* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Midterm Test - 18Jul08 - Solutions
Point-to-Point Protocol over Ethernet wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Bus (computing) wikipedia , lookup
Distributed firewall wikipedia , lookup
Deep packet inspection wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Power over Ethernet wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Airborne Networking wikipedia , lookup
Computer network wikipedia , lookup
Network tap wikipedia , lookup
Wireless security wikipedia , lookup
IEEE 802.11 wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Internet protocol suite wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
MIDTERM TEST – Fundamentals of Networking Technology - Summer 08 Student Name: Test Date: 18 July 2008 1. A(n) ____ is a network of networks or a networked collection of LANs tied together by devices such as routers. a. internetwork c. MAN b. Internet d. WAN 2. In ____ networking environments, certain computers take specialized roles and function mainly as servers, and ordinary users’ machines tend to function mainly as clients. a. LAN c. peer-to-peer b. internetwork d. client/server 3. Networks fall into two major types: peer-to-peer and client/server (also called ____). a. domain controlled c. workgroup model b. server-based d. Web enabled 4. In a(n) ____, every user must also act as a network administrator, controlling access to the resources on their machines. a. LAN c. peer-to-peer network b. internetwork d. client/server network 5. Most ____ consist of collections of typical end-user PCs linked by a common network medium. a. LANs c. peer-to-peer networks b. internetworks d. client/server networks 6. The emerging standard for WPANs is the IEEE ____ standard. a. 802.3 c. 802.11 b. 802.5 d. 802.15 7. ____ servers supply the server side of client/server applications, and often the data that goes along with them, to network clients. a. Application c. Web b. File d. Directory 8. ____ servers handle e-mail messages for network users; this function might involve simply acting as a clearinghouse for local exchange of messages. a. Mail c. RRAS b. Communication d. File 9. A(n) ____ is recommended if the network use and security factors don’t require using a router. a. LAN c. WAN b. MAN d. Internetwork 10. 11. All network designs today are based on ____ simple physical topologies. a. two c. four b. three d. five 12. A(n) ____ attached to each end of a cable prevents signals from bouncing on a physical bus. a. server c. access point b. hub d. terminator 13. A physical bus topology is almost always implemented as a logical ____ topology. a. ring c. bus b. switching d. mesh 14. At the center of a logical bus implemented as a physical star is a device called a(n) ____. a. hub c. concentrator b. switch d. access point 15. At the center of a logical ring implemented as a physical star is a device called a(n) ____. a. hub c. concentrator b. switch d. access point 16. In the simplest wireless configuration, two computers can communicate directly with one another in a(n) ____ topology. a. access point c. infrastructure mode b. point-to-point d. ad hoc 17. In most situations, wireless LANs use a central device, called a(n) ____, to control communications. a. hub c. concentrator b. switch d. access point 18. The majority of hubs installed in networks today are ____ hubs. a. active c. repeating b. passive d. switching 19. A hub-based ____ topology might be considered if a few computers are being added to an existing network, and the new computers are grouped in a somewhat remote location. a. bus c. ring b. star d. mesh 20. A central device, usually a(n) ____, sits in the middle of the extended star topology. a. hub c. switch b. concentrator d. access point 21. Each type of cable can transport data only so far before its signal begins to weaken beyond where it can be read accurately; this phenomenon is called ____. a. attenuation c. insertion loss b. bandwidth d. latency 22. ____ transmission systems use analog techniques to encode binary 1s and 0s across a continuous range of values. a. Direct sequence c. Baseband b. Electromagnetic d. Broadband 23. Coaxial cable consists of a single conductor at the core, surrounded by an insulating layer, braided metal shielding, and an outer cover (usually called the ____). a. braiding c. insulation b. sheath d. conduit 24. 