Term
In data networks, the task of directing information efficiently to the correct destination is handled by connectivity devices, primarily switches and routers. |
|
Definition
|
|
Term
Advances in NIC technology are making this hardware smarter than ever. |
|
Definition
|
|
Term
It is best to perform connectivity tests on a computer connected to a live network. |
|
Definition
|
|
Term
Bridges are protocol independent. |
|
Definition
|
|
Term
Cut-through switches can detect corrupt packets. |
|
Definition
|
|
Term
In a star topology, a single connection failure will halt all traffic between all sites. |
|
Definition
|
|
Term
Dial-up ISDN does not convert a computer’s digital signals to analog before transmitting them over the PSTN. |
|
Definition
|
|
Term
ATM is a WAN technology that functions in the Data Link layer. |
|
Definition
|
|
Term
SONET specifies framing and multiplexing techniques at the Physical layer. |
|
Definition
|
|
Term
After SONET, BPL has the best maximum throughput available. |
|
Definition
|
|
Term
Wireless signals experience attenuation. |
|
Definition
|
|
Term
Spread spectrum is a popular way of making wireless transmissions more secure. |
|
Definition
|
|
Term
Wireless networks are laid out using the same topologies as wired networks. |
|
Definition
|
|
Term
An ad hoc arrangement would work well for a WLAN with many users. |
|
Definition
|
|
Term
WiMAX is defined by the IEEE 802.11 standard. |
|
Definition
|
|
Term
On a network using TCP/IP, some nodes may use multiple IP addresses. |
|
Definition
|
|
Term
In CIDR, conventional network class distinctions do not exist. |
|
Definition
|
|
Term
The MIME standard replaces SMTP. |
|
Definition
|
|
Term
POP3’s design makes it best suited to users who retrieve their mail from the same workstation all the time. |
|
Definition
|
|
Term
IMAP4 servers require less storage space and usually more processing resources than POP servers do. |
|
Definition
|
|
Term
Using a virtualization program, you can create dozens of different VMs. |
|
Definition
|
|
Term
A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on. |
|
Definition
|
|
Term
The software required to establish VPNs is usually expensive. |
|
Definition
|
|
Term
PPTP and L2TP are the only protocols that can be used to carry VPN traffic. |
|
Definition
|
|
Term
Most cloud service providers use virtualization software to supply multiple platforms to multiple users. |
|
Definition
|
|
Term
NICs contain a(n) ____, which transmits and receives data signals.
a.keyboard port
b.mouse port
c.data transceiver
d.antenna |
|
Definition
|
|
Term
PCIe slots vary depending on the number of ____ they support.
a.lanes
c.cards
b.labels
d.processors |
|
Definition
|
|
Term
Buses differ according to their ____.
a.connectors
c.capacity
b.resistance
d.speed |
|
Definition
|
|
Term
CompactFlash is an example of a peripheral device attached to the computer’s ____ bus.
a.internal
c.onboard
b.external
d.remote |
|
Definition
|
|
Term
To install a NIC, you must first install the ____.
a.software
c.drivers
b.hardware
d.bus |
|
Definition
|
|
Term
Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.
a.ROM
c.RAM
b.EEPROM
d.CMOS |
|
Definition
|
|
Term
In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check a NIC’s connectivity with ____.
a.simple commands
c.special switches
b.special clients
d.special software |
|
Definition
|
|
Term
A hardware component that can be changed without disrupting operations is known as ____.
a.fast-synching
c.hot-swappable
b.hot-synching
d.fast-swappable |
|
Definition
|
|
Term
A ____ is a repeater with more than one output port.
a.bridge
c.hub
b.switch
d.router |
|
Definition
|
|
Term
Traditional switches operate at the ____ layer of the OSI model.
a.Physical
c.Network
b.Data link
d.Session |
|
Definition
|
|
Term
Switches can create ____ by grouping a number of ports into a broadcast domain.
a.trunks
c.gateways
b.spanning trees
d.VLANs |
|
Definition
|
|
Term
To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
a.RIP (Routing Information Protocol)
b.STP (Spanning Tree Protocol)
c.BGP (Border Gateway Protocol)
d.OSPF (Open Shortest Path First) protocol |
|
Definition
b.STP (Spanning Tree Protocol) |
|
|
Term
A ____ is a multiport connectivity device that directs data between nodes on a network.
a.switch
c.router
b.bridge
d.gateway |
|
Definition
|
|
Term
____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.
a.Static
c.Best path
b.Dynamic
d.Link-state |
|
Definition
|
|
Term
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
a.Routers
c.Gateways
b.Switches
d.Broadcast domains |
|
Definition
|
|
Term
WANs typically send data over ____ available communications networks.
a.privately
c.individually
b.publicly
d.serially |
|
Definition
|
|
Term
The individual geographic locations connected by a WAN are known as ____.
a.WAN sites
c.network service providers
b.WAN links
d.central offices |
|
Definition
|
|
Term
Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.
a.open
c.routable
b.standard
d.nonroutable |
|
Definition
|
|
Term
On most modern WANs, a ring topology relies on ____ rings to carry data.
