Download Questions07 - Dr. Juan Rodriguez Web Site

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Distributed firewall wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Technology In Action, Introductory, 10e (Evans et al.)
Chapter 7 Networking: Connecting Computing Devices
1) ______ is software that takes an existing Internet connection and turns it into a wireless
hotspot.
A) Netify
B) Multiply
C) Mobilefy
D) Connectify
Answer: D
Diff: 2
Section Ref: How Cool Is This?
2) A computer network is defined as two or more computers connected via ________ so that
they can communicate with each other.
A) software and hardware
B) the Internet
C) at least one server
D) Ethernet cable
Answer: A
Diff: 2
Section Ref: Networking Fundamentals
3) A(n) ________ is a device connected to a network such as a computer or a game console.
A) architecture
B) node
C) server
D) modem
Answer: B
Diff: 1
Section Ref: Networking Fundamentals
4) All of the following are benefits of networks EXCEPT, ________.
A) sharing an Internet connection
B) sharing printers and other peripherals
C) sharing files
D) sharing an operating system
Answer: D
Diff: 2
Section Ref: Networking Fundamentals
1
Copyright © 2014 Pearson Education, Inc.
5) Network architectures are classified according to ________.
A) the distance between the hub and the router
B) the bandwidth supplied by the connection
C) the way in which they are managed and the distance between their nodes
D) the speed at which the processor runs
Answer: C
Diff: 3
Section Ref: Network Architectures
6) All of the following involve tasks for network administration, EXCEPT ________.
A) installing new computers and devices on the network
B) updating and installing new software on the network
C) setting up proper security for a network
D) purchasing initial equipment for the network
Answer: D
Diff: 2
Section Ref: Networking Fundamentals
7) ________ is the maximum speed at which data can be transferred between two nodes.
A) Throughput
B) Bandwidth
C) Band speed
D) Through speed
Answer: B
Diff: 2
Section Ref: Networking Fundamentals
8) All of the following are used to classify network architectures, EXCEPT ________.
A) the distance between nodes
B) the protocol used to exchange data between nodes
C) the communication medium used to transport data
D) the number of nodes on the network
Answer: D
Diff: 2
Section Ref: Network Architectures
9) A ________ is a network located in your home that connects to all your digital devices.
A) MAN
B) WAN
C) HAN
D) LAN
Answer: C
Diff: 2
Section Ref: Network Architecture Defined by Distance
2
Copyright © 2014 Pearson Education, Inc.
10) A network used to communicate among devices close to one person is called a ________.
A) MAN
B) LAN
C) PAN
D) WAN
Answer: C
Diff: 2
Section Ref: Network Architecture Defined by Distance
11) A large network designed to provide access to a specific geographic area, such as a large city
is a ________.
A) MAN
B) PAN
C) LAN
D) WAN
Answer: A
Diff: 2
Section Ref: Network Architecture Defined by Distance
12) Which transmission medium transmits data the fastest?
A) Twisted-pair cable
B) Coaxial cable
C) Wireless
D) Fiber-optic cable
Answer: D
Diff: 2
Section Ref: Transmission Media
13) A client/server network is an example of ________ administration
A) local
B) wide area
C) central
D) corporate
Answer: C
Diff: 2
Section Ref: Network Architecture Defined by Levels of Administration
14) Normal telephone cable is a type of ________.
A) fiber-optic cable
B) twisted-pair cable
C) coaxial cable
D) Ethernet cable
Answer: B
Diff: 2
Section Ref: Transmission Media
3
Copyright © 2014 Pearson Education, Inc.
15) A peer-to-peer network is an example of ________ administration.
A) local
B) wide area
C) central
D) corporate
Answer: A
Diff: 2
Section Ref: Network Architecture Defined by Levels of Administration
16) Network adapters ________.
A) are built into the motherboard on each node
B) enable nodes in a network to communicate with each other
C) are always Ethernet NICs
D) are necessary only on servers in a client/server network
Answer: B
Diff: 2
Section Ref: Basic Network Hardware
17) The current version of wireless Ethernet is ________.
