologies addressed in a hybrid topology?: When a combination of two or more of the basic
topologies is made into a hybrid network topology, the weaknesses of a given
topology is addressed by another
3/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
35. Which of the following is an example of network topology?: Bus
36. A data measurement unit that contains 8 bits of information is known as
which of the following?: Byte
37. What is one of the major differences between a DSL network and a cable
network?: DSL only worked well if the modem was close to the main service area,
cable does not have such restrictions.
38. If you wanted to connect a WAN (Wide Area Network) with a high-level of
resiliency, what technique would you use?: A full mesh design.
39. What factors should you consider in selecting a WAN (Wide Area Network) service provider?: all of these
40. What is a server?: A computer that hosts data and other resources for clients
41. A typical communication network may consist of __________.: servers,
internet connectivity devices, computers, routers and smart devices
42. Which of the following is NOT a basic component of a telecommunication
network?: Remote control unit
43. Which of these is not a design issue for the network layer?: Handling
session information
44. Which of the following terms refers to defining the rules for communication between two computers to prevent overload?: Flow Control
45. Which descriptive term best describes reception quality when impacted
by 'packet loss'?: poor
46. What does layer five of the OSI model do?: Establishes, manages and
terminates communicative sessions.
47. Which of the following was NOT a function of IANA?: Designing web pages
48. An IP address is written in the form of _____ notation.: Dotted Decimal
49. Which of the communication channel types would be the ideal choice for
making a phone call?: Full-duplex
50. Which option below lists the function(s) of a modem?: modulation and
demodulation
51. Time multiplexing is _____.: A Sharing Technique
52. An office operates on 3 floors of a building. It comprises 4 different
departments. Which of the following network implementation will most suit
the office needs?: 4 VLANs on 4 switches with trunk link connections
4/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
53. How does the use of a router differ from a bridge in telecommunication?: A router is a communication device that is used to connect two different networks,
while a bridge is networking device that divides the network into different segments
to manage the amount of traffic.
54. Individuals and social networking platforms have the ability to store
Terabytes of data away from local devices by the use of the _____.: Cloud
55. The OSI Model is used to:: describe how communications happen across a
network
56. What is the purpose of load balancing in a network?: It distributes traffic to
allow for a balance in the network keeping services available.
57. IMAP can allow a user with multiple devices to _____: access their emails
simultaneously from any of the devices.
58. Which of these is a type of attack that can start off as passive then turn
active?: Sniffer
59. The use of _____ might include a fingerprint scan to complete a bank
transaction via a mobile application.: Biometrics
60. WPA2 Enterprise uses a _____ server for logins.: RADIUS
61. Which of the following are NOT a method to deliver network security?: Over the telephone
62. Which of the following technologies use microwaves?: Cellular
63. Which of the following wireless technologies would fit under the WAN
category?: Cellular
64. Which of the following are valid configurations of a Wireless Access
Point?: IP address, NAT and Firewall
65. How do signals travel between a GPS satellite and an on-the-ground GPS
receiver?: Only from the satellite to the receiver
66. MPLS makes use of _____ to make a faster and more efficient network.: Short path labels
67. What type of architecture does the Media Gateway Control Protocol (or
MGCP) signaling protocol take?: Master-slave
68. SIP signaling protocol for VoIP and Video-over-IP allows for a connection
to be modified. Which of these is an example of a session modification?: Adding an additional participant.
5/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
69. Which of the following tools is best suited for live-streaming video?: Webcam
70. Which command helps to identify whether a given system is connected
to a network?: ping
71. In WANs, what advantage does the ring topology have over the bus
topology?: Data transmission is unidirectional
72. What unit of data measurement is used with synchronous transmissions?: Block
73. In a cable network environment, what is the name of the cable type that
connects from the wall outlet to the modem?: Coaxial
74. Feedback-based flow control ____.: makes sure a message is sent back to
the sender when it is ready to accept more data
75. In the OSI model, all of the following are protocols of the application layer
except:: ICANN
76. The Internet is defined as _____.: the network of networks consisting of
millions of devices communicating globally
77. Science and engineering orbital data are made accessible to the general
public by use of the _____: Internet-to-orbit
78. Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?: Switch
79. Which of the following is NOT a standard Wi-Fi communications standard?: 802.11x
80. Although security is important, why is there a need to use Wireless
Access Point as a pass-through set-up which allows any server to get
connected to the network?: To enable the peer devices to exchange data without
much difficulty.
81. Which of the following is/are true?: Wireless Access Points connect devices
that have WI-FI or Bluetooth connectivity.
82. Watching a YouTube video on the web is an example of which
video-over-IP service?: Streaming video
83. In order for voice packets to be routed correctly through the Internet, they
have to have detailed what?: Labels
84. What type of video-over-IP service relies on two-way communication?: Video conferencing
6/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
85. PSTN stands for:: Public Switched Telephone Network
86. The core strand of an optical fiber can be made of what type of material?: Glass or Plastic
87. Which option below lists the type of signal generated when a dog barks
or a cat meows?: analog
88. Which of the communication channel types allows for information to flow
in both directions at the same time?: Full-duplex
89. Which of the following is true about TCP/IP or Transmission Control
Protocol/Internet Protocol?: TCP/IP is a communication protocol that enables
you to send and receive information over the Internet.
90. A single point of failure (SPF) is _____.: A lone link in a network that can
bring down the whole network if it fails
91. What is one disadvantage of cloud computing?: Security
92. Why is Telnet discouraged as an access method?: Telnet is unsecure.
93. Where does the cloud concept originate?: Network diagram
94. Of the multiple different addressing types mentioned, which is the odd
one out that has no purpose in future IPv6 networking solutions?: Broadcast
95. What is variable length subnet masking used for?: It is used to create
smaller networks by using variants on classful subnets.
96. What type of firewall can stop more advanced threats, such as tricks
devised by hackers to bypass the firewall's access policy protection?: A
next-generation firewall
97. Which of the following is a method for securing data by using special
mathematical algorithms to convert the data into a scrambled code before
transmission?: Encryption
98. In addition to network security operators, who might be involved with
network security?: All of the answers are correct.
99. Ethernet is the _____.: LAN technology that dictates the technical specifications of hardware for connectivity
100. Parallel backbone networks differ from collapsed backbone networks in
that parallel backbone components are implemented with _____.: duplicate
concurrent connections to the high level backbone routers
101. The difference between circuit switching and packet switching is _____.: with circuit switching the whole message is transmitted as one using a dedicated
7/8
Computer Science 108: Introduction to Networking
Study online at https://quizlet.com/_bf3f15
path, while with packet switching the message is broken down into small components called packets
102. What is IMAP?: (IMAP) is a standard internet protocol used for the retrieval
of email messages from an email server.
8/8
Download