As the number of ISPs has grown, a new form of network access point called a metropolitan area exchange has emerged.
Answer: True
Common carriers include...
Data Communication & Networking - True - False - 6
A hardware device that is not included in a network profile cannot be accessed by another computer on the network.
Answer: True
User profile refers...
Data Communication & Networking - True - False - 5
Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution.
Answer: True
Part...
Data Communication & Networking - True - False - 4
Contention is commonly used with Ethernet local area networks.
Answer: True
Traditional Ethernet and switched Ethernet account for almost all LANs...
Data Communication & Networking - True - False - 3
Eliminating jitter to generate a pure carrier signal in an analog circuit is impossible.
Answer: True
The distance between repeaters or amplifiers...
Data Communication & Networking - True - False - 2
Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit.
Answer:...
Data Communication & Networking - True - False - 1
Frequency modulation refers to the changing of the height of the sound wave.
Answer: False
Baud rate is the number of bits transmitted per second.
Answer:...
Which of the following new Internet efforts was started by 34 universities?
Which of the following new Internet efforts was started by 34 universities?
a. CA*net 3
b. ARDNOC
c. vBNS
d. NGI
e. UCAID
Answer:...
To snare intruders, many organizations now use _________ techniques.
To snare intruders, many organizations now use _________ techniques.
a. entrapment
b. hacker
c. Trojan horse
d. cracker
e. DES
Answer:...
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.
a. ANI system
b....
______ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
______ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
a....
Threat of intrusion comes from ____________.
Threat of intrusion comes from ____________.
a. the government
b. crackers
c. outside of the organization
d. both inside and outside of the organization
e....
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.
a....
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce...
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.
a. disruptive
b. controlled chaos
c....
A network switch failure is an example of a(n) ________ threat.
A network switch failure is an example of a(n) ________ threat.
a. internal
b. disruptive
c. causal
d. intrusion
e. disaster
Answer:...
Often, incidents of ___________ involve employees of the organization, surprisingly enough.
Often, incidents of ___________ involve employees of the organization, surprisingly enough.
a. intrusion
b. disruption
c. controlled chaos
d. destruction
e....
A tornado that eliminates a network control center would be an example of a natural __________
A tornado that eliminates a network control center would be an example of a natural __________
a. disaster
b. disruption
c. controlled chaos
d. destruction
e....
An example of _____ of data would be if a computer virus eliminated files on that computer.
An example of _____ of data would be if a computer virus eliminated files on that computer.
a. disruption
b. controlled chaos
c. intrusion
d. destruction
e....
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:
a....
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?
a. disruption
b....
CA*Net3 was developed by a Canadian organization known as:
CA*Net3 was developed by a Canadian organization known as:
a. IETF
b. ARDNOC
c. ADSL
d. RFC
e. UCAID
Answer:...
Some of the new applications being developed for a high-speed Internet include
Some of the new applications being developed for a high-speed Internet include
a.) Tele-immersion
b.) Tele-conferencing
c.) QoS
d.) Broadband
e.)...
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.
a. giga, gigabit
b. mega, megabit
c....
Which of the following groups developed Internet 2?
Which of the following groups developed Internet 2?
a. MCI WorldCom
b. ARDNOC
c. UCAID
d. Yipes
e. ISOC
Answer:...
Internet 2 is also known as:
Internet 2 is also known as:
a. CA*Net3
b. IETF
c. Next Generation Internet
d. the Abilene network
e. passive optical networking
Answer:...
A digital service offered by cable companies is the _________.
A digital service offered by cable companies is the _________.
a. Abilene network
b. WAP proxy
c. G.Lite ADSL
d. cable modem
e. Next Generation Internet
Answer:...
The _________ is the connection from a home or business to the telephone company end office.
The _________ is the connection from a home or business to the telephone company end office.
a. distribution hub
b. RFC
c. UCAID
d. local loop
e....
Digital Subscriber Line:
Digital Subscriber Line:
a. is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local...
The closest the Internet has to an "owning" organization is the ___________.
The closest the Internet has to an "owning" organization is the ___________.
a. Internet Service Provider
b. Abilene network
c. CA*Net3
d. University...
In general, local ISPs make money by charging ________.
In general, local ISPs make money by charging ________.
a. customers
b. ICANN
c. UCAID
d. the DSLAM
e. CSUs/DSUs
Answer:...