A) 802.11m
B) 802.11g
C) 802.11p
D) 802.11n
Answer: D
Diff: 2
Section Ref: Ethernet Protocols
18) Sophisticated networks generally use which of the following hardware devices to ease the
flow of data through the network?
A) Routers and switches
B) USB ports
C) Firewalls
D) Network interface cards (NICs)
Answer: A
Diff: 3
Section Ref: Basic Network Hardware
19) Which of the following is NOT a type of cable used in wired networks?
A) Twisted-pair cable
B) Coaxial cable
C) Fiber-optic cable
D) Router cable
Answer: D
Diff: 2
Section Ref: Transmission Media
4
Copyright © 2014 Pearson Education, Inc.
20) Client/server networks are controlled by a central server that runs a specialized piece of
software called ________.
A) Windows 7
B) a network operating system (NOS)
C) a firewall
D) firmware
Answer: B
Diff: 2
Section Ref: Network Software
21) Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home
network?
A) Cat 5E
B) Cat 6
C) Cat 6A
D) Cat 7B
Answer: D
Diff: 2
Section Ref: Transmission Media
22) For the nodes on a network to communicate with each other and access the network, each
node needs a ________.
A) DSL modem
B) network adapter
C) network interface card
D) router
Answer: B
Diff: 2
Section Ref: Basic Network Hardware
23) Data are sent through a network on bundles called ________.
A) packages
B) pouches
C) packets
D) switches
Answer: C
Diff: 2
Section Ref: Basic Network Hardware
24) The most popular transmission media option for wired Ethernet networks is ________.
A) fiber-optic cable
B) power-line cable
C) unshielded twisted-pair (UTP) cable
D) coaxial cable
Answer: C
Diff: 2
Section Ref: Transmission Media
5
Copyright © 2014 Pearson Education, Inc.
25) Wireless Internet is available using ________.
A) fiber optics
B) satellite
C) radio waves
D) DSL
Answer: C
Diff: 2
Section Ref: Wired Broadband Internet Connections
26) All of the following operating systems support P2P networking, EXCEPT ________.
A) Windows
B) OS X
C) Unix
D) Linux
Answer: C
Diff: 2
Section Ref: Network Software
27) Using a network without the network owner's permission is known as ________.
A) hyjacking
B) chillijacking
C) piggybacking
D) hybacking
Answer: C
Diff: 2
Section Ref: Ethics in IT: Sharing your Internet Connection with your Neighbors: Legal?
Ethical? Safe?
28) SSID stands for ________.
A) service set identity
B) service set identifier
C) service security identity
D) service security identifier
Answer: B
Diff: 2
Section Ref: Securing Wireless Networks
29) All of the following are extra precautions you can take to secure a wireless network,
EXCEPT ________.
A) change your network name (SSID)
B) enable SSID broadcast
C) turn on security protocols
D) create a passphrase
Answer: B
Diff: 2
Section Ref: Securing Wireless Networks
6
Copyright © 2014 Pearson Education, Inc.
30) The unique number assigned to a network adapter by the manufacturer is referred to as the
________ address.
A) MAC
B) IP
C) SSID
D) network
Answer: A
Diff: 2
Section Ref: Securing Wireless Networks
31) ________ enables you to use an existing Internet connection and turn it into a wireless
hotspot.
Answer: Connectify, connectify
Diff: 2
Section Ref: How Cool Is This?
32) The term network ________ refers to the design of a network.
Answer: architecture
Diff: 1
Section Ref: Network Architectures
33) Each device connected to a network is called a(n) ________.
Answer: node
Diff: 2
Section Ref: Networking Fundamentals
34) A(n) ________ network is when each computer can communicate directly with each other,
rather than having a separate device exercise central control over the entire network.
Answer:
peer-to-peer
Diff: 1
Section Ref: Network Architecture Defined by Levels of Administration
35) Network ________ involves tasks such as installing new computers and devices and
configuring proper security for a network.
