TEST BANK For Business Data Communications and Networking, 14th Edition by Jerry FitzGerald, Alan De

Page 1


Chapter 1 Introduction to Data Communications True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard), the reference section relevant to the topic, and learning objective are also furnished. 1. According to John Chambers, CEO of Cisco (a leading networking technology company), the information age is the second Industrial Revolution. Answer: Difficulty: Reference: L.O.:

True Easy Introduction Be aware of the three fundamental questions this book answers

2. Due to advances in high speed communication networks, the information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened. Answer: Difficulty: Reference: L.O.:

True Easy Introduction Be aware of the applications of data communications networks

3. It is not uncommon for companies to end up spending more money on network management and security tasks than they do on the actual computer equipment itself. Answer: Difficulty: Reference: L.O.:

True Medium Introduction Be aware of the three fundamental questions this book answers

4. Telecommunications is the transmission of voice and video as well as data and usually implies transmitting a longer distance than in a data communication network. Answer: Difficulty: Reference: L.O.:

True Medium Data Communications Networks Be familiar with the major components of and types of networks

5. A local area network (LAN) connects other LANs and backbone networks (BNs) located in different areas to each other and to wide area networks in a span from 3 to 30 miles. Answer: Difficulty: Reference: L.O.:

False Medium Data Communications Networks Be familiar with the major components of and types of networks


6. An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization. Answer: Difficulty: Reference: L.O.:

False Medium Data Communications Networks Be familiar with the major components of and types of networks

7. A car manufacturer may give access to certain portions of its network to some of its suppliers via the Internet. This is an example of an extranet. Answer: Difficulty: Reference: L.O.:

True Medium Data Communications Networks Be familiar with the major components of and types of networks

8. The OSI model is currently the most widely implemented network model used to develop and build networks of any size, including the Internet itself. Answer: Difficulty: Reference: L.O.:

False Medium Network Models Understand the role of network layers

9. The network layer performs the same functions in both the OSI and Internet models and is responsible for routing messages from the source computer to the destination computer. Answer: Difficulty: Reference: L.O.:

True Easy Network Models Understand the role of network layers

10. In the OSI model, the application layer provides a set of utilities for applications and is the end user’s access to the network. Answer: Difficulty: Reference: L.O.:

True Medium Network Models Understand the role of network layers

11. The application layer is the seventh layer of the Internet model and specifies the type of connection and the electrical signals that pass through it. Answer: Difficulty: Reference: L.O.:

False Easy Network Models Understand the role of network layers

12. At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferringthem.


Answer: Difficulty: Reference: L.O.:

True Hard Network Models Understand the role of network layers

13. Ethernet is an example of a network layer protocol. Answer: Difficulty: Reference: L.O.:

False Easy Network Standards Be familiar with the role of network standards

14. Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer. Answer: Difficulty: Reference: L.O.:

True Easy Network Standards Be familiar with the role of network standards

15. The specification stage of the de jure standardization process consists of developing nomenclature and identifying the problems to be addressed. Answer: Difficulty: Reference: L.O.:

True Medium Network Standards Be familiar with the role of network standards

16. ANSI is a voting participant in the ISO. Answer: Difficulty: Reference: L.O.:

True Easy Network Standards Be familiar with the role of network standards

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard), the reference section relevant to the topic, and learning objective are also furnished.


1.

Data communications and networking can be considered as a global area of study because: a. new technologies and applications emerge from a variety of countries and spread around the world b. the technologies enable global communication c. the political and regulatory issues are exactly the same in every country d. a and b e. none of the above Answer: Difficulty: Reference: L.O.: networks

2.

3.

D Easy Introduction Be familiar with the major components of and types of

Which of the following is not true about a server? a. stores data and software that can be accessed by the client. b. may be a personal computer or a mainframe on the network. c. in client/server computing they work together over the network with client computers to support the business application. d. can only perform one function on a network. e. stores documents and graphics that can be accessed from any Web browser. Answer: D Difficulty: Hard Reference: Data Communications Networks L.O.: Be familiar with the major components of and types of networks Networks that are designed to connect similar computers that share data and software with each other are called: a. client/server networks b. peer-to-peer networks c. host networks d. client networks e. local area networks Answer: Difficulty: Reference: L.O.: networks

B Easy Data Communications Networks Be familiar with the major components of and types of


4.

The function of the file server is to : a. store data and software programs that can be used by client computers on the network. b. manage all printing requests from clients on the network. c. transfer e-mail messages to other servers on the network. d. store HTML documents for an Internet or intranet web site. e. coordinate the communication of client and servers on the network. Answer: Difficulty: Reference: L.O.: networks

5.

A Medium Data Communications Networks Be familiar with the major components of and types of

A local area network is: a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange informationsuch as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.

Answer: Difficulty: Reference: L.O.: networks

B Easy Data Communications Networks Be familiar with the major components of and types of


6.

7.

A backbone network is: a. a high speed central network that connects other networks in a distance spanning up to several miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 200 miles with common carrier circuits. Answer: A Difficulty: Medium Reference: Data Communications Networks L.O.: Be familiar with the major components of and types of networks Which of the following is not a property of a WAN: a. connects backbone networks and MANS. b. spans hundreds or thousands of miles c. provides data transmission speeds from 56Kbps to 10Gbps. d. connects a group of computers in a small geographic area such as room, floor, building or campus. e. uses leased lines from IXCs like ATT, MCI, and Sprint. Answer: Difficulty: Reference: L.O.: networks

8.

D Medium Data Communications Networks Be familiar with the major components of and types of

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization. a. WAN b. BN c. extranet d. intranet e. MAN Answer: Difficulty: Reference: L.O.: networks

D Easy Data Communications Networks Be familiar with the major components of and types of


9.

A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet. a. WAN b. BN c. extranet d. intranet e. MAN

Answer: Difficulty: Reference: L.O.: networks 10.

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues? a. presentation b. transport c. physical d. session e. application Answer: Difficulty: Reference: L.O.:

11.

C Easy Data Communications Networks Be familiar with the major components of and types of

B Easy Networking Models Understand the role of network layers

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? a. presentation b. transport c. physical d. session e. application Answer: Difficulty: Reference: L.O.:

B Easy Networking Models Understand the role of network layers


12.

The ____________ layer of the OSI model is responsible for data format translation. a. b. c. d. e.

session presentation physical application transport

Answer: Difficulty: Reference: L.O.:

13.

The fourth layer of the OSI model is called the __________ layer. a. b. c. d. e.

network transport session data link presentation

Answer: Difficulty: Reference: L.O.:

14.

B Easy Networking Models Understand the role of network layers

B Easy Networking Models Understand the role of network layers

___________ is an orderly close to a dialogue between end users. a. Session termination b. Physical bits c. Frame overhead d. Packet encapsulation e. Message encryption Answer: Difficulty: Reference: L.O.:

A Hard Networking Models Understand the role of network layers


15.

In the Internet model, the application layer corresponds to the ________ layer(s) of the OSI model. a. b. c. d. e.

data link and network session, presentation and application application layer application and presentation network, transport and presentation

Answer: Difficulty: Reference: L.O.:

16.

The _________ layer performs error checking which is redundant to some extent with the function of the _________ layer. a. application, presentation b. physical, data link c. transport, data link d. presentation, transport e. network, physical Answer: Difficulty: Reference: L.O.:

17.

