Download Midterm Test - 18Jul08 - Solutions

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Point-to-Point Protocol over Ethernet wikipedia , lookup

Remote Desktop Services wikipedia , lookup

Bus (computing) wikipedia , lookup

Distributed firewall wikipedia , lookup

Lag wikipedia , lookup

IEEE 1394 wikipedia , lookup

Deep packet inspection wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Zigbee wikipedia , lookup

VMEbus wikipedia , lookup

AppleTalk wikipedia , lookup

CAN bus wikipedia , lookup

Power over Ethernet wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Airborne Networking wikipedia , lookup

Computer network wikipedia , lookup

Network tap wikipedia , lookup

Wireless security wikipedia , lookup

IEEE 802.11 wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Transcript
MIDTERM TEST – Fundamentals of Networking Technology - Summer 08
Student Name:
Test Date: 18 July 2008
1. A(n) ____ is a network of networks or a networked collection of LANs tied together by devices such as
routers.
a. internetwork
c. MAN
b. Internet
d. WAN
2. In ____ networking environments, certain computers take specialized roles and function mainly as servers,
and ordinary users’ machines tend to function mainly as clients.
a. LAN
c. peer-to-peer
b. internetwork
d. client/server
3. Networks fall into two major types: peer-to-peer and client/server (also called ____).
a. domain controlled
c. workgroup model
b. server-based
d. Web enabled
4. In a(n) ____, every user must also act as a network administrator, controlling access to the resources on their
machines.
a. LAN
c. peer-to-peer network
b. internetwork
d. client/server network
5. Most ____ consist of collections of typical end-user PCs linked by a common network medium.
a. LANs
c. peer-to-peer networks
b. internetworks
d. client/server networks
6. The emerging standard for WPANs is the IEEE ____ standard.
a. 802.3
c. 802.11
b. 802.5
d. 802.15
7. ____ servers supply the server side of client/server applications, and often the data that goes along with them,
to network clients.
a. Application
c. Web
b. File
d. Directory
8. ____ servers handle e-mail messages for network users; this function might involve simply acting as a
clearinghouse for local exchange of messages.
a. Mail
c. RRAS
b. Communication
d. File
9. A(n) ____ is recommended if the network use and security factors don’t require using a router.
a. LAN
c. WAN
b. MAN
d. Internetwork
10. 11. All network designs today are based on ____ simple physical topologies.
a. two
c. four
b. three
d. five
12. A(n) ____ attached to each end of a cable prevents signals from bouncing on a physical bus.
a. server
c. access point
b. hub
d. terminator
13. A physical bus topology is almost always implemented as a logical ____ topology.
a. ring
c. bus
b. switching
d. mesh
14. At the center of a logical bus implemented as a physical star is a device called a(n) ____.
a. hub
c. concentrator
b. switch
d. access point
15. At the center of a logical ring implemented as a physical star is a device called a(n) ____.
a. hub
c. concentrator
b. switch
d. access point
16. In the simplest wireless configuration, two computers can communicate directly with one another in a(n)
____ topology.
a. access point
c. infrastructure mode
b. point-to-point
d. ad hoc
17. In most situations, wireless LANs use a central device, called a(n) ____, to control communications.
a. hub
c. concentrator
b. switch
d. access point
18. The majority of hubs installed in networks today are ____ hubs.
a. active
c. repeating
b. passive
d. switching
19. A hub-based ____ topology might be considered if a few computers are being added to an existing network,
and the new computers are grouped in a somewhat remote location.
a. bus
c. ring
b. star
d. mesh
20. A central device, usually a(n) ____, sits in the middle of the extended star topology.
a. hub
c. switch
b. concentrator
d. access point
21. Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be
read accurately; this phenomenon is called ____.
a. attenuation
c. insertion loss
b. bandwidth
d. latency
22. ____ transmission systems use analog techniques to encode binary 1s and 0s across a continuous range of
values.
a. Direct sequence
c. Baseband
b. Electromagnetic
d. Broadband
23. Coaxial cable consists of a single conductor at the core, surrounded by an insulating layer, braided metal
shielding, and an outer cover (usually called the ____).