Answer: administration
Diff: 1
Section Ref: Networking Fundamentals
36) A(n) ________ network is one in which the nodes are located within a small geographical
area.
Answer: local area
Diff: 1
Section Ref: Network Architecture Defined by Distance
7
Copyright © 2014 Pearson Education, Inc.
37) A network in your home that connects all your digital devices is called a(n) ________.
Answer:
HAN
Diff: 1
Section Ref: Network Architecture Defined by Distance
38) In a(n) ________ administered network, tasks performed on one computer can affect the
other computers on the network.
Answer: centrally
Diff: 2
Section Ref: Network Architecture Defined by Distance
39) Many cities in the United States now deploy ________ to provide Internet access to residents
and tourists.
Answer:
MANs
Diff: 2
Section Ref: Network Architecture Defined by Distance
40) In a client/server network, a(n) ________ is a computer on which users accomplish tasks.
Answer: client
Diff: 2
Section Ref: Transmission Media
41) ________ cable is made up of plastic or glass fibers that transmit data at extremely fast
speeds.
Answer: Fiber-optic
Diff: 2
Section Ref: Transmission Media
42) ________ cable consists of a single copper wire surrounded by layers of plastic and is used
to connect cable TV.
Answer: Coaxial
Diff: 2
Section Ref: Transmission Media
43) The majority of home and corporate networks are ________ networks.
Answer: Ethernet
Diff: 2
Section Ref: Ethernet Protocols
44) The capability of current devices to use earlier standards is known as ________.
Answer: backward compatibility
Diff: 2
Section Ref: Ethernet Protocols
8
Copyright © 2014 Pearson Education, Inc.
45) Network adapters installed inside the device are called ________.
Answer: network interface cards, NICs
Diff: 2
Section Ref: Basic Network Hardware
46) ________ transfer packets of data between two or more networks.
Answer: Routers
Diff: 2
Section Ref: Basic Network Hardware
47) ________ receive data packets and send them to the node for which they are intended.
Answer: Switches
Diff: 2
Section Ref: Basic Network Hardware
48) Bundles of data sent over transmission media are called ________.
Answer: packets
Diff: 2
Section Ref: Network Navigation Devices
49) The server on a client/server network has specialized ________ software installed.
Answer: network operating system, NOS
Diff: 2
Section Ref: Network Software
50) In reference to the wireless Ethernet standard, ________ devices achieve much higher data
transfer rates and cover a wider area than 802.11g devices.
Answer: 802.11n
Diff: 3
Section Ref: Ethernet Protocols
51) ______ is often referred to as "high-speed Internet."
Answer: Broadband
Diff: 2
Section Ref: Wired Broadband Internet Connections
52) DSL uses ________ cable.
Answer: twisted-pair
Diff: 2
Section Ref: Wired Broadband Internet Connections
53) A(n) ________ network uses radio waves as its transmission medium.
Answer: wireless
Diff: 1
Section Ref: Wired Broadband Internet Connections
9
Copyright © 2014 Pearson Education, Inc.
54) To access the Internet wirelessly, you need to use a(n) ________ that features wireless
capabilities.
Answer: router
Diff: 1
Section Ref: Wireless Internet Access
55) A popular Web-based application for storing files on the cloud is ________.
Answer: Dropbox
Diff: 3
Section Ref: Trends in IT: Where Should You Store Your Files? The Cloud is Calling!
56) ________ cable is composed of four pairs of wires that are twisted around each other to
reduce electrical interference.
Answer:
UTP
Diff: 3
Section Ref: Transmission Media
57) In terms of networking, NOS stands for ________.
Answer: network operating system
Diff: 1
Section Ref: Network Software
58) Public places where you can wirelessly connect to the Internet are known as ________.
Answer: hotspots
Diff: 2
Section Ref: Wireless Internet Access
59) Someone who breaks into computer systems to create mischief or steal information is a(n)
________.
Answer: hacker
Diff: 1
Section Ref: Securing Wireless Networks
60) ________ is a method of translating data into code.