B Hard Networking Models Understand the role of network layers

C Medium Networking Models Understand the role of network layers

Which is not a function of the physical layer: a. b. c. d. e.

transmission of bits. defining the rules by which one and zeroes are transmitted. providing error-free transmission of data. providing the physical connection between sender and receiver. specifying the type of connection and type of signals, waves or pulses that pass though it.

Answer: Difficulty: Reference: L.O.:

C Hard Networking Models Understand the role of network layers


18.

The _________ layer is responsible for routing of messages from the sender to the final destination. a. data communication layer b. resident layer c. application layer d. network layer e. physical layer Answer: Difficulty: Reference: L.O.:

19.

Which of the following is not a function of the data link layer? a. deciding when to transmit messages over the media b. formatting the message by indicating where messages start and end, and which part is the address c. detecting and correcting any errors that have occurred in the transmission of the message d. specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it e. controlling the physical layer by determining when to transmit Answer: Difficulty: Reference: L.O.:

20.

D Easy Networking Models Understand the role of network layers

D Easy Networking Models Understand the role of network layers

Which of the following is a function of the transport layer? a. linking the physical layer to the network layer b. formatting messages by indicating where they start and end c. deciding which route the message should take d. breaking long messages into several smaller messages e. specifying the type of connection and the electrical signals, radio waves, or light pulses that pass through it Answer: Difficulty: Reference: L.O.:

D Easy Networking Models Understand the role of network layers


21.

Which of the following is a term used to group together the physical and data link layers? a. Internetwork layers b. Hardware layers c. Software layers d. Middleware layers e. Application layers Answer: Difficulty: Reference: L.O.:

22.

Which of the following would be a standard used at the Data Link layer of the Internet or OSI model? a. IP b. TCP c. Ethernet d. HTTP e. FTP Answer: Difficulty: Reference: L.O.:

23.

B Medium Networking Models Understand the role of network layers

C Medium Networking Models Understand the role of network layers

In which layer of the Internet model would the HTTP standard be used? a. physical b. application c. transport d. network e. data link Answer: Difficulty: Reference: L.O.:

B Medium Networking Models Understand the role of network layers


24.

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand. a. agreement b. standard c. protocol d. regulations e. policy Answer: Difficulty: Reference: L.O.:

25.

The network layer of the Internet model uses the _____________ protocol to route messages though the network. a. TCP b. HTTP c. FTP d. SMTP e. IP Answer: Difficulty: Reference: L.O.:

26.

C Medium Networking Models Understand the role of network layers

E Medium Networking Models Understand the role of network layers

The primary reason for networking standards is to: a. simplify cost accounting for networks b. ensure that hardware and software produced by different vendors can work together c. make it more difficult to develop hardware and software that link different networks d. ensure that all network components of a particular network can be provided by only one vendor e. lock customers into buying network components from one vendor Answer: Difficulty: Reference: L.O.:

B Medium Network Standards Be familiar with the role of network standards


27.

Which of the following is not true about de jure standards? a. They are always developed before de facto standards. b. One example exists for network layer software (IP). c. They can be developed by an official industry body. d. They can take several years to develop. e. They can be developed by a government body. Answer: Difficulty: Reference: L.O.:

28.

Which of the following is not true about de facto standards? a. They never evolve into de jure standards. b. They are those standards that emerge in the marketplace. c. They tend not to be developed by an official industry or government body. d. They are generally supported by more than one vendor but de facto standards have no official standing. e. They tend to emerge based upon the needs/response of the marketplace. Answer: Difficulty: Reference: L.O.:

29.

A Medium Network Standards Be familiar with the role of network standards

A Medium Network Standards Be familiar with the role of network standards

The three stages of the de jure standardization process are ______________________. a. specification, identification of choices and acceptance. b. planning, implementing and acceptance. c. brainstorming, identification and implementing. d. specification, formalization, and acceptance. e. none of the above. Answer: Difficulty: Reference: L.O.:

A Easy Network Standards Be familiar with the role of network standards


30.

Which of the following is true about ISO: a. It makes technical recommendations about data communications interfaces b. Its name stands for International Organization for Standardization c. It is based in Geneva, Switzerland d. It is one of the most important standards-making bodies e. All of the above Answer: E Difficulty: Medium Reference: Network Standards L.O.: Be familiar with the role of network standards

31.

Which of the following is not true about ITU-T: a. It is the technical standards-setting organization of the United Nations International Telecommunications Union b. It is the International Telecommunications Union – Telecommunications Group c. Its membership is limited to U.S. telephone companies d. It is based in Geneva, Switzerland e. Its membership is comprised of representatives from over 200 member countries Answer: C Difficulty: Medium Reference: Network Standards L.O.: Be familiar with the role of network standards

32.

The American National Standards Institute: a. is the coordinating organization for the United States’ national system of standards b. is a professional society in the U.S. whose standards committees focus on local area network standards c. sets the standards that govern how much of the Internet will operate d. is an agency that develops federal information processing standards for the federal government e. makes technical recommendations about global telephone rates Answer: Difficulty: Reference: L.O.:

A Medium Network Standards Be familiar with the role of network standards


33.

The Internet standards organization that will allow anyone to join is __________________. a. ANSI b. ISO c. IETF d. IEEE e. ITU-T Answer: Difficulty: Reference: L.O.:

34.

Which standards body is responsible for the development of local area network (LAN) standards? a. ANSI b. ISO c. IETF d. IEEE e. ITU-T Answer: Difficulty: Reference: L.O.:

35.

C Medium Network Standards Be familiar with the role of network standards

D Medium Network Standards Be familiar with the role of network standards

Which of the following is not an application layer standard? a. HTTP b. POP c. T1 d. IMAP e. HTML Answer: Difficulty: Reference: L.O.:

C Easy Network Standards Be familiar with the role of network standards


36.

Which of the following is not a data link layer standard? a. HTTP b. Ethernet c. T1 d. PPP e. Frame Relay Answer: Difficulty: Reference: L.O.:

37.

Which of the following is not an important future trend in communication and networking? a. development of online batch systems b. integration of voice, video, and data c. pervasive networking d. provision of new information services on rapidly expanding networks e. development of extremely high speed broadband networks Answer: Difficulty: Reference: L.O.:

38.

A Easy Network Standards Be familiar with the role of network standards

A Medium Network Standards Be familiar with the role of network standards

__________ ensure that hardware and software produced by different vendors work together. a. Delimiters b. Standards c. ASPs d. RBOCs e. Intranets Answer: Difficulty: Reference: L.O.:

B Easy Network Standards Be familiar with the role of network standards


39.

A _____________ is the input-output hardware device at the end user’s end of a communication circuit in a client-server network. a. server b. circuit c. client d. host Answer: C Difficulty: Easy Reference: Data Communications Networks L.O.: Be familiar with the major components of and types of networks

40.