_______ has led to the belief that the Internet is "free".
_______ has led to the belief that the Internet is "free".
a. Encrypting
b. Peering
c. Bridging
d. Tolling
e. Polling
Answer:...
________ are smaller versions of NAPs that link a set of regional ISPs.
________ are smaller versions of NAPs that link a set of regional ISPs.
a. mini Network Access Points
b. cable modem termination system endpoints
c....
National ISPs connect together and exchange data at ___________.
National ISPs connect together and exchange data at ___________.
a. Network Access Points
b. cable modem termination system endpoints
c. distribution...
At the top of the Internet structure are national ___________, such as AT&T and Sprint.
At the top of the Internet structure are national ___________, such as AT&T and Sprint.
a. Network Access Points
b. Internet service providers
c....
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.
a....
____ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
____ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
a....
______ are smaller versions of NAPs that link a set of regional ISPs.
______ are smaller versions of NAPs that link a set of regional ISPs.
a. mini Network Access Points
b. cable modem termination system endpoints
c....
Which of the following is not a type of VPN?
Which of the following is not a type of VPN?
a. intranet VPN
b. extranet VPN
c. access VPN
d. T-1 VPN
e. a VPN that enables employees to access an...
Which of the following is a primary advantage of a VPN?
Which of the following is a primary advantage of a VPN?
a. low cost
b. inflexibility
c. unpredictable traffic congestion
d. security
e. complexity...
A _____ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.
A _____ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.
a. local...
With a virtual private network, users create permanent virtual circuits through the Internet called:
With a virtual private network, users create permanent virtual circuits through the Internet called:
a. bursts
b. cells
c. tunnels
d. rings
e. clouds
Answer:...
A _________ is a connection-oriented approach to sending packets on a packet switched service.
A _________ is a connection-oriented approach to sending packets on a packet switched service.
a. permanent virtual circuit
b. datagram
c. histogram
d....
A virtual circuit is established in the ___________ routing method.
A virtual circuit is established in the ___________ routing method.
a. asynchronous
b. connection-oriented
c. frequency division
d. application...
A _______ is a connectionless method of sending data packets on a packet switched service.
A _______ is a connectionless method of sending data packets on a packet switched service.
a. bursty packet
b. virtual circuit
c. datagram
d. histogram
e....
Mesh networks:
Mesh networks:
a. usually provide relatively long routes through the network (compared to ring networks)
b. require more processing by each...
Amplitude, frequency and phase are all characteristics of a sound wave.
Amplitude, frequency and phase are all characteristics of a sound wave.
Answer: Tr...
Frequency is the number of cycles per second and is expressed in Hertz.
Frequency is the number of cycles per second and is expressed in Hertz.
Answer: Tr...
Ethernet, a common LAN technology, uses Manchester encoding.
Ethernet, a common LAN technology, uses Manchester encoding.
Answer: Tr...
With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage.
With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage.
Answer: False
...
Nonreturn to zero is a type of unipolar signaling
Nonreturn to zero is a type of unipolar signaling
Answer: Fal...
Manchester encoding is a special type of bipolar signaling in which the signal is changed from high to low or from low to high in the middle of the signal.
Manchester encoding is a special type of bipolar signaling in which the signal is changed from high to low or from low to high in the middle of the...
The predominant method of transferring information internally in a computer is via parallel mode.
The predominant method of transferring information internally in a computer is via parallel mode.
Answer: Tr...
Serial mode transmission is much faster than parallel mode transmission.
Serial mode transmission is much faster than parallel mode transmission.
Answer: Fal...
ASCII is the least popular code for data communications.
ASCII is the least popular code for data communications.
Answer: False
...
Coding schemes are groups of bits that translate into the "alphabet" of any given system.
Coding schemes are groups of bits that translate into the "alphabet" of any given system.
Answer: True
...
Radio, infrared, microwave and satellite are all examples of guided media.
Radio, infrared, microwave and satellite are all examples of guided media.
Answer: False
...
Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency.
Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency.
Answer: Tr...
Fiber optic cable is thicker and heavier than unshielded twisted pair.
Fiber optic cable is thicker and heavier than unshielded twisted pair.
Answer: Fal...
Of all the media available, fiber optic provides the highest transmission speeds.