Answer: Encryption
Diff: 3
Section Ref: Securing Wireless Networks
61) All wireless networks have their own name, referred to as the ________, which is used to
identify the network.
Answer:
SSID
Diff: 2
Section Ref: Securing Wireless Networks
10
Copyright © 2014 Pearson Education, Inc.
62) WEP stands for ________.
Answer: Wired Equivalent Privacy
Diff: 3
Section Ref: Securing Wireless Networks
63) WPA stands for ________.
Answer: Wi-Fi Protected Access
Diff: 3
Section Ref: Securing Wireless Networks
64) The read-only memory written in a router is referred to as ________.
Answer: firmware
Diff: 2
Section Ref: Securing Wireless Networks
65) ________ refers to connecting to a wireless connection without the permission of the owner.
Answer: Piggybacking
Diff: 2
Section Ref: Securing Wireless Networks
66) Data are sent through a network in bundles called ________.
Answer: packets
Diff: 2
Section Ref: Basic Network Hardware
67) A(n) ________ device can be connected directly to a network, either through a wired or
wireless connection.
Answer: network-ready
Diff: 2
Section Ref: Digital Entertainment Devices on a Network
68) ________ devices, which are becoming popular for home use, provide centralized data
storage and access for networks.
Answer:
Network attached storage
Diff: 2
Section Ref: Network-Attached Storage Devices
69) A printer connected to a wireless network is considered to be a node on that network.
Answer: TRUE
Diff: 1
Section Ref: Networking Fundamentals
70) Connectify enables you to connect all your WiFi-enabled devices through the same Internet
connection.
Answer: TRUE
Diff: 2
Section Ref: How Cool Is This?
11
Copyright © 2014 Pearson Education, Inc.
71) A network must be three or more computers that are connected through software and
hardware so they can communicate with each other.
Answer: FALSE
Diff: 2
Section Ref: Networking Fundamentals
72) A client computer is the computer on which users accomplish specific tasks.
Answer: TRUE
Diff: 1
Section Ref: Describing Networks Based on Network Administration
73) Sharing files is a benefit of a network.
Answer: TRUE
Diff: 2
Section Ref: Networking Fundamentals
74) For a home network, there are no real disadvantages.
Answer: TRUE
Diff: 2
Section Ref: Networking Fundamentals
75) In a peer-to-peer network, one computer acts as the server.
Answer: FALSE
Diff: 1
Section Ref: Network Architecture Defined by Levels of Administration
76) P2P networks are most commonly used in home networks.
Answer: TRUE
Diff: 1
Section Ref: Network Architecture Defined by Levels of Administration
77) MAN spans a large physical distance.
Answer: FALSE
Diff: 2
Section Ref: Network Architecture Defined by Distance
78) In a locally administered network, tests performed on one computer can affect other
computers on the network.
Answer: FALSE
Diff: 2
Section Ref: Network Architecture Defined by Levels of Administration
12
Copyright © 2014 Pearson Education, Inc.
79) Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast
speeds.
Answer: FALSE
Diff: 1
Section Ref: Transmission Media
80) Ethernet networks are always connected using twisted-pair cable technology.
Answer: FALSE
Diff: 1
Section Ref: Transmission Media
81) P2P networks are more expensive than client/server networks.
Answer: FALSE
Diff: 2
Section Ref: Network Architecture Defined by Levels of Administration
82) Most computers today come with Ethernet adapters already installed.
Answer: TRUE
Diff: 1
Section Ref: Basic Network Hardware
83) The capability of current devices to use earlier standards is known as backward
compatibility.
Answer: TRUE
Diff: 2
Section Ref: Network Architecture Defined by Levels of Administration
84) A P2P network needs network operating system software installed on every node.
Answer: FALSE
Diff: 2
Section Ref: Network Software
85) The most popular transmission media option for wired Ethernet networks is UTP cable.
Answer: TRUE
Diff: 2
Section Ref: Transmission Media
86) Current wireless Ethernet networks in the United States are based on the IEEE 802.3
standard.