A(n) ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users outside the organization. a. intranet b. Usenet c. Wide Area Network d. extranet Answer: D Difficulty: Easy Reference: Network Models L.O.: Be familiar with the major components of and types of networks

41. Taken together, the physical and data link layers are called the ____________________. a. Internet layer b. Hardware layer c. Internetwork layer d. Application layer Answer: B Difficulty: Easy Reference: Network Models L.O.: Be familiar with the major components of and types of networks 42. BYOD stands for a. Bring Your Own Device b. Bring Your Own Database c. Build Your Own Device d. Build Your Own Database Answer: A Difficulty: Easy Reference: Future Trends L.O.: Be aware of three key trends in communications and networking


43. When a user accesses an application via a web browser on their mobile device, this is referred to as a. a browser-based approach b. a native app c. Internet Explorer d. BYOD Answer: Difficulty: Reference: L.O.: networking

A Easy Future Trends Be aware of three key trends in communications and

44. A MOOC is an example of a(n) a. BYOD b. massively online technology c. native app d. browser-based technology Answer: B Difficulty: Easy Reference: Future Trends L.O.: Be aware of three key trends in communications and networking 45. A network administrator has received several reports from users of the network that the intranet website on one of company servers is not accessible, but the same users are still able to retrieve their email being stored on the same server. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link Answer: D Difficulty: Medium Reference: Network Models L.O.: Understand the role of network layers 46. A junior network administrator has used the wrong cable type to connect his/her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the Internet model does this problem appear to reside at? a. physical b. transport c. network d. application e. data link Answer: A


Difficulty: Reference: L.O.:

Medium Network Models Understand the role of network layers

47. Which of the following correctly represents order of the seven layers of the OSI model from layer 1 to layer 7? a. physical, network, data link, session, transport, application, presentation b. physical, data link, network, transport, session, application, presentation c. physical, data link, network, transport, session, presentation, application d. data link, physical, network, session, transport, application, presentation e. data link, physical, network, transport, session, presentation, application Answer: C Difficulty: Medium Reference: Network Models L.O.: Understand the role of network layers

SHORT ANSWER AND ESSAY 1. How can data communications networks affect businesses? 2. From your own knowledge or background, discuss and describe three important applications of data communications networks for strategic, competitive advantage in business use. Give examples of three real world firms who have used networks for competitive advantage in the marketplace and discuss why these networks contributed to their expertise or competitive advantage. 3. How do LANs differ from WANs, and BNs? 4. Draw a diagram of the Internet model and describe what each of the five layers do. Put three examples of standards on each of your layers in the diagram. Do this in detail, explaining how a message is transmitted from one computer to another using this model. 5. How are Internet standards developed? What is a de facto standard? 6. Describe two important data communications standards-making bodies. How do they differ? 7. What is the purpose of a data and network communication standard? Give five examples of various standards and describe what that standard is (e.g., RS 232, HTTP, etc.) 8. Discuss three trends in communications and networking. Be sure to give four points for each of these trends, plus two in depth examples in your response.


9. Compare and contrast a backbone network (BN), a LAN, and a WAN. Do most organizations build WANs? 10. What are the three basic hardware components for a data communication network? Describe the functions of these. 11. Why are standards important? 12. Describe the address naming structure of computers on the Internet. 13. What is the difference between an extranet and intranet? 14. What are the seven layers of the OSI model and what does each of these layers do? How does the OSI model compare to the Internet model? What does OSI stand for, and who developed this model? 15. What is VOIP? What are some examples of companies that provide VOIP as a service to their customers? 16. Explain why it is such a great time to be an IT professional.


Chapter 2 Application Layer True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard), the reference section relevant to the topic, and learning objective are also furnished. 1.

An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network. Answer: Difficulty: Reference: L.O. :

2.

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. Answer: Difficulty: Reference: L.O. :

3.

True Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

A server farm is a group of computers that are linked together so they act as a one computer. Answer: Difficulty: Reference: L.O. :

4.

False Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

True Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

Host-based and client-based networks are similar in that the client computer performs most of the work. Answer: Difficulty: Reference: L.O. :

False Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


5.

The earliest data communications networks were client-server networks. Answer: Difficulty: Reference: L.O. :

6.

As the demand for more and more network applications grow; host-based computing becomes the best solution. Answer: Difficulty: Reference: L.O. :

7.

True Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

In a client-server network, the presentation logic is the responsibility of the client computer. Answer: Difficulty: Reference: L.O. :

9.

False Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture. Answer: Difficulty: Reference: L.O. :

8.

False Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

True Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to ‘know’ which server contains the application’s data. Answer: Difficulty: Reference: L.O. :

True Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


10.

Middleware is the software that sits between the application software on the client and the application software on the server. Answer: Difficulty: Reference: L.O. :

11.

In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage. Answer: Difficulty: Reference: L.O. :

12.

False Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

The application architecture called the distributed computing model uses the “thick” client approach. Answer: Difficulty: Reference: L.O. :

14.

True Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

A “thin client” approach places most of the application logic on the client. Answer: Difficulty: Reference: L.O. :

13.

True Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

False Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. Answer: Difficulty: Reference: L.O. :

True Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


15.

To use the Web, each client computer requires a data link layer software package called a Web browser. Answer: Difficulty: Reference: L.O.:

16.

The standard protocol for communication between a Web browser and a Web server is the web protocol. Answer: Difficulty: Reference: L.O.:

17.

False Easy World Wide Web Understand how the Web works

All three parts (request line, request header, request body) of an HTTP request from a web browser to a web server are required when a request is made. Answer: Difficulty: Reference: L.O.:

20.

False Easy World Wide Web Understand how the Web works

A request header for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands. Answer: Difficulty: Reference: L.O.:

19.

False Medium World Wide Web Understand how the Web works

The World Wide Web was conceived at University of Utah as part of the development of the Internet. Answer: Difficulty: Reference: L.O.:

18.

False Easy World Wide Web Understand how the Web works

False Medium Electronic Mail Understand how email works

The Simple Mail Transfer Protocol is the least commonly used e-mail standard. Answer: Difficulty: Reference: L.O.:

False Easy Electronic Mail Understand how email works


21.

The two-tier e-mail architecture does not require any application software on the client computer. Answer: Difficulty: Reference: L.O.:

22.

Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. Answer: Difficulty: Reference: L.O.:

23.

True Medium Electronic Mail Understand how email works

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing Answer: Difficulty: Reference: L.O. :

25.

False Easy Electronic Mail Understand how email works

Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages. Answer: Difficulty: Reference: L.O.:

24.

False Easy Electronic Mail Understand how email works

True Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

Cloud-hosted virtual desktops are now available through a service called DaaS allowing users to access the same client computer (virtual desktop) from any computer and any location. Answer: Difficulty: Reference: L.O. :

True Medium Other Applications Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard), the reference section relevant to the topic, and learning objective are also furnished. 1.

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a. anonymous FTP b. data access logic c. fat client d. application architecture e. response status architecture Answer: Difficulty: Reference: L.O.:

2.

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a. workstation b. transaction terminal c. cluster d. mainframe e. personal computer Answer: Difficulty: Reference: L.O.:

3.

D Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

D Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

A ________ is a group of computers linked together so that they act as one computer. a. workstation b. transaction terminal c. server farm d. network computer e. transaction terminal Answer: Difficulty: Reference: L.O.:

C Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


4.

With the two-tier client-server architecture, the server is responsible for the ________ logic. a. b. c. d. e.

application presentation data access session physical

Answer: Difficulty: Reference: L.O.:

5.

Which of the following is not a general function by any application program? a. data storage b. data access logic c. application logic d. presentation logic e. application access storage Answer: Difficulty: Reference: L.O.:

6.

C Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

E Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

_________ is an application program function that deals with storing and retrieving data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage Answer: Difficulty: Reference: L.O.:

A Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


7.

An application program function is __________, or the processing required to access data. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage Answer: Difficulty: Reference: L.O.:

8.

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage Answer: Difficulty: Reference: L.O.:

9.

B Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

C Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

________ is the presentation of information to the user and the acceptance of the user’s commands. a. data storage b. data access logic c. application logic d. presentation logic e. application access storage Answer: Difficulty: Reference: L.O.:

D Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


10.

