CHAPTER 12:
BEHIND THE SCENES: NETWORKING AND SECURITY
Multiple Choice:
1.
Which of the following is NOT an advantage of using networks compared to a stand-alone computer?
A. ease of maintenance and administration
B. enhanced resource sharing
C. increased productivity
D. increased communication capabilities
Answer: A
2.
Reference: Networking Advantages
Difficulty: Easy
____________ networks may experience significant slowdowns if more than ten (10) users are on the
network.
A. Wide area
B. Peer-to-peer
C. Server-based
D. Metropolitan area
Answer: B
3.
Reference: Client/Server Networks
Difficulty: Moderate
All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT:
A. P2P networks do not require servers.
B. security cannot be implemented centrally on P2P networks.
C. each computer must be updated individually in P2P networks.
D. P2P networks are decentralized and not easily scalable.
Answer: A
Reference: Client/Server Networks
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Easy
1
Chapter 12: Behind the Scenes: Networking and Security
4.
Individual users must take responsibility for data backups and security on a peer-to-peer network because
this kind of network is considered:
A. scalable.
B. centralized.
C. decentralized.
D. dedicated.
Answer: C
5.
Reference: Client/Server Networks
Difficulty: Moderate
The ability to easily add additional users means that a network is:
A. scalable.
B. dedicated.
C. decentralized.
D. secure.
Answer: A
6.
Reference: Client/Server Networks
Difficulty: Moderate
In a client/server network, all clients are connected to a server that performs tasks for them, such as backup
and security; therefore, it is known as a ____________ network.
A. local area
B. dedicated
C. decentralized
D. centralized
Answer: D
7.
Reference: Client/Server Networks
Difficulty: Easy
A(n) ____________ is a small group of computers and peripherals linked together in a small geographic
area.
A. LAN
B. PAN
C. CAN
D. MAN
Answer: A
Reference: Classifications of Client/Server Networks: LANs…
Copyright © 2008 Prentice-Hall. All rights reserved.
2
Difficulty: Easy
Chapter 12: Behind the Scenes: Networking and Security
8.
The Internet is most accurately categorized as a:
A. LAN.
B. PAN.
C. WAN.
D. MAN.
Answer: C
9.
Reference: Classifications of Client/Server Networks: LANS…
Difficulty: Easy
PANs are used to connect ____________ devices (such as Bluetooth-enabled devices) in close proximity to
each other.
A. peripheral
B. wireless
C. dedicated
D. client
Answer: B
10.
Reference: Classifications of Client/Server Networks: LANs…
Difficulty: Easy
A(n) ____________ is a private corporate network, used exclusively by company employees.
A. Internet
B. local area network
C. peer-to-peer
D. intranet
Answer: D
11.
Reference: Constructing Client/Server Networks
Difficulty: Moderate
____________ is specialized software that runs on a server computer to control network functionality.
A. NOS software
B. NCP software
C. TCP software
D. MAC software
Answer: A
Reference: Constructing Client/Server Networks
Copyright © 2008 Prentice-Hall. All rights reserved.
3
Difficulty: Easy
Chapter 12: Behind the Scenes: Networking and Security
12.
The layout and structure of the network is known as the network’s:
A. NOS.
B. topology.
C. components.
D. protocol.
Answer: B
13.
Reference: Constructing Client/Server Networks
Difficulty: Easy
Cable and wireless communication technologies are types of:
A. network adapters.
B. topologies.
C. transmission media.
D. network operating systems.
Answer: C
14.
Reference: Constructing Client/Server Networks
Difficulty: Moderate
Network navigation devices include all of the following EXCEPT:
A. servers.
B. routers.
C. switches.
D. hubs.
Answer: A
15.
Reference: Constructing Client/Server Networks
Difficulty: Easy
____________ servers store and manage files for network users.
A. File
B. Web
C. Authentication
D. Main
Answer: A
Reference: Constructing Client/Server Networks
Copyright © 2008 Prentice-Hall. All rights reserved.
4
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
16.
A(n) ____________ server keeps track of users logging onto the network and the services available to the
users.