Answer: FALSE
Diff: 3
Section Ref: Ethernet Protocols
87) Cat 6 cable is probably the best choice for home networking cable.
Answer: TRUE
Diff: 2
Section Ref: Transmission Media
13
Copyright © 2014 Pearson Education, Inc.
88) Although 802.11n works with 802.11g adapters, you will not achieve 802.11n data transfer
rates unless all adapters are 802.11n.
Answer: TRUE
Diff: 3
Section Ref: Ethernet Protocols
89) A router acts like a traffic signal on a network.
Answer: FALSE
Diff: 2
Section Ref: Basic Network Hardware
90) Wireless networks are more vulnerable to attack than wired networks.
Answer: TRUE
Diff: 2
Section Ref: Securing Wireless Networks
91) WEP is a stronger form of security than WAP.
Answer: FALSE
Diff: 2
Section Ref: Securing Wireless Networks
92) The practice of piggybacking is illegal in many places.
Answer: TRUE
Diff: 2
Section Ref: Securing Wireless Networks
93) Cable TV and cable Internet are the same service.
Answer: FALSE
Diff: 2
Section Ref: Wired Broadband Internet Connections
94) Limiting your signal range does not help increase wireless network security.
Answer: FALSE
Diff: 1
Section Ref: Securing Wireless Networks
95) Dropbox can be used only with computers using Windows.
Answer: FALSE
Diff: 2
Section Ref: Trends in IT: Where Should You Store Your Files? The Cloud is Calling!
96) Each wireless network has its own name to identify it, known as service set identity.
Answer: FALSE
Diff: 2
Section Ref: Securing Wireless Networks
14
Copyright © 2014 Pearson Education, Inc.
97) It is possible to limit your signal range on your home wireless network.
Answer: TRUE
Diff: 2
Section Ref: Securing Wireless Networks
98) Match the following terms to their definitions:
I. throughput
II. packet
III. hub
IV. firewall
V. NOS
A. software used to set up and manage a network
B. the actual speed of data transfer that is achieved on a network
C. the format in which data is sent over transmission media
D. hardware or software for protecting computers from hackers
E. retransmits a signal to all other nodes attached to it
Answer: B, C, E ,D, A
Diff: 2
Section Ref: Multiple locations in the chapter
99) Match the following terms to their definitions:
I. fiber-optic
II. twisted pair
III. LAN
IV. peer-to-peer
V. WAN
A. network that is confined to a small geographic location
B. made up of plastic or glass and transmits data at extremely fast speeds
C. each node can communicate directly with every other node on the network
D. made up of copper wires
E. a network that covers a great distance
Answer: B, D, A, C, E
Diff: 1
Section Ref: Multiple locations in the chapter
15
Copyright © 2014 Pearson Education, Inc.
100) Match the following terms to their definitions:
I. server
II. client
III. network
IV. node
A. two or more computers connected together via software and hardware so they can
communicate
B. can be a computer, peripheral, or communication device on a network
C. the computer on which users accomplish specific tasks and make specific requests
D. provides information and/or resources to the client computers on a network
Answer: D, C, A, B
Diff: 1
Section Ref: Multiple locations in the chapter
101) Match the following terms to their definitions:
I. WiFi
II. SSID
III. MAC
IV. NAS
V. DMR
A. address assigned by router manufacturers
B. provides for centralized data storage and access
C. also known as the 802.11 wireless standard
D. device designed to store digital media
E. a name used to identify a wireless network
Answer: C, E, A, B, D
Diff: 2
Section Ref: Multiple locations in the chapter
102) Match the following terms to their definitions:
I. bandwidth
II. throughput
III. router
IV. switch
V. NIC
A. directs data traffic between networks
B. handles data traffic between nodes on the same network
C. maximum speed at which data can be transmitted
D. network adapter
E. actual speed of data transfer
Answer: C, E, A, B ,D
Diff: 3
Section Ref: Multiple locations in the chapter
16
Copyright © 2014 Pearson Education, Inc.