a.flexible
c.serial
b.open
d.redundant |
|
Definition
|
|
Term
____ WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points.
a.Bus
c.Mesh
b.Star
d.Tiered |
|
Definition
|
|
Term
A(n) ____ is the place where a telephone company terminates lines and switches calls between different locations.
a.CO
c.DO
b.EO
d.TO |
|
Definition
|
|
Term
The portion of the PSTN that connects any residence or business to the nearest CO is known as the ____.
a.demarcation point
c.local loop
b.NIU (Network Interface Unit)
d.central office |
|
Definition
|
|
Term
____ means that a telephone company connects residential users to its network with fiber-optic cable.
a.OLT
c.PON
b.FITL
d.FITH |
|
Definition
|
|
Term
A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
a.terminal adapter
c.smart jack
b.DSLAM
d.terminator |
|
Definition
|
|
Term
ISDN PRI uses ____ B channels and one 64-Kbps D channel.
a.10
c.23
b.12
d.32 |
|
Definition
|
|
Term
The speed of a T-carrier depends on its ____ level.
a.signal
c.channel
b.hierarchy
d.traffic |
|
Definition
|
|
Term
At the customer’s demarcation point, either inside or outside the building, RJ-48 connectors terminate in a ____.
a.terminal adapter
c.CSU/DSU
b.smart jack
d.switch |
|
Definition
|
|
Term
A ____ aggregates multiple DSL subscriber lines and connects them to the carrier’s CO.
a.terminal adapter
c.smart jack
b.DSLAM
d.terminator |
|
Definition
|
|
Term
SONET’s extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
a.throughput
c.fault tolerance
b.low cost
d.latency |
|
Definition
|
|
Term
In wireless communication, to exchange information, two antennas must be tuned to the same ____.
a.frequency
c.attenuation speed
b.variance
d.port |
|
Definition
|
|
Term
A directional antenna issues wireless signals along a(n) ____ direction.
a.open
c.wide
b.narrow
d.single |
|
Definition
|
|
Term
In ____, a wireless signal splits into secondary waves when it encounters an obstruction.
a.reflection
c.diffraction
b.scattering
d.bounce back |
|
Definition
|
|
Term
In ____ wireless systems, the transmitting antenna focuses its energy directly toward the receiving antenna which results in a point-to-point link.
a.mobile
c.fixed
b.variable
d.open |
|
Definition
|
|
Term
In the case of connecting two WLANs, access points could be as far as ____ feet apart.
a.500
c.1000
b.800
d.1200 |
|
Definition
|
|
Term
The physical computer on a virtual machine is known as a ____.
a.guest
c.host
b.client
d.server |
|
Definition
|
|
Term
Each VM is known as a ____.
a.guest
c.client
b.host
d.node |
|
Definition
|
|
Term
____ is the most widely implemented virtualization software today.
a.Hyper-V
c.VirtualBox
b.Citrix
d.VMware |
|
Definition
|
|
Term
Upon creation, each vNIC is automatically assigned a ____.
a.MAC address
c.block address
b.switch address
d.reference address |
|
Definition
|
|
Term
In the NAT networking mode, a vNIC relies on the ____ to act as a NAT device.
a.guest machine
c.host machine
b.reference machine
d.management machine |
|
Definition
|
|
Term
____ mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your host’s operating system.
a.Host-only
c.Bridged
b.NAT
d.Blocked |
|
Definition
|
|
Term
When a server compares a user’s credentials with those in its database, the process is known as ____.
a.authorization
c.administration
b.authentication
d.accounting |
|
Definition
|
|
Term
In the case of dial-up networking, the term ____ refers to a modem.
a.serial connection
c.physical connection
b.virtual connection
d.POTS connection |
|
Definition
|
|
Term
____ is the remote virtual computing software that comes with Windows client and server operating systems.
a.Remote Server
c.Remote Windows
b.Remote Client
d.Remote Desktop |
|
Definition
|
|
Term
____ is an open source system designed to allow one workstation to remotely manipulate and receive screen updates from another workstation.
a.Remote Desktop
c.Citrix
b.VNC
d.Xen |
|
Definition
|
|
Term
____ are wide area networks that are logically defined over public transmission systems.
a.VPNs
c.Private lines
b.Leased lines
d.Dial-up lines |
|
Definition
|
|
Term
VPNs can be classified based on the kinds of ____ they connect. a.hardware
c.endpoints
b.software
d.circuits |
|
Definition
|
|
Term
A VPN tunneling protocol operates at the ____ layer.
a.Network
c.Session
b.Application
d.Data Link |
|
Definition
|
|
Term
On network diagrams, the Internet is frequently depicted as a ____.
a.block
c.line
b.cloud
d.lightening bolt |
|
Definition
|
|
Term
In ____, each datagram can follow one of many paths to reach its destination.
a.circuit switching
c.packet switching
b.line switching
d.data switching |
|
Definition
|
|
Term
____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
a.Virtual
c.Material
b.Physical
d.Guest |
|
Definition
|
|