A. file
B. authentication
C. Web
D. e-mail
Answer: B
17.
Reference: Servers
Difficulty: Easy
____________ servers are used to fulfill one specific function, such as handling e-mail.
A. Dedicated
B. Network
C. Protocol
D. Peer-to-peer
Answer: A
18.
Reference: Servers
Difficulty: Moderate
____________ servers are used to manage all client-requested printing jobs for all printers.
A. Database
B. Network
C. Print
D. E-mail
Answer: C
19.
Reference: Print Servers
Difficulty: Easy
A(n) ____________ server, on a network, delivers the software to the clients because the software does not
reside on the client computers.
A. Web
B. application
C. communications
D. database
Answer: B
Reference: Application Servers
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Easy
5
Chapter 12: Behind the Scenes: Networking and Security
20.
The ____________ server, on a network, is the single point of contact with the outside world and is often
the only device connected to the Internet.
A. intranet
B. database
C. application
D. communications
Answer: D
21.
Reference: Communications Servers
Difficulty: Challenging
In a(n) ____________ topology, all computers are connected in sequence, using a single cable.
A. bus
B. star
C. hybrid
D. ring
Answer: A
22.
Reference: Bus Topology
Difficulty: Moderate
In a bus topology, a ____________, located at each end of the network, absorbs the signal to prevent it
from being reflected back onto the cable.
A. node
B. terminator
C. packet
D. network device
Answer: B
23.
Reference: Bus Topology
Difficulty: Easy
In a bus topology, the nodes do nothing to move the data along the network, making it a(n) ____________
topology.
A. client/server
B. active
C. passive
D. terminated
Answer: C
Reference: Bus Topology
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Moderate
6
Chapter 12: Behind the Scenes: Networking and Security
24.
Active topologies differ from passive topologies in that nodes on the active topology network:
A. help pass the data along the network.
B. listen for signals on the line before transmitting.
C. ultimately send their messages to a terminator.
D. actively search for packets intended for themselves.
Answer: A
25.
Reference: Ring Topology
Difficulty: Challenging
When two computers send data at the same time on a bus network it is called a(n):
A. access method.
B. data collision.
C. active topology.
D. data termination.
Answer: B
26.
Reference: Bus Topology
Difficulty: Moderate
In a ring topology, the computer in possession of the ____________can transmit data.
A. packet
B. data
C. access method
D. token
Answer: D
27.
Reference: Ring Topology
Difficulty: Moderate
Because each node on the network is responsible for retransmitting the token and the data to the next node,
the ____________ topology is considered an active topology.
A. ring
B. bus
C. star
D. hybrid
Answer: A
Reference: Ring Topology
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Moderate
7
Chapter 12: Behind the Scenes: Networking and Security
28.
Which of the following statements about ring topology networks is TRUE?
A. A ring topology network is plagued with data collisions.
B. A ring topology network uses the CSMA/CD access method to transmit data.
C. A ring topology network allows only one node to transmit data at a time.
D. A ring topology network is considered passive.
Answer: C
29.
Reference: Ring Topology
Difficulty: Moderate
In the star topology, the central point of failure is the:
A. client.
B. switch.
C. terminator.
D. access point.
Answer: B
30.
Reference: Star Topology
Difficulty: Challenging
Which of the following statements, concerning star topology networks, is FALSE?
A. Star topology networks use the CSMA/CD access method.
B. If one computer fails, it does not affect the rest of the network.
C. There are no data collisions on a star topology network.
D. If the switch fails, the network no longer functions.
Answer: C
31.
Reference: Star Topology
Difficulty: Challenging
When a collision occurs on an Ethernet network, the node that detects the collision sends a(n):
A. token.
B. packet.
C. jam signal.
D. warning.
Answer: C
Reference: Star Topology
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Moderate
8
Chapter 12: Behind the Scenes: Networking and Security
32.
On an Ethernet network, after a collision occurs between two computers and a jam signal is sent, what
happens next?
A. The signals are encrypted to avoid a second collision.
B. A token is resent by the two computers that caused the collision.
C. The two computers wait random amounts of time, and then resend their signals.
D. The switch notifies the network of the collision.
Answer: C
33.