Of all the media available, fiber optic provides the highest transmission speeds.
Answer: Tr...
Fiber optic cable can only be used on LANs.
Fiber optic cable can only be used on LANs.
Answer: Fal...
Fiber optic cable carries signals in traditional electrical form.
Fiber optic cable carries signals in traditional electrical form.
Answer: Fal...
Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable.
Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable.
Answer: Fal...
Radio, infrared, microwave and satellite are all examples of guided media.
Radio, infrared, microwave and satellite are all examples of guided media.
Answer: Fal...
Guided media refers to the type of media in which the message is broadcast through the air.
Guided media refers to the type of media in which the message is broadcast through the air.
Answer: Fal...
The medium is the physical matter or substance that carries the voice or data transmission.
The medium is the physical matter or substance that carries the voice or data transmission.
Answer: Tr...
In full-duplex transmission, two stations can send and receive simultaneously.
In full-duplex transmission, two stations can send and receive simultaneously.
Answer: Tr...
A walkie-talkie is an example of half-duplex transmission.
A walkie-talkie is an example of half-duplex transmission.
Answer: Tr...
In simplex transmission, the data flows in both directions at the same time.
In simplex transmission, the data flows in both directions at the same time.
Answer: False
...
Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit. Answer: True
Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit.
Answer:...
In a multipoint circuit configuration, each computer can use the circuit at the same time.
In a multipoint circuit configuration, each computer can use the circuit at the same time.
Answer: Fal...
In a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network
In a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network
Answer:...
Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.
Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.
Answer: Fal...
With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage.
With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage.
Answer: Fal...
Nonreturn to zero is a type of unipolar signaling.
Nonreturn to zero is a type of unipolar signaling.
Answer: Fal...
Digital transmission produces more errors than analog transmission.
Digital transmission produces more errors than analog transmission.
Answer: Fal...
Computers produce digital data whose values are binary: 0 or 1.
Computers produce digital data whose values are binary: 0 or 1.
Answer: Tr...
A physical circuit refers to the transmission characteristics of the connection.
A physical circuit refers to the transmission characteristics of the connection.
Answer: Fal...
The physical layer is a layer where two communicating nodes are directly connected.
The physical layer is a layer where two communicating nodes are directly connected.
Answer: Tr...
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.
Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.
Answer: Fal...
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.
Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.
Answer: Tr...
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible...
The World Wide Web was conceived at the University of Utah as part of the development of the Internet.
The World Wide Web was conceived at the University of Utah as part of the development of the Internet.
Answer: Fal...
The standard protocol for communication between a Web browser and a Web server is the web protocol.
The standard protocol for communication between a Web browser and a Web server is the web protocol.
Answer: Fal...
To use the Web, each client computer requires a data link layer software package called a Web browser.
To use the Web, each client computer requires a data link layer software package called a Web browser.
Answer: Fal...
As the demand for more and more network applications grow; host-based computing becomes the best solution.
As the demand for more and more network applications grow; host-based computing becomes the best solution.
Answer: Fal...
A "thin client" approach places most of the application logic on the client.
A "thin client" approach places most of the application logic on the client.
Answer: Fal...
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.
In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible...
In a client-server network, the presentation logic is the responsibility of the client computer.
In a client-server network, the presentation logic is the responsibility of the client computer.
Answer: Tr...
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be...
The earliest data communications networks were client-server networks.
The earliest data communications networks were client-server networks.
Answer: Fal...
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.
One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be...
Host-based and client-based networks are similar in that the client computer performs most of the work.
Host-based and client-based networks are similar in that the client computer performs most of the work.
Answer: Fal...
The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks. Answer: True
The high bandwidth requirements (high communications needs) for video have slowed its integration into computer networks.
Answer: True
...
Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.
Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.
Answer:...
The OSI model is the most widely used network model to develop and build networks today.
The OSI model is the most widely used network model to develop and build networks today.
Answer: Tr...
The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer.
The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application...
The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.
The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model.
Answer: Fal...
The application layer is the seventh layer of the Internet model and provides the end user's access to the network.
The application layer is the seventh layer of the Internet model and provides the end user's access to the network.
Answer: Tr...
In the OSI model, the application layer is the end user's access to the network.
In the OSI model, the application layer is the end user's access to the network.
Answer: Tr...
Subscribe to:
Posts (Atom)