a. braiding
c. insulation
b. sheath
d. conduit
24. 10Base5 refers to ____.
a. thicknet
b. thinnet
c. Category 5 UTP
d. Category 6 UTP
25. Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into
computer network interfaces or other networked devices.
a. BNC
c. RJ-45
b. MT-RJ
d. RJ-11
26. With respect to structured cabling, the ____ is where computer workstations and other user devices are
located.
a. work area
c. equipment room
b. telecommunications closet
d. entrance facility
27. The ____ Worldwide Interoperability for Microwave Access (WiMax) standard, comes in two flavors.
a. 802.3
c. 802.11
b. 802.5
d. 802.16
28. Coaxial cable is often called “________coax ____________” for short.
29. The type of data transmission that occurs in a computer bus is called ____ transmission.
a. serial
c. analog
b. parallel
d. digital
30. In a NIC, ____ are the fundamental unit of data for network transmission and reception.
a. bits
c. packets
b. segments
d. frames
31. MAC addresses take the form of ____ two-digit hexadecimal numbers separated by colons.
a. four
c. six
b. five
d. seven
32. The PCMCIA bus size is ____ bits.
a. 8
b. 16
c. 32
d. 64
33. USB comes in ____ versions.
a. two
b. three
c. four
d. five
34. When purchasing a NIC for a server, you should choose ____-bit PCI-X or PCIe when possible.
a. 8
c. 32
b. 16
d. 64
35. With respect to data transfer speeds of wireless NICs, the most common choices today are 11 Mbps or ____
Mbps.
a. 22
c. 54
b. 50
d. 100
36. Wireless NICs can operate at speeds faster than 100 Mbps by using the ____ technology.
a. IEEE 802.11a
c. IEEE 802.11i
b. IEEE 802.11g
d. IEEE 802.11n
37. In the OSI reference model, the ____ layer is layer 6.
a. Data Link
c. Presentation
b. Application
d. Session
38. Domain Name System (DNS) and NetBIOS name resolution both work in part at the ____ layer.
a. Session
c. Presentation
b. Network
d. Transport
39. The PDU at the Data Link layer is called a ____.
a. message
b. segment
c. frame
d. packet
40. The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming
messages.
a. Data Link layer
c. MAC sublayer
b. LLC sublayer
d. Physical layer
41. The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10
Gigabit Ethernet).
a. 802.2
c. 802.5
b. 802.3
d. 802.11
42. The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and
techniques.
a. 802.3
c. 802.15
b. 802.11
d. 802.16
43. ____ functions at the Application layer of the OSI reference model.
a. UDP
c. PPP
b. ARP
d. HTTP
44. OSI stands for __ International Organization for Standardization ______________.
45. ____ is the TCP/IP protocol responsible for reliable delivery of data.
a. SPX
c. TCP
b. UDP
d. FTP
46. ____ is a nonroutable protocol.
a. NetBEUI
b. IP
c. IPX
d. SPX
47. IP is a ____ protocol.
a. reliable
b. nonroutable
c. connection-oriented
d. connectionless
48. ____ is a Network layer protocol used to resolve a logical (IP) address to a physical (MAC) address.
a. ICMP
c. DHCP
b. ARP
d. NAT
49. TCP is a(n) ____ protocol.
a. unreliable
b. best effort
c. connection-oriented
d. connectionless
50. ____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI
model.
a. DNS
c. ICMP
b. ARP
d. DHCP
51. ____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to
provide connectivity between dissimilar systems.
a. FTP
c. SNMP
b. Telnet
d. SMTP
52. Class ____ networks are limited to 254 hosts per network.
a. B
c. D
b. C
d. E
53. The reserved name localhost always corresponds to the IP address ____.
a. 127.0.0.1
c. 192.168.0.1
b. 169.254.0.1
d. 255.255.255.0
54. ____ is an example of an IPv6 address.
a. 2001:260::2ed3:340:ab
b. 192.168.0.1
c. 00-13-02-29-AG-6C
d. 200.13.4.0/26
55. In early networks based on ____, computers sent data whenever they had data to send.
a. polling
c. demand priority
b. switching
d. contention
56. ____ is the access method used by Ethernet.
a. CSMA/CA
b. CSMA/CD
c. Polling
d. Switching
57. A form of ____ is used in wireless LANs with an access point.
a. CSMA/CA
c. polling
b. switching
d. demand priority
58. When using the ____ channel access method, all computers have equal access to the media.
a. CSMA/CA
c. token passing
b. CSMA/CD
d. demand priority
59. ____ is a channel access method used solely by the 100VG-AnyLAN 100 Mbps Ethernet standard (IEEE
802.12).
a. Demand priority
c. CSMA/CA
b. Polling
d. Switching
60. ____ frames are used in TCP/IP networks.
a. Ethernet 802.2
b. Ethernet 802.3
c. Ethernet SNAP
d. Ethernet II