10Base5 refers to ____. a. thicknet b. thinnet c. Category 5 UTP d. Category 6 UTP 25. Whether STP or UTP, twisted-pair network cabling most commonly uses ____ connectors to plug into computer network interfaces or other networked devices. a. BNC c. RJ-45 b. MT-RJ d. RJ-11 26. With respect to structured cabling, the ____ is where computer workstations and other user devices are located. a. work area c. equipment room b. telecommunications closet d. entrance facility 27. The ____ Worldwide Interoperability for Microwave Access (WiMax) standard, comes in two flavors. a. 802.3 c. 802.11 b. 802.5 d. 802.16 28. Coaxial cable is often called “________coax ____________” for short. 29. The type of data transmission that occurs in a computer bus is called ____ transmission. a. serial c. analog b. parallel d. digital 30. In a NIC, ____ are the fundamental unit of data for network transmission and reception. a. bits c. packets b. segments d. frames 31. MAC addresses take the form of ____ two-digit hexadecimal numbers separated by colons. a. four c. six b. five d. seven 32. The PCMCIA bus size is ____ bits. a. 8 b. 16 c. 32 d. 64 33. USB comes in ____ versions. a. two b. three c. four d. five 34. When purchasing a NIC for a server, you should choose ____-bit PCI-X or PCIe when possible. a. 8 c. 32 b. 16 d. 64 35. With respect to data transfer speeds of wireless NICs, the most common choices today are 11 Mbps or ____ Mbps. a. 22 c. 54 b. 50 d. 100 36. Wireless NICs can operate at speeds faster than 100 Mbps by using the ____ technology. a. IEEE 802.11a c. IEEE 802.11i b. IEEE 802.11g d. IEEE 802.11n 37. In the OSI reference model, the ____ layer is layer 6. a. Data Link c. Presentation b. Application d. Session 38. Domain Name System (DNS) and NetBIOS name resolution both work in part at the ____ layer. a. Session c. Presentation b. Network d. Transport 39. The PDU at the Data Link layer is called a ____. a. message b. segment c. frame d. packet 40. The job of the ____ to convert bits into signals for outgoing messages and signals into bits for incoming messages. a. Data Link layer c. MAC sublayer b. LLC sublayer d. Physical layer 41. The IEEE standard ____ covers all forms of Ethernet media and interfaces, from 10 Mbps to 10 Gbps (10 Gigabit Ethernet). a. 802.2 c. 802.5 b. 802.3 d. 802.11 42. The IEEE standard ____ sets standards for wireless networking for many different broadcast frequencies and techniques. a. 802.3 c. 802.15 b. 802.11 d. 802.16 43. ____ functions at the Application layer of the OSI reference model. a. UDP c. PPP b. ARP d. HTTP 44. OSI stands for __ International Organization for Standardization ______________. 45. ____ is the TCP/IP protocol responsible for reliable delivery of data. a. SPX c. TCP b. UDP d. FTP 46. ____ is a nonroutable protocol. a. NetBEUI b. IP c. IPX d. SPX 47. IP is a ____ protocol. a. reliable b. nonroutable c. connection-oriented d. connectionless 48. ____ is a Network layer protocol used to resolve a logical (IP) address to a physical (MAC) address. a. ICMP c. DHCP b. ARP d. NAT 49. TCP is a(n) ____ protocol. a. unreliable b. best effort c. connection-oriented d. connectionless 50. ____ is a name-to-address resolution protocol that functionally operates at the Session layer of the OSI model. a. DNS c. ICMP b. ARP d. DHCP 51. ____ is a remote terminal emulation protocol that operates at all three upper layers and is used mostly to provide connectivity between dissimilar systems. a. FTP c. SNMP b. Telnet d. SMTP 52. Class ____ networks are limited to 254 hosts per network. a. B c. D b. C d. E 53. The reserved name localhost always corresponds to the IP address ____. a. 127.0.0.1 c. 192.168.0.1 b. 169.254.0.1 d. 255.255.255.0 54. ____ is an example of an IPv6 address. a. 2001:260::2ed3:340:ab b. 192.168.0.1 c. 00-13-02-29-AG-6C d. 200.13.4.0/26 55. In early networks based on ____, computers sent data whenever they had data to send. a. polling c. demand priority b. switching d. contention 56. ____ is the access method used by Ethernet. a. CSMA/CA b. CSMA/CD c. Polling d. Switching 57. A form of ____ is used in wireless LANs with an access point. a. CSMA/CA c. polling b. switching d. demand priority 58. When using the ____ channel access method, all computers have equal access to the media. a. CSMA/CA c. token passing b. CSMA/CD d. demand priority 59. ____ is a channel access method used solely by the 100VG-AnyLAN 100 Mbps Ethernet standard (IEEE 802.12). a. Demand priority c. CSMA/CA b. Polling d. Switching 60. ____ frames are used in TCP/IP networks. a. Ethernet 802.2 b. Ethernet 802.3 c. Ethernet SNAP d. Ethernet II