Reference: Star Topology
Difficulty: Challenging
Which of the following statements is FALSE concerning bandwidth?
A. Bandwidth defines the speed at which the data flows on the network.
B. Cable is rated by the maximum amount of bandwidth it supports.
C. Bandwidth is the amount of data transmitted across the transmission medium in a certain amount
of time.
D. Bandwidth is measured in bits per second (bps).
Answer: A
34.
Reference: Transmission Media
Difficulty: Easy
____________ defines whether the transmission media uses electrical impulses or pulses of light to
transmit data.
A. Bandwidth
B. Susceptibility to interference
C. Signal transmission method
D. Access method
Answer: C
35.
Reference: Wired Transmission Media
Difficulty: Challenging
EMI and RFI are types of:
A. signal interference.
B. bandwidth measurements.
C. twisted pair cable.
D. wireless transmission media.
Answer: A
Reference: Wired Transmission Media
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Moderate
9
Chapter 12: Behind the Scenes: Networking and Security
36.
All of the following statements concerning twisted pair cable are true EXCEPT:
A. Twisted pair uses pulses of light to send data.
B. The number of twists in twisted pair is significant because it makes the wires less susceptible to
interference.
C. UTP is not recommended in areas with significant sources of interference.
D. The two most common types of UTP in use today are Cat 5e and Cat 6.
Answer: A
37.
Reference: Twisted Pair Cable
Difficulty: Moderate
UTP and STP are examples of:
A. CATV cable.
B. thicknet coaxial cable.
C. fiber-optic cable.
D. twisted pair cable.
Answer: D
38.
Reference: Twisted Pair Cable
Difficulty: Easy
The core of a coaxial cable is usually made from:
A. magnesium oxide.
B. copper.
C. silicon.
D. glass fibers.
Answer: B
39.
Reference: Coaxial Cable
Difficulty: Easy
All of the following statements regarding fiber-optic cable are true EXCEPT:
A. the core of fiber-optic cable is composed of copper.
B. fiber-optic cable uses pulses of light to transmit data.
C. data passes through fiber-optic cable in one direction only.
D. the outer jacket of fiber-optic cables is often made of Kevlar.
Answer: A
Reference: Fiber-Optic Cable
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Moderate
10
Chapter 12: Behind the Scenes: Networking and Security
40.
The wired medium least susceptible to signal interference is:
A. STP cable.
B. coaxial cable.
C. fiber-optic cable.
D. UTP cable.
Answer: C
41.
Reference: Fiber-Optic Cable
Difficulty: Moderate
____________ wireless devices have largely been replaced with faster technology.
A. 802.11b
B. 802.11g
C. 802.11n
D. 802.11a
Answer: A
42.
Reference: Wireless Media Options
Difficulty: Moderate
All of the following protocols are proprietary EXCEPT:
A. TCP/IP.
B. IPX.
C. NetBEUI.
D. AFP.
Answer: A
43.
Reference: Network Operating Systems
Difficulty: Easy
The major network operating systems for installation on the server, in a client/server environment, include
all of the following EXCEPT:
A. Windows Server 2003.
B. UNIX.
C. Windows XP.
D. Novell NetWare.
Answer: C
Reference: Network Operating Systems
Copyright © 2008 Prentice-Hall. All rights reserved.
11
Difficulty: Easy
Chapter 12: Behind the Scenes: Networking and Security
44.
The OSI model is divided into ____________ processes called layers.
A. five
B. six
C. seven
D. eight
Answer: C
45.
Reference: Dig Deeper: The OSI Model
Difficulty: Easy
In the OSI model, the ____________ layer handles data encryption and compression.
A. application
B. presentation
C. data link
D. session
Answer: B
46.
Reference: Dig Deeper: The OSI Model
Difficulty: Challenging
In the OSI model, the ____________ layer is responsible for assembling the data packets into frames.
A. session
B. transport
C. data link
D. network
Answer: C
47.
