Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server network D Wide area network 2 In which network type does each host on the LAN has the same authority as other hosts? A Peer-to-peer network B Local area network C Client/server network D Wide area network 3 Which network type requires a network operating system (NOS)? A Peer-to-peer network B Local area network C Client/server network D Wide area network 4 Large networks are frequently broken down into manageable pieces called _______________. segments 5 Which network component is most vulnerable to performance problems caused by poor installation practices? A Clients B Servers C Wiring D Network transmission devices 6 Which network medium carries light-based data through strands of glass or plastic no thicker than a human hair? A Coaxial B Twisted pair C Fiber optic D Wireless 7 Which network medium is composed of four pairs of wires, where the pairs are twisted together and bundled within a covering? A Coaxial B Twisted pair C Fiber optic D Wireless 8 Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer? A Coaxial B Twisted pair C Fiber optic D Wireless 9 Which network medium is a popular choice for outdoors or in an historic building? A Coaxial B Twisted pair C Fiber optic D Wireless 10 Fiber optic cabling is often used as the ____________ for networks. backbone 11 _____________ cable has the best wiring value and expansion capability. composite 12 Which type of coaxial cable is used for low-power video and RF signal connections? A RG-6 B RG-8 C RG-11 D RG-58 E RG-59 13 Thicknet cables are which type? (Choose all that apply.) A RG-6 B RG-8 C RG-11 D RG-58 E RG-59 14 Security on a WLAN is accomplished by _______________ the MAC addresses of wireless NICs that are allowed to use the access point and by encrypting data sent over the wireless LAN. filtering 15 Which wireless protocol is a short-range wireless technology limited to transmission distances of about 100 meters or less? A 802.11a B Bluetooth C Wi-Fi D WiMAX 16 In which network topology is each node connected to a central network transmission device such as a hub or a switch? A Bus B Mesh C Ring D Star 17 In which network topology is each node connected to the next by a direct line so that a continuous line is formed? A Bus B Mesh C Ring D Star 18 In which network topology is each node connected to a central device by two wires? A Bus B Mesh C Ring D Star 19 In which network topology do all nodes have independent connections to all other nodes? A Bus B Mesh C Ring D Star 20 True or false? The network topology shown in the graphic is an example of the mesh topology. False. It’s an example of a hybrid network topology. 21 True or false? In a star topology, when a single connection fails, it doesn’t affect the communication ability of other computers. True. In the star topology, when a single connection fails, it doesn’t affect the communication ability of other computers connected to the same network transmission device. 22 The benefit of a ___________ topology is that it’s simple and inexpensive to set up. bus 23 True or false? The star topology uses a central networking device called a multistation access unit (MSAU). False. Token Ring networks use a multistation access unit (MSAU). 24 The ___________ topology is extremely fault tolerant, but expensive to implement. mesh 25 An example of a ________________ connection is the dial-up connection from a computer to an ISP. point-to-point 26 In which type of network is data is broken up into packets before it’s sent over the network? A Point-to-point B Point-to-multipoint C Packet-switching D Circuit-switching 27 Which Ethernet standard is the fastest? A Twisted Pair Ethernet B Fast Ethernet C Gigabyte Ethernet D 10GbE 28 Which Ethernet standard designates fiber optic cabling as its required medium? (Choose all that apply.) A BASE-CX B BASE-R C BASE-T D BASE-W E BASE-X 29 Ethernet _____________ combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers. bonding 30 True or false? A star Ethernet might be faster than a bus Ethernet, especially if there are many nodes on the network. False. A star Ethernet might be slower than a bus Ethernet, because the hub generates a lot of data traffic that isn’t used. It replicates all the data it receives from any source and sends it to every node. 31 Which network topologies can you use with Ethernet networks? (Choose all that apply.) A Bus B Mesh C Ring D Star 32 ______________ is an acronym for the channel access method that avoids collisions rather than detecting them. CSMA/CD 33 In order to transmit data on a Token Ring network, a node must have possession of the _____________. token 34 In a WLAN, the wireless NIC allows nodes to communicate over ____________ distances using radio waves, which it sends to, and receives, from the hub. short 35 True or false? A LAN becomes a WAN when you expand the network configuration beyond your own premises and must lease data communication lines from a public carrier. True 36 Which is WAN connection technology that uses encryption and security protocols to create a private network over a public network? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless 37 Which is WAN connection technology that uses high-speed connections made over regular analog phone lines? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless 38 Which WAN connection technology is shown in the following graphic? A Cellular B DSL C ISDN D POTS/PSTN 39 Which WAN connection technology currently uses Enhanced Data rates for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), or High-Speed Downlink Packet Access (HSDPA)? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless 40 Which WAN technology that’s used to connect a small ISP or large business to a regional ISP, and a regional ISP to an Internet backbone, uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic? A ATM B E1/E3 C Frame relay D T1/T3 E X.25 41 Which OSI layer provides security, encryption, and compression for the data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application 42 Which OSI layer divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application 43 Which OSI layer addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application 44 Which OSI layer transmits bits from one computer to another and regulates the transmission stream over a medium? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application