Network Basics Solutions

advertisement
Review questions
1 Which network type is a specifically designed configuration of
computers and other devices located within a confined area?
A Peer-to-peer network
B
Local area network
C Client/server network
D Wide area network
2 In which network type does each host on the LAN has the same
authority as other hosts?
A
Peer-to-peer network
B Local area network
C Client/server network
D Wide area network
3 Which network type requires a network operating system (NOS)?
A Peer-to-peer network
B Local area network
C
Client/server network
D Wide area network
4 Large networks are frequently broken down into manageable pieces
called _______________.
segments
5 Which network component is most vulnerable to performance problems
caused by poor installation practices?
A Clients
B Servers
C
Wiring
D Network transmission devices
6 Which network medium carries light-based data through strands of
glass or plastic no thicker than a human hair?
A Coaxial
B Twisted pair
C
Fiber optic
D Wireless
7 Which network medium is composed of four pairs of wires, where the
pairs are twisted together and bundled within a covering?
A Coaxial
B
Twisted pair
C Fiber optic
D Wireless
8 Which network medium contains a layer of braided wire or foil between
the core and the outside insulating layer, plus another layer of plastic or
rubberized material that separates the central core from the shielding
layer?
A
Coaxial
B Twisted pair
C Fiber optic
D Wireless
9 Which network medium is a popular choice for outdoors or in an
historic building?
A Coaxial
B Twisted pair
C Fiber optic
D
Wireless
10 Fiber optic cabling is often used as the ____________ for networks.
backbone
11 _____________ cable has the best wiring value and expansion
capability.
composite
12 Which type of coaxial cable is used for low-power video and RF signal
connections?
A RG-6
B RG-8
C RG-11
D RG-58
E
RG-59
13 Thicknet cables are which type? (Choose all that apply.)
A RG-6
B
RG-8
C
RG-11
D RG-58
E RG-59
14 Security on a WLAN is accomplished by _______________ the MAC
addresses of wireless NICs that are allowed to use the access point and
by encrypting data sent over the wireless LAN.
filtering
15 Which wireless protocol is a short-range wireless technology limited to
transmission distances of about 100 meters or less?
A 802.11a
B
Bluetooth
C Wi-Fi
D WiMAX
16 In which network topology is each node connected to a central network
transmission device such as a hub or a switch?
A Bus
B Mesh
C Ring
D
Star
17 In which network topology is each node connected to the next by a
direct line so that a continuous line is formed?
A
Bus
B Mesh
C Ring
D Star
18 In which network topology is each node connected to a central device
by two wires?
A Bus
B Mesh
C
Ring
D Star
19 In which network topology do all nodes have independent connections
to all other nodes?
A Bus
B
Mesh
C Ring
D Star
20 True or false? The network topology shown in the graphic is an
example of the mesh topology.
False. It’s an example of a hybrid network topology.
21 True or false? In a star topology, when a single connection fails, it
doesn’t affect the communication ability of other computers.
True. In the star topology, when a single connection fails, it doesn’t affect the
communication ability of other computers connected to the same network
transmission device.
22 The benefit of a ___________ topology is that it’s simple and
inexpensive to set up.
bus
23 True or false? The star topology uses a central networking device called
a multistation access unit (MSAU).
False. Token Ring networks use a multistation access unit (MSAU).
24 The ___________ topology is extremely fault tolerant, but expensive to
implement.
mesh
25 An example of a ________________ connection is the dial-up
connection from a computer to an ISP.
point-to-point
26 In which type of network is data is broken up into packets before it’s
sent over the network?
A Point-to-point
B Point-to-multipoint
C
Packet-switching
D Circuit-switching
27 Which Ethernet standard is the fastest?
A Twisted Pair Ethernet
B Fast Ethernet
C Gigabyte Ethernet
D
10GbE
28 Which Ethernet standard designates fiber optic cabling as its required
medium? (Choose all that apply.)
A BASE-CX
B
BASE-R
C BASE-T
D BASE-W
E
BASE-X
29 Ethernet _____________ combines the bandwidth of two network
interface cards as a cost-effective way to increase bandwidth available
for data transfers for critical servers, such as firewalls and production
servers.
bonding
30 True or false? A star Ethernet might be faster than a bus Ethernet,
especially if there are many nodes on the network.
False. A star Ethernet might be slower than a bus Ethernet, because the hub
generates a lot of data traffic that isn’t used. It replicates all the data it receives
from any source and sends it to every node.
31 Which network topologies can you use with Ethernet networks?
(Choose all that apply.)
A
Bus
B Mesh
C Ring
D
Star
32 ______________ is an acronym for the channel access method that
avoids collisions rather than detecting them.
CSMA/CD
33 In order to transmit data on a Token Ring network, a node must have
possession of the _____________.
token
34 In a WLAN, the wireless NIC allows nodes to communicate over
____________ distances using radio waves, which it sends to, and
receives, from the hub.
short
35 True or false? A LAN becomes a WAN when you expand the network
configuration beyond your own premises and must lease data
communication lines from a public carrier.
True
36 Which is WAN connection technology that uses encryption and security
protocols to create a private network over a public network?
A Cable
B Cellular
C DSL
D DUN
E Satellite
F
VPN
G Wireless
37 Which is WAN connection technology that uses high-speed
connections made over regular analog phone lines?
A Cable
B Cellular
C
DSL
D DUN
E Satellite
F VPN
G Wireless
38 Which WAN connection technology is shown in the following graphic?
A Cellular
B DSL
C ISDN
D
POTS/PSTN
39 Which WAN connection technology currently uses Enhanced Data
rates for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO),
or High-Speed Downlink Packet Access (HSDPA)?
A Cable
B
Cellular
C DSL
D DUN
E Satellite
F VPN
G Wireless
40 Which WAN technology that’s used to connect a small ISP or large
business to a regional ISP, and a regional ISP to an Internet backbone,
uses fixed-length packets, called cells, to transmit data, voice, video,
and frame relay traffic?
A
ATM
B E1/E3
C Frame relay
D T1/T3
E X.25
41 Which OSI layer provides security, encryption, and compression for the
data?
A Layer 1—Physical
B Layer 2—Data Link
C Layer 3—Network
D Layer 4—Transport
E Layer 5—Session
F
Layer 6—Presentation
G Layer 7—Application
42 Which OSI layer divides long communications into smaller data
packages, handles error recognition and correction, and acknowledges
the correct receipt of data?
A Layer 1—Physical
B Layer 2—Data Link
C Layer 3—Network
D
Layer 4—Transport
E Layer 5—Session
F Layer 6—Presentation
G Layer 7—Application
43 Which OSI layer addresses data messages, translates logical addresses
into actual physical addresses, and routes data to addresses on the
network?
A Layer 1—Physical
B Layer 2—Data Link
C
Layer 3—Network
D Layer 4—Transport
E Layer 5—Session
F Layer 6—Presentation
G Layer 7—Application
44 Which OSI layer transmits bits from one computer to another and
regulates the transmission stream over a medium?
A
Layer 1—Physical
B Layer 2—Data Link
C Layer 3—Network
D Layer 4—Transport
E Layer 5—Session
F Layer 6—Presentation
G Layer 7—Application
Download