Reference: Dig Deeper: The OSI Model
Difficulty: Challenging
The device that acts as an interface to connect with and communicate on a network is known as the:
A. network adapter.
B. hub.
C. repeater.
D. switch.
Answer: A
Reference: Network Adapters
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Easy
12
Chapter 12: Behind the Scenes: Networking and Security
48.
Which of the following statements concerning MAC addresses is TRUE?
A. A MAC address is used to externally identify a computer on a network.
B. The MAC address and the IP address can be used interchangeably.
C. A MAC address must match the IP address.
D. The first three numbers in the address identify the manufacturer.
Answer: D
49.
Reference: MAC Addresses
Difficulty: Challenging
If a network requires a cable to connect two devices farther apart than the normal maximum run length of
the media, the way to prevent signal degradation is to install a(n):
A. adapter.
B. repeater.
C. bridge.
D. switch.
Answer: B
50.
Reference: Repeaters and Hubs
Difficulty: Moderate
Another name for a “smart” hub is a:
A. bridge.
B. repeater.
C. firewall.
D. switch.
Answer: D
Reference: Switches and Bridges
Difficulty: Moderate
Fill in the Blank:
51.
____________ are designed to send information between two networks.
Answer: Routers
52.
Reference: Routers
Difficulty: Easy
The special communications software, installed on a computer to enable the network adapter to
communicate with the operating system is called the ____________.
Answer: device driver
Reference: Network Adapters
Copyright © 2008 Prentice-Hall. All rights reserved.
13
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
53.
Entering a user ID and password is known as ____________.
Answer: authentication
54.
Reference: Authentication
The acronym NOS stands for ____________.
Answer: Network Operating System
55.
Reference: Comparing Topologies
Difficulty: Easy
Reference: Star Topology
Difficulty: Challenging
Reference: Ring Topology
Difficulty: Moderate
Reference: Wired Transmission Media
Difficulty: Challenging
Reference: Star Topology
Difficulty: Easy
____________ cable is composed of a glass or plastic fiber (or bundle of fibers) as its core.
Answer: Fiber-optic
64.
Difficulty: Challenging
A(n) ____________ is a set of rules for exchanging communication.
Answer: protocol
63.
Reference: Dig Deeper: The OSI Model
____________ is the amount of data that can be transmitted over transmission media in a certain amount of
time.
Answer: Bandwidth
62.
Difficulty: Moderate
The ____________ passing method is used on a ring topology to avoid collisions.
Answer: token
61.
Reference: MAC Addresses
CSMA/CD is the access method used on ____________ networks.
Answer: Ethernet
60.
Difficulty: Challenging
Combining multiple topologies into one network is known as a(n) ____________ network.
Answer: hybrid
59.
Reference: Network Operating Systems
In the OSI model, the ____________ layer converts the data into signals for transmission over the network.
Answer: physical
58.
Difficulty: Easy
The ____________ identifies a computer internally on the network.
Answer: MAC address
57.
Reference: Network Operating Systems
NetBEUI, AFP, and IPX are known as ____________ protocols, which means that they do not work with
another vendor’s NOS.
Answer: proprietary
56.
Difficulty: Easy
Reference: Fiber-Optic Cable
Difficulty: Easy
____________ networks do not need specialized network operating system software.
Answer: Peer-to-peer
Reference: Network Operating Systems
Copyright © 2008 Prentice-Hall. All rights reserved.
14
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
65.
The 802.11 wireless standard is also known as ____________.
Answer: Wi-Fi
66.
Difficulty: Moderate
Reference: Switches and Bridges
Difficulty: Easy
Reference: Repeaters and Hubs
Difficulty: Moderate
Reference: Network Operating Systems
Difficulty: Challenging
Reference: Wired Transmission Media
Difficulty: Easy
The term packet screening refers to the examination of incoming data packets by the ____________to
ensure that they originate or are authorized by valid users on the internal network.
Answer: firewall
75.
Reference: Switches and Bridges
EMI and RFI are types of ____________.
Answer: interference
74.
Difficulty: Moderate
____________ is the open protocol used by the Internet.
Answer: TCP/IP
73.
Reference: MAC Addresses
____________ amplify a signal and retransmit it to extend cable runs beyond the maximum run length.
Answer: Repeaters
72.
Difficulty: Challenging
____________ are devices used to send data between different segments (collision domains) on a network.
Answer: Bridges
71.
Reference: MAC Addresses
A(n) ____________ sends data only to the intended recipient as opposed to a hub, which sends the data to
all devices connected to it.
Answer: switch
70.
Difficulty: Moderate
The acronym MAC, as in MAC address, stands for ____________.
Answer: Media Access Control
69.
Reference: Network Adapters
____________ are containers that hold multiple data packets.
Answer: Frames
68.
Difficulty: Easy
In wireless networks, wireless NICs connect to ____________, which provide wireless devices with a
sending and receiving connection to the network.
Answer: wireless access points
67.
Reference: Wireless Media Options
Reference: Firewalls
Difficulty: Moderate
____________ use IP addresses to send information between two networks.
Answer: Routers
Reference: Routers
Copyright © 2008 Prentice-Hall. All rights reserved.
Difficulty: Moderate
15
Chapter 12: Behind the Scenes: Networking and Security
True and False:
76.
In a ring topology, if one computer fails it can bring the entire network to a halt.
Answer: True
77.
Reference: Firewalls
Difficulty: Moderate
The hub is responsible for breaking down data into packets and preparing the packets for transmission
across the network.
Answer: False (network adapter or NIC) Reference: Network Adapters
79.
Reference: Dig Deeper: The OSI Model
Difficulty: Easy
Reference: Star Topology
Difficulty: Moderate
Reference: Network Topologies
Difficulty: Easy
A bus topology provides a fairer allocation of resources than a ring topology by giving all the nodes on the
network an equal opportunity to send data.
Answer: False
86.
Reference: Twisted Pair Cable
Token passing and CSMA/CD are methods of avoiding data collisions.
Answer: True
85.
Difficulty: Easy
The ring topology is the most widely deployed client/server topology in businesses today.
Answer: False (star)
84.
Reference: Wired Transmission Media
Crosstalk interference is the tendency of signals on one twisted pair wire to interfere with signals on a wire
next to it.
Answer: True
83.
Difficulty: Moderate
Throughput is another name for bandwidth.
Answer: True
82.
Difficulty: Challenging
Twisted pair cable has the lowest susceptibility to interference.
Answer: False (highest) Reference: Figure 12.14: Comparison of Characteristics…
81.
Difficulty: Easy
In the OSI model, the session layer sets up and manages the virtual (not physical) connection between the
sending and receiving devices.
Answer: True
80.
Difficulty: Easy
An application server acts as a go-between for computers on an internal network and the external network
(Internet).
Answer: False (proxy)
78.
Reference: Ring Topology
Reference: Ring Topology
Difficulty: Challenging
MAC addresses enable computers on one network to communicate with computers on another network.
Answer: False (IP addresses)
Reference: MAC Addresses
Copyright © 2008 Prentice-Hall. All rights reserved.
16
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
87.
Bridges are relatively simple devices whose sole purpose is to amplify a signal and retransmit it.
Answer: False (Repeaters)
88.
Reference: Repeaters and Hubs
In a star network, the failure of one computer affects the other computers on the network.
Answer: False Reference: Figure 12.10: Advantages and Disadvantages of Bus,…
89.
Difficulty: Easy
Hubs receive a signal from a device, reconstruct it, and transmit it to all the ports on the hub.
Answer: True
90.
Difficulty: Challenging
Reference: Repeaters and Hubs
Difficulty: Challenging
Authentication can be achieved through passwords, biometric access devices, and possessed objects.
Answer: True
Reference: Authentication
Difficulty: Easy
Matching:
91.
Match the following acronyms to their descriptions:
I.
MAC
II. CSMA/CD
B. device address
III. OSI
C. Ethernet access method
IV. EMI
D. type of cable
V. UTP
E. protocol standard
Answer: B, C, E, A, D
92.
A. type of interference
Reference: Multiple locations in chapter
Difficulty: Moderate
Match the following terms to their meanings:
I.
frame
A. packet granting transmission rights
II. bastion
B. assemblage of packets
III. token
C. a Novell protocol
IV. IPX
D. host configured as proxy server
V. jam
E. signal indicating data collisions
Answer: B, D, A, C, E
Reference: Multiple locations in chapter
Copyright © 2008 Prentice-Hall. All rights reserved.
17
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
93.
Match the following devices to their functions:
I.
repeater
II. hub
B. transmits data between two different networks
III. switch
C. device used for signal amplification and retransmission
IV. bridge
D. multiport device used for signal amplification and broadcast
V. router
E. connects collision domains of a network
Answer: C, D, A, E, B
94.
Reference: Multiple locations in chapter
Difficulty: Challenging
Match the following terms to their meanings:
I.
topology
A. communication rules
II. proxy
B. large size coaxial cable
III. intranet
C. server controlling Internet access of network
IV. protocol
D. private Web-based network
V. ThickNet
E. layout of a network
Answer: E, C, D, A, B
95.
A. sends data to a specific device, not to all devices
Reference: Multiple locations in chapter
Difficulty: Moderate
Match the following acronyms to their descriptions:
I.
TCP/IP
A. proprietary communications protocol
II. IPX
B. software controlling communications in a network
III. NOS
C. network spanning a metropolitan area
IV. MAN
D. type of network adapter
V. NIC
E. open communications protocol
Answer: E, A, B, C, D
Reference: Multiple locations in chapter
Copyright © 2008 Prentice-Hall. All rights reserved.
18
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
96.
Match the following OSI layers to their functions:
I.
Session
II. Presentation
B. sets up a virtual connection between sending and receiving devices and
manages communication
III. Data Link
C. determines where to send the data packets on the network
IV. Transport
D. assembles the data packets into frames and delivers them to the physical layer
V. Network
E. handles packet acknowledgment
Answer: B, A, D, E, C
97.
Reference: Dig Deeper: The OSI Model
Difficulty: Challenging
Match the following terms to their meanings:
I.
bandwidth
A. entering a user ID and password
II. bend radius
B. examining incoming data packets to ensure they originated from an authorized
user
III. ThinNet
C. degree of flexibility in a cable
IV. authentication
D. a type of coaxial cable used for cable TV
V. packet screening
E. amount of data that can be transmitted in a certain amount of time
Answer: E, C, D, A, B
98.
A. reformats, compresses, and encrypts data
Reference: Multiple locations in chapter
Difficulty: Moderate
Match the following terms to their meanings:
I.
firewall
A. a security measure, composed of hardware or software, to protect a network
from attacks over the Internet
II. terminator
B. a device that absorbs the signal to prevent its reflection back onto the network
III. passive topology
C. a special data packet on a ring topology
IV. access method
D. nodes on a network do nothing to move data along the network
V. token
E. controls how computers can use the transmission media
Answer: A, B, D, E, C
Reference: Multiple locations in chapter
Copyright © 2008 Prentice-Hall. All rights reserved.
19
Difficulty: Moderate
Chapter 12: Behind the Scenes: Networking and Security
99.
Match the following terms to their meanings:
I.
active topology
A. combining multiple topologies into one network
II. hybrid
B. the routes data takes to flow between devices
III. transmission media
C. each node on the network is responsible for retransmitting the signal
IV. device driver
D. a chunk of data containing the address of the receiving computer
V. packet
E. enables a device to communicate with the operating system
Answer: C, A, B, E, D
Reference: Multiple locations in chapter
Difficulty: Moderate
100. Match the following terms to their meanings:
I.
crosstalk
A. tendency of signals on one wire to interfere with signals on a wire next to it
II. CAT 6
B. can handle bandwidth of 1 Gbps
III. open protocol
C. computers connected in sequence on a single cable
IV. centralized
D. not associated with one particular vendor
V. bus
E. characteristic of client/server networks
Answer: A, B, D, E, C
Reference: Multiple locations in chapter
Copyright © 2008 Prentice-Hall. All rights reserved.
20
Difficulty: Moderate