One underlying problem with a host-based network is that: a. there are economies of scale because all computer resources are centralized b. the server can get overloaded since it must process all messages c. the architecture is relatively simple and works well d. the server is the one point of control which simplifies security e. clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture Answer: Difficulty: Reference: L.O.:

11.

With a client-based network, one fundamental problem is that: a. the clients each must store all the data b. the server does not have any data storage capability c. the host or server must perform presentation logic, application logic, and data access logic at the same time d. all data on the server must travel to the client for processing e. the clients must perform the data storage logic Answer: Difficulty: Reference: L.O.:

12.

B Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

D Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

With the two-tier client-server architecture, the client is responsible for the ________ logic. a. b. c. d. e.

session presentation data access data storage networking

Answer: Difficulty: Reference: L.O.:

B Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


13.

Client-server architectures: a. cannot connect computers that use different hardware b. are one of the least used network architectures today c. can use middleware to provide a standard way of communicating between software from more than one vendor d. assign the responsibility for the presentation logic to the server e. were the earliest type of network architectures Answer: Difficulty: Reference: L.O.:

14.

How are the application architecture functions split up in a client-server network? a. the presentation logic and data storage are on the client, while the data access logic is on the server b. the data storage, data access, and presentation logic are on the client c. the presentation logic is on the client, while the data storage and data access logic are on the server d. the data storage and data access logic are on the client, while the presentation logic are on the server e. the presentation logic and data access logic are on the client, and the data storage is on the server Answer: Difficulty: Reference: L.O.:

15.

C Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

C Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

In a client-server network, _________ gets software from different vendors to work together. a. a front-end processor b. serverware c. middleware d. centerware e. programmer Answer: Difficulty: Reference: L.O.:

C Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


16.

____________ is not an important middleware standard. a. CORBA (Common Object Request Broker Architecture b. Distributed Computed Environment (DCE) c. Asynchronous Transfer Mode (ATM) d. Open Database Connectivity (ODBC) e. none of the above is an appropriate answer Answer: Difficulty: Reference: L.O.:

17.

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers. a. one b. two c. three d. five e. n Answer: Difficulty: Reference: L.O.:

18.

C Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

B Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

In the three tier architecture, the software on the client computer is responsible for the ____________. a. b. c. d. e.

presentation logic application logic data access logic data storage application storage

Answer: Difficulty: Reference: L.O.:

A Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


19.

An N-tiered architecture: a. is generally more “scalable” than a three-tiered architecture b. is generally less “scalable” than a three-tiered architecture c. uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d. uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e. puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers Answer: Difficulty: Reference: L.O.:

20.

One disadvantage of the ____________ architecture is that places a greater load on the network. a. b. c. d. e.

two-tier three tier one-tier n-tier layered

Answer: Difficulty: Reference: L.O.:

21.

A Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

D Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

A “thin client” architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network Answer: Difficulty: Reference: L.O.:

D Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


22.

A “thick client” architecture approach: a. always is a two-tier network architecture b. always is an n-tiered architecture c. places all or almost all of the application logic on the client d. places all or almost all of the application logic on the server e. refers to the size of the cable connecting the clients to the network Answer: Difficulty: Reference: L.O.:

23.

With the “thin client” architecture, when an application changes, only the _________ with the application logic needs to be updated. a. client b. server c. middleware d. hardware e. software Answer: Difficulty: Reference: L.O.:

24.

C Easy Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

B Medium Application Architectures Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

The idea for a special hypertext network, called the World Wide Web, was conceived of by: a. Microsoft in 1994 as part of the Windows 95 project b. Tim Berners-Lee at the European Laboratory for Particle Physics (CERN) in 1989 c. Vinton Cerf, for the U.S. Department of Defense in 1969 as a network of four computers called ARPANET d. Howard Flieshman of IBM in 1982 as part of the development of the IBM PC e. the University of Minnesota as an extension of Gopher Answer: Difficulty: Reference: L.O.:

B Easy World Wide Web Understand how the Web works


25.

Marc Andreessen led a team that developed the first graphical Web browser, which was called: a. Internet Explorer b. Mosaic c. Firebird d. Netscape Navigator e. Mozilla Answer: Difficulty: Reference: L.O.:

26.

To interact with the World Wide Web, a client computer needs an application layer software package called a: a. Web browser b. Web server c. Telnet package d. Uniform Resource Locator package e. Router package Answer: Difficulty: Reference: L.O.:

27.

B Easy World Wide Web Understand how the Web works

A Easy World Wide Web Understand how the Web works

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a. b. c. d. e.

browser application web web server operating system none of the above

Answer: Difficulty: Reference: L.O.:

C Easy World Wide Web Understand how the Web works


28.

To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library Answer: Difficulty: Reference: L.O.:

29.

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a. b. c. d. e.

Hypertext Transfer Protocol File Transfer Protocol Simple Mail Transfer Protocol Internet Message Access Protocol Hyperlink Transfer Protocol.

Answer: Difficulty: Reference: L.O.: 30.

A Medium World Wide Web Understand how the Web works

There are optional and required parts of an HTTP request. They are: a. request address, request body b. request address, request header, request body c. request line, request header d. request line, request body e. request line, request header, request body Answer: Difficulty: Reference: L.O.:

31.

D Easy World Wide Web Understand how the Web works

E Medium World Wide Web Understand how the Web works

There are required and optional parts of an HTTP response. They are: a. response status, response header, response body b. response address, response header, response body c. response status, response body d. response address, response header e. response status, response header Answer: Difficulty: Reference: L.O.:

A Medium World Wide Web Understand how the Web works


32.

A response status code of 404 means: a. b. c. d. e.

the requested page was not found the server is currently unavailable the sever is currently busy your browser is incompatible with the Web server software. your browser needs to be updated to the latest version.

Answer: Difficulty: Reference: L.O.: 33.

The acronym, HTML, refers to: a. Header Markup Language b. Hypertext Markup Locator c. Hypertext Markup Language d. Hypertext Markup Library e. Hypertext Modulating Language Answer: Difficulty: Reference: L.O.:

34.

C Easy World Wide Web Understand how the Web works

Which of the following is not an advantage of instant messaging? a. It usually takes days for an IM message to be delivered to the recipient. b. It allows real time typed messages to be exchanged. c. Some products are ICQ and AOL Instant Messenger. d. It is generally faster than snail-mail. e. It helps people avoid telephone tag. Answer: Difficulty: Reference: L.O.:

35.

A Easy World Wide Web Understand how the Web works

A Easy Other Applications Be aware of how Telnet and instant messaging works

The most commonly used e-mail standard is: a. Simple Mail Transfer Protocol b. X.400 c. CMC d. Post Office Protocol e. Telnet Answer: A Difficulty: Easy Reference: Electronic Mail L.O.: Understand how email works


36.

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a. message transfer agent b. router agent c. mail user agent d. Webcast package e. gateway agent Answer: Difficulty: Reference: L.O.:

37.

Which of the following is not an example of a mail user agent software package? a. b. c. d. e.

Outlook Express Microsoft Word Eudora Microsoft Outlook All of these are mail user agent packages

Answer: Difficulty: Reference: L.O.:

38.

C Medium Electronic Mail Understand how email works

B Medium Electronic Mail Understand how email works

Another term for a mail user agent is: a. message transfer agent b. router agent c. e-mail client d. Webcast package e. Web client Answer: Difficulty: Reference: L.O.:

C Easy Electronic Mail Understand how email works


39.

IMAP (Internet Message Access Protocol): a. is a set of standards that define how email is to be processed between mail servers b. is exactly the same as SMTP c. copies an e-mail message from the client computer’s hard disk, deletes it from the client, and stores it on the mail server d. is exactly the same as POP e. permits an e-mail message to remain stored on the mail server even after they have been read by a client computer Answer: Difficulty: Reference: L.O.:

E Easy Electronic Mail Understand how email works

40.

In a ___________ architecture, computers are both client and server, thus sharing the work. a. Host-based b. Client-based c. Client-server d. Peer-to-peer e. Network Answer: D Difficulty: Medium Reference: Application Architectures L.O.: Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

41.

The acronym, MIME, refers to: a. Multimedia Internet Mail Enterprise b. Multiple Internet Media Extension c. Multipurpose Internet Mail Extension d. Media Internet Mail Extension e. Multimedia Internet Mime Extension Answer: Difficulty: Reference: L.O.:

42.

C Easy Electronic Mail Understand how email works

One of the most frequently used Telnet applications is a. WS-FTP b. PuTTY c. Outlook d. Word e. FTP Answer: Difficulty: Reference: L.O.:

B Medium Other Applications Be aware of how Telnet and instant messaging works


43.

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a. hashing b. encryption c. authentication d. identification e. compression Answer: Difficulty: Reference: L.O.:

44.

Which of the following is not true about Telnet? a. Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b. Telnet poses no security threat. c. Telnet was designed in the early days of the Internet. d. Keystrokes are sent over the network in clear text. e. One program that conforms to the Telnet standard is PuTTY. Answer: Difficulty: Reference: L.O.:

45.

E Medium Other Applications Be aware of how Telnet and instant messaging works

B Medium Other Applications Be aware of how Telnet and instant messaging works

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a. b. c. d. e.

broadcasting instant messaging webcasting H.323 Net Meeting.

Answer: Difficulty: Reference: L.O.:

C Medium Other Applications Be aware of how Telnet and instant messaging works

46. In a host-based system with a mainframe, upgrades to the host are _____________. a. Small b. Cheap c. Lumpy d. Never going to happen e. Always performed annually Answer: C Difficulty: Easy Reference: Application Architecture


L.O. :

Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

47. The software that runs on the mail server is referred to as the ____________ a. Mail transfer agent b. Mail user agent c. Microsoft Outlook d. Web server e. SMTP Answer: Difficulty: Reference: L.O.:

A Easy Electronic Mail Understand how email works

48. The standards H.320, H.323, and MPEG-2 are commonly used with a. Telnet b. Videoconferencing c. Email d. IM e. Microsoft Office Answer: B Difficulty: Medium Reference: Other Applications L.O.: Be aware of how Telnet and instant messaging works 50. The ________________ cloud deployment model provides the highest levels of control, privacy and security. a. private b. public c. community d. hybrid Answer: Difficulty: Reference: L.O. :

A Easy Application Architecture Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

51. The ________________ clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer. a. private b. public c. community d. hybrid Answer: Difficulty: Reference:

C Easy Application Architecture


L.O. :

Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures

52. With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a. private clouds b. hardware clouds c. storage services d. IaaS Answer: Difficulty: Reference: L.O. :

D Easy Application Architecture Understand host-based, client-based, client-server, cloud-based, and peer-to-peer application architectures


Essay and Short Answer Questions 1. Describe the history of the Internet and the Web (part of this is in Chapter 1, part in Chapter 2). Where do you forsee the future evolution of the Internet heading, and why? 2. What do the following tools enable you to do: the Web, email, Telnet, IM? 3. How can the Internet be used for competitive advantage in business? Describe three firms which are using the Internet for conducting business, and speculate as to the underlying technologies which might be in use in these firms. Will the Internet become an essential business tool like the telephone or will it go the way of the dinosaurs? What do you envision the Internet and web becoming in the future for businesses? Discuss. 4. For what is HTTP used? What are its major parts? Are all required? 5. For what is HTML used? What are its major parts? Are all required? 6. Describe how a Web browser and Web server work together to send a web page to a user. 7. Describe how mail user agents and message transfer agents work together to transfer mail messages, including a diagram. 8. Describe the difference between a two tier and three tier email message transfer, using diagrams and discussing how this approach differs from the two layer email transfer. Do users always require the same architecture for email? Why or why not? Discuss. 9. What is MIME? What does it stand for? Why was it developed? 10. What are the standards SMTP, POP, and IMAP? What roles do SMTP, POP, and IMAP play in sending and receiving email on the Internet? What do these acronyms stand for? 11. What are the major parts of an email message? 12. What is X.400 and CMC? 13. What is cloud computing and how is it useful? 14. What is Telnet and why is it useful? 15. What is IM? How does it work?


17. Discuss the functions of a web browser. Describe two web browsers. What was the first graphical Web browser? What are three search engines that you might use to find information on the Internet? 18. What are the three major parts of an HTTP request and what information does each part contain? Why does HTTP include a version number as part of the packet? 19. What do a user agent and message transfer agent do in an SMTP/IMAP email system? What are some examples of user agent packages? 20. Describe a two-tier, three-tier and n-tier architecture. What is a network architecture? Compare and contrast two-tiered, three-tiered, and n-tiered client server architectures. What are the technical differences and what advantages and disadvantages do each offer? How does a two-tier client server network differ from an n-tier client server network. Describe one advantage and one disadvantage that a three-tier architecture has compared to a two-tier architecture. 21. What are the advantages and disadvantages of host-based networks versus clientserver networks? Explain two major benefits and/or limitations of client-server networks compared to host-based networks. 22. What is middleware and what does it do? 23. Suppose your organization was contemplating switching from a host-based architecture to client-server. What problems would you foresee? 24. Compare private, public, and community cloud architectures.


Chapter 3 Physical Layer True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided in square brackets. The level of difficulty (easy, medium, and hard) and the page number(s) relevant to the topic are also furnished. 1.

2.

3.

4.

5.

6.

A physical circuit refers to the transmission characteristics of the connection, such as the speed at which data is being sent through the connection. Answer: False Difficulty: Easy Reference: Introduction L.O.: Be familiar with the different types of network circuits and media Computers produce digital data whose values are binary: 0 or 1. Answer: True Difficulty: Easy Reference: Introduction L.O.: Understand digital transmission of digital data With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer. Answer: False Difficulty: Medium Reference: Introduction L.O.: Be familiar with analog and digital modems Digital transmission produces more errors than analog transmission. Answer: False Difficulty: Easy Reference: Introduction L.O.: Understand digital transmission of digital data Newer telephone circuits, built during the last decade, offer higher quality because they were built using analog transmission. Answer: False Difficulty: Easy Reference: Introduction L.O.: Understand analog transmission of digital data In a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network. Answer: Difficulty: Reference: L.O.:

False Easy Circuits Be familiar with the different types of network circuits and media


7.

In a multipoint circuit configuration, each computer can use the circuit at the same time.

8.

Answer: False Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media In simplex transmission, the data flows in both directions at the same time

9.

Answer: False Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media A walkie-talkie is an example of half-duplex transmission.

10.

Answer: True Difficulty: Medium Reference: Circuits L.O.: Be familiar with the different types of network circuits and media The amount of time it takes to switch between sending and receiving in half-duplex transmission is called the propagation delay.

11.

Answer: False Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media In full-duplex transmission, two stations can send and receive simultaneously.

12.

Answer: True Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media The medium is the physical matter or substance that carries the voice or data transmission.

13.

Answer: True Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Guided media refers to the type of media in which the message is broadcast through the air.

14.

Answer: False Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable. Answer: Difficulty: Reference: L.O.:

False Medium Communication Media Be familiar with the different types of network circuits and media


15.

Fiber optic cable carries signals in traditional electrical form.

16.

Answer: False Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Multimode fiber is capable of longer transmission distances than single mode fiber.

17.

Answer: False Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency.

18.

Answer: True Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media WDM is a version of FDM used in fiber-optic cables.

19.

Answer: True Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Microwave transmissions require a line of sight between any two points.

20.

Answer: True Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Propagation delay is negligible with satellite transmission.

21.

22.

Answer: False Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media One form of interference with satellite transmission is called raindrop attenuation in which the transmissions are absorbed by heavy rain. Answer: True Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Fiber optic cable can only be used on LANs. Answer: Difficulty: Reference: L.O.:

False Easy Communication Media Be familiar with the different types of network circuits and media


23.

Radio, microwave and satellite are all examples of guided media.

24.

Answer: False Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Of all the media available, fiber optic provides the highest transmission speeds.

25.

Answer: True Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Coding schemes are groups of bits that translate into the “alphabet” of any given system.

26.

Answer: True Difficulty: Easy Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data ASCII is the least popular code for data communications.

27.

Answer: False Difficulty: Easy Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data The predominant method of transferring information internally in a computer is via parallel mode.

28.

Answer: True Difficulty: Easy Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Serial mode transmission is much faster than parallel mode transmission.

29.

Answer: False Difficulty: Easy Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Nonreturn to zero is a type of unipolar signaling

30.

Answer: False Difficulty: Medium Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data With nonreturn to zero signaling, the voltage alternates between zero and a positive or negative voltage. Answer: Difficulty: Reference: L.O.:

False Easy Digital Transmission of Digital Data Understand digital transmission of digital data


31.

32.

33.

Ethernet, a common LAN technology, uses Manchester encoding. Answer: True Difficulty: Easy Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Manchester encoding is a special type of bipolar signaling in which the signal is changed from high to low or from low to high in the middle of the signal. Answer: True Difficulty: Medium Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.

34.

Answer: False Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Frequency is the number of cycles per second and is expressed in Hertz.

35.

Answer: True Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Amplitude, frequency and phase are all characteristics of a sound wave.

36.

Answer: True Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Frequency modulation refers to the changing of the height of the sound wave.

37.

Answer: False Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Baud rate is the number of bits transmitted per second.

38.

Answer: False Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Signal bandwidth is the difference between the highest and lowest frequencies in a band. Answer: Difficulty: Reference: L.O.:

True Easy Analog Transmission of Digital Data Understand analog transmission of digital data


39.

40.

41.

42.

Data compression can increase the throughput of a communication link. Answer: True Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data A codec converts an incoming digital signal to an analog signal for transmission over an analog network. Answer: False Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data One way to reduce quantizing errors is to increase the sampling rate of the analog signal. Answer: True Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data The “local loop” refers to the wires that run from the customer premises to the telephone switch of the telephone company.

43.

Answer: True Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data Multiplexing increases the cost of provisioning network circuits.

44.

Answer: False Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data Frequency division multiplexing divides the circuit into a set of different time slots.

45.

Answer: False Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data Time division multiplexing is more efficient that frequency division multiplexing because the guardbands used in the frequency division multiplexing or not needed. Answer: Difficulty: Reference: L.O.:

True Medium Digital Transmission of Analog Data Understand digital transmission of analog data


46.

Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.

47.

Answer: True Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data Wavelength division multiplexing can only used with copper cables.

48.

Answer: False Difficulty: Easy Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data Digital transmission permits higher maximum transmission rates when compared to analog.

49.

50.

Answer: True Difficulty: Easy Reference: Introduction L.O.: Understand digital transmission of digital data Multitasking means to break one high-speed physical communication circuit into several lower-speed logical circuits so that different devices can simultaneously use it. Answer: False Difficulty: Easy Reference: Data Flow L.O.: Be familiar with multiplexing Based on the TIA/EIA 568-B structured cabling standard, the cabling that runs from the telecommunications closet to each work area is called backbone cabling. Answer: False Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, and hard) and the page number(s) relevant to the topic is also furnished.


1.

2.

3.

4.

Data is physically transmitted from one computer or terminal to another in the ________ layer. a. physical b. transport c. application d. terminal e. data link Answer: A Difficulty: Easy Reference: Introduction L.O.: Be familiar with the different types of network circuits and media ____________ refers to the transmission characteristics of the circuit. a. handshaking b. virtual circuit c. bonding d. logical circuit e. physical circuit Answer: D Difficulty: Easy Reference: Introduction L.O.: Be familiar with the different types of network circuits and media Two fundamentally different types of data are: a. DSL and ADSL b. asymmetric and symmetric c. Microsoft and IBM d. digital and analog e. local area and wide area Answer: D Difficulty: Easy Reference: Introduction L.O.: Be familiar with the different types of network circuits and media In general, networks designed to transmit primarily computer data are likely to be ________. a. international b. level 1 c. numeric d. analog e. digital Answer: Difficulty: Reference: L.O.:

E Easy Introduction Be familiar with the different types of network circuits and media


5.

6.

7.

8.

In general, older networks and local loops designed to transmit voice data are likely to be ________. a. international b. level 2 c. numeric d. digital e. analog Answer: E Difficulty: Easy Reference: Introduction L.O.: Be familiar with the different types of network circuits and media Which of the following is not a key advantage of digital transmission? a. It permits only low transmission rates. b. It is more efficient. c. It is simpler to integrate voice, video, and data on the same circuit. d. It is more secure. e. It produces fewer errors. Answer: A Difficulty: Medium Reference: Introduction L.O.: Understand digital transmission of digital data _________ is the basic physical layout of the circuit. a. point-to-point configuration b. configuration c. circuit configuration d. circuit design e. circuit plan Answer: C Difficulty: Medium Reference: Circuits L.O.: Be familiar with the different types of network circuits and media A(n) __________ circuit is another name for a multipoint configuration. a. analog b. dedicated c. point-to-point d. shared e. simplex Answer: Difficulty: Reference: L.O.:

D Medium Circuits Be familiar with the different types of network circuits and media


9.

10.

11.

12.

Which is not true about point-to-point circuits? a. point-to-point circuits are dedicated to the use of the two computers. b. point-to-point circuits are more expensive than multipoint circuits. c. point-to-point circuits are called dedicated circuits. d. point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits. e. point-to-point circuits are used when the computers generate enough traffic to fill the capacity of the communication circuit. Answer: D Difficulty: Medium Reference: Circuits L.O.: Be familiar with the different types of network circuits and media Having a conversation with someone using a cellular phone is an example of _________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital Answer: B Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission. a. simplex b. full-duplex c. half-duplex d. analog e. digital Answer: C Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media The two basic types of media are: a. statistical and frequency b. guided and wireless (radiated) c. local and wide area d. attenuator and Gaussian e. duplexed and non-duplexed Answer: Difficulty: Reference: L.O.:

B Easy Communication Media Be familiar with the different types of network circuits and media


13.

14.

15.

16.

Which of the following would be considered a type of wireless media? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. microwave e. fiber optics Answer: D Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media The type of media usually installed on homes and businesses by the telephone company is called ____________. a. fiber optic cable b. coaxial cable c. twisted pair d. phone cable e. phone wire Answer: C Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media The earliest type of fiber optic systems were: a. Graded index multimode b. Attenuated c. Multimode d. Single mode e. Step mode Answer: C Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Another term for the weakening of a signal over distance is: a. turnaround time b. propagation delay c. dispersion d. insulation e. attenuation Answer: Difficulty: Reference: L.O.:

E Medium Communication Media Be familiar with the different types of network circuits and media


17.

___________ refers to the spreading of the signal that different parts of the signal arrive at different times at the destination. a. b. c. d. e.

18.

19.

20.

turnaround time propagation delay dispersion insulation attenuation

Answer: C Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Which of the following media can best withstand harsh environmental conditions? a. shielded twisted pair b. unshielded twisted pair c. Cat 5 twisted pair d. coaxial cable e. fiber optic cable Answer: E Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media __________ is a line-of-sight type of wireless media. a. coaxial cable b. microwave c. radio d. twisted pair e. fiber optic Answer: B Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media _____________ can be thought of as dividing the circuit horizontally. a. Frequency division multiplexing b. Statistical frequency division multiplexing c. Statistical time division multiplexing d. Time division multiplexing e. Wavelength division multiplexing Answer: Difficulty: Reference: L.O.:

A Medium Circuits Be familiar with multiplexing


21.

22.

23.

24.

Microwave transmission: a. is a type of high frequency radio communication b. requires a clear line-of-sight path c. is typically used for long distance data transmission d. does not require the laying of any cable e. all of the above Answer: E Difficulty: Easy Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media ______________ refers to the time it takes for a signal to travel from sender to recipient (highly exaggerated with satellite transmission). a. Line-of-sight effect b. Multimode index c. Saturation effect d. Raindrop attenuation e. Propagation delay Answer: E Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Which of the following is not an important factor to consider when selecting media to be used in a network? a. prestige value of the type of media b. type of network c. cost d. transmission distance e. security Answer: A Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Which of the following is the most secure wired media? a. coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared Answer: Difficulty: Reference: L.O.:

D Medium Communication Media Be familiar with the different types of network circuits and media


25.

26.

27.

28.

Which of the following media has the lowest error rates and the highest transmission speeds? a. Coaxial cable b. unshielded twisted pair c. shielded twisted pair d. fiber optic cable e. infrared Answer: D Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media Transmission speeds: a. are the same among all media b. are not a factor in selecting a media because all media have more than enough speed to serve current communication demands c. are a constant, 56Kbps, for all media types d. differ widely among media e. always have a direct correlation with security Answer: D Difficulty: Medium Reference: Communication Media L.O.: Be familiar with the different types of network circuits and media A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters. a. 256 b. 20 c. 200 d. 512 e. 1024 Answer: E Difficulty: Medium Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data ____________ is one of the most commonly used coding schemes used in data transmission. a. ASCII b. ISDN c. MAU d. ATM e. FDM Answer: Difficulty: Reference: L.O.:

A Easy Digital Transmission of Digital Data Understand digital transmission of digital data


29.

30.

31.

32.

The representation of the character A by the group of 8 bits, 01000001, is an example of: a. digital coding b. phase modulation c. binary modulation d. analog transmission e. pitch variation Answer: A Difficulty: Medium Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data When all bits of a character are transferred one after another, the bits are transferred in ___________ mode. a. serial b. frequency division c. multiplexing d. parallel e. full complex Answer: A Difficulty: Medium Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Which of the following statements is correct? a. Parallel transmission is most often used for sending data on a circuit that is made up of one wire. b. Parallel transmission is distinguished from serial transmission by the fact that the transmitting device sends a single bit, then a second bit, and so on, until all the bits are transmitted. c. Parallel transmission is only used for analog data. d. Serial transmission is slower than parallel transmission. e. Parallel transmission is the same as serial transmission. Answer: D Difficulty: Medium Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data ___________ is not a type of digital signaling technique. a. Non-return-to-zero signaling b. Unipolar signaling c. Manchester encoding d. Return-to-zero signaling e. Data rate signaling Answer: Difficulty: Reference: L.O.:

E Medium Digital Transmission of Digital Data Understand digital transmission of digital data


33.

34.

35.

36.

With which type of digital signaling does the signal always return to zero volts after each bit? a. Non-return-to-zero signaling b. Unipolar signaling c. Return-to-zero signaling d. Data rate signaling e. Huffman encoding signal Answer: C Difficulty: Easy Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Which type of digital signaling would experience fewer errors because it has more distinct signals? a. unipolar b. serial c. bipolar d. attenuation e. Huffman encoding signal Answer: C Difficulty: Hard Reference: Digital Transmission of Digital Data L.O.: Understand digital transmission of digital data Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals? a. phase b. attenuation c. bipolar d. bandwidth e. codec Answer: A Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data The direction in which the sound wave begins is known as: a. amplitude, which our ears detect as loudness b. frequency, which our ears detect as pitch c. phase d. bandwidth e. furlong Answer: Difficulty: Reference: L.O.:

C Medium Analog Transmission of Digital Data Understand analog transmission of digital data


37.

38.

39.

40.

The height of a sound wave is called its: a. frequency b. phase c. amplitude d. bandwidth e. furlong Answer: C Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data _____________ is not a form of modulation used to transform digital data into analog signals. a. synchronous time division b. amplitude shift keying c. amplitude modulation d. frequency modulation e. phase modulation Answer: A Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data ____________ refers to changing the shape of the sound wave in different ways to represent a 1 or a 0. a. digitizing. b. sampling c. modulation d. demodulation e. shaping Answer: C Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data With respect to converting digital data into analog signals, AM stands for: a. Asynchronous Manchester b. Analog Multimode c. Amplitude Modulation d. Anomaly Multiplexing e. Analytical Mosaic Answer: Difficulty: Reference: L.O.:

C Medium Analog Transmission of Digital Data Understand analog transmission of digital data


41.

42.

43.

44.

In which type of modulation is a 1 distinguished from a 0 by shifting the direction in which the wave begins? a. bandwidth modulation b. amplitude modulation c. frequency modulation d. phase modulation e. codec modulation Answer: D Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data When sending four bits at a time using frequency modulation, the number of different frequency levels that would be needed would be _______. a. 24 b. 16 c. 2 d. 8 e. 4 Answer: B Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data ____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol. a. quadrature amplitude modulation b. time division multiplexing c. synchronous digital line control d. pulse code modulation e. baseband signaling Answer: A Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data The _____________ of a circuit determines a circuit’s capacity. a. frequency b. bandwidth c. phase d. amplitude e. loudness Answer: Difficulty: Reference: L.O.:

B Medium Analog Transmission of Digital Data Understand analog transmission of digital data


45.

46.

47.

48.

The typical range of human hearing is: a. 0 to 4,000 Hz b. 0 to 1,200 Hz c. 20 to 14,000 Hz d. 0 to 300 Hz e. 0 to 56,000 Hz Answer: C Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is : a. 890 Hz b. 8900 HZ c. 9100 Hz d. 9Khz e. 890 KHz Answer: C Difficulty: Hard Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data To get more “bandwidth” in a digital transmission, you must: a. increase the range of frequencies available for a transmission b. increase the loudness per transmission c. decrease the bits per second transmission speed d. increase the phase shifts per transmission e. decrease the baud rate per transmission Answer: A Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Which of the following statements is true? a. the longer the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire b. the shorter the distance of a telephone wire between sender and recipient, the lower the bandwidth across that wire c. bandwidth is constant across any wire, therefore distance is not relevant to its capacity d. the longer the distance of a telephone wire between sender and recipient, the higher the bandwidth across that wire e. bandwidth is not a term that can be used when discussing telephone transmissions Answer: Difficulty: Reference: L.O.:

C Hard Analog Transmission of Digital Data Understand analog transmission of digital data


49.

50.

51.

52.

The acronym, Modem, stands for _________________. a. multiplexing/demultiplexing b. more/demote c. Mode-M technique d. modulator/demodulator e. Mod emulation technique Answer: D Difficulty: Easy Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data ______ is a modem standard that uses Lempel-Ziv encoding to compress data. a. V.22 b. V.44 c. V.32bis d. V.34 e. RS 232 Answer: B Difficulty: Medium Reference: Analog Transmission of Digital Data L.O.: Understand analog transmission of digital data Equipment used to transform analog voice signals to digital signals and digital signals to analog signals. a. voice converter b. modem c. codec d. multiplexer e. demodulator Answer: C Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data _____________ refers to the difference between the original analog data and the approximation of that data using the techniques for translating from analog data to digital signals. a. quantizing error b. handshaking phase c. modulating frequency d. POTS anomaly e. amplitude Trellis effect Answer: Difficulty: Reference: L.O.:

A Medium Digital Transmission of Analog Data Understand digital transmission of analog data


53.

54.

55.

56.

When converting analog voice data to digital signals, Pulse Code Modulation typically samples the incoming voice signal _______ times per second. a. 8,000 b. 8 c. 18,000 d. 64 e. 256 Answer: A Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data How many bits are required to sample an incoming signal 4000 times per second using 64 different amplitude levels? a. 64 b. 32 c. 16 d. 8 e. 6 Answer: E Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data If each sample uses 16 bits and the number of samples taken each second is 8000; then the transmission speed on the circuit is? a. 128 Kbps b. 64 Kbps c. 12800 bps d. 96 Kbps e. 32000 bps Answer: A Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs. a. transponder b. multiplexer c. inverse multiplexer d. codec e. intelligent terminal Answer: Difficulty: Reference: L.O.:

B Medium Circuits Be familiar with multiplexing


57.

____________ is used by IM and other applications that provide voice services over lowerspeed digital circuits. a. b. c. d. e.

58.

59.

60.

pulse code modulation adaptive differential pulse code modulation Voice conversation code modulation phase modulation

Answer: B Difficulty: Medium Reference: Digital Transmission of Analog Data L.O.: Understand digital transmission of analog data The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a: a. wavelength division multiplexer b. time division multiplexer c. statistical time division multiplexer d. frequency division multiplexer e. statistical frequency division multiplexer Answer: A Difficulty: Medium Reference: Circuits L.O.: Be familiar with multiplexing Frequency division multiplexing: a. operates by statistically time slicing the signal b. operates by dividing the signal into different frequencies c. uses a codec that divides signals into different channels d. operates by time slicing the signal e. operates by light dividing the signal Answer: B Difficulty: Easy Reference: Circuits L.O.: Be familiar with multiplexing Time (non-statistical) division multiplexing differs from frequency division multiplexing because it: a. does not share a communication circuit b. splits the communication circuit vertically (with time slots) instead of horizontally c. increases the wavelength and phase angles of the baseband frequency used for transmission d. moves the baseband of a circuit by shifting it to a higher frequency e. reduces baseband signal velocity more than frequency division multiplexing Answer: Difficulty: Reference: L.O.:

B Medium Circuits Be familiar with multiplexing


61.

62.

63.

A _________ is an FDM device that splits the physical circuit into three logical circuits (phone, upstream data, downstream data). a. DSL modem b. cable modem c. wireless router d. V.44 modem e. Serial modem Answer: A Difficulty: Medium Reference: Circuits L.O.: Be familiar with multiplexing When you send an email from the US to Europe, it likely is transmitted from one continent to another through one of the ______ that connect America and Europe. a. submarine cables b. satellites c. telephone lines d. boats e. modems Answer: A Difficulty: Easy Reference: Circuits L.O.: Be familiar with the different types of network circuits and media The room that contains the cable termination points and the distribution frames is referred to as a. telecommunications closet b. equipment room c. building entrance d. backbone room e. work area Answer: A Difficulty: Medium Reference: Circuits L.O.: Be familiar with the different types of network circuits and media


Essay and Short Answer Questions 1. Define analog, and then describe the conversion from analog to digital using a four step method (sampling, measuring, quantizing and coding), and present a detailed diagram like the one which in the slides. What is quantizing error and how can it be lessened in some situations? Draw a sketch of quantizing error in your model. 2. Describe the three types of data flows, and discuss why some are applicable in some situations and vice versa. 3. Describe three types of guided media. Give an example, describe what it looks like and how it works, and why it might be used in a scenario of a network. 4. Describe four types of radiated media. Give an example, describe what it looks like and how it works, and why it might be used in a scenario of a network. 5. What is the term used to describe the placing of two or more signals on a single circuit? 6. What is the purpose of multiplexing? How does it work? Multiplexing usually is done in multiples of _______ ? Of the different types of multiplexing, what distinguishes a. this)

Frequency division multiplexing (FDM)? (describe and draw a sketch of

b.

Time division multiplexing (TDM)? (describe and draw a sketch of this)

c. Statistical time division multiplexing (STDM)? (describe and draw a sketch of this) d.

Wavelength division multiplexing (WDM)? (describe)

7. If you were buying a multiplexer, why would you choose either TDM or FDM? 8. Describe two ways in which Statistical Time Division Multiplexing (STDM) differs from Time Division Multiplexing (TDM). 9. Compare and contrast Frequency Division Multiplexing (FDM) and Wavelength Division Multiplexing (WDM). 10. Under what circumstances would you use a microwave circuit rather than a satellite circuit?


11. Explain two reasons why the use of twisted pair cable is becoming more common than the use of coax cable? 12. How does analog data differ from digital data? 13. Clearly explain the differences between analog data, analog transmission, digital data, and digital transmission. 14. Define digital data. Explain why most networks are now digital. Why is digital transmission superior to analog? Give five reasons. 15. What is coding? Briefly describe the two most important coding schemes. 16. How is data transmitted in parallel? What feature distinguishes serial mode from parallel mode? 17. How does bipolar signaling differ from unipolar signaling? Why is Manchester encoding more popular than either? What kind of signaling is used in Ethernet? 18. What are the three important characteristics of a sound wave? 19. Describe how data could be transmitted using amplitude modulation. 20. Describe how data could be transmitted using frequency modulation. 21. Describe how data could be transmitted using phase modulation. 22. Describe how data could be transmitted using a combination of modulation techniques. 23. Is the bit rate the same as the symbol rate? Explain. 24. What is a modem? How does a modem send digital data on an analog network, explaining the process step by step? 25. Describe two common modem standards. 26. Why is data compression so useful? Describe how it works. 27. What is the typical sampling network in telephony? Why is a higher sampling rate more effective for sound quality? 28. What is the difference between multiplexing and modulation? Why are each important?


29. Compare and contrast data rate (i.e., bits per second) and symbol rate (also called baud rate) by giving two concrete, different examples. 30. Describe the six subsystems of TIA/EIA 568-B.


Chapter 4 Data Link Layer True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided in square brackets. The level of difficulty (easy, medium, and hard) and the page number(s) relevant to the topic are also furnished. 1.

2.

3.

4.

Media access controls refer to the need to control when computers transmit. Answer: True Difficulty: Easy Reference: Media Access Control L.O.: Understand the role of the data link layer The data link layer accepts messages from the network layer and controls the hardware that transmits them. Answer: True Difficulty: Medium Reference: Introduction L.O.: Understand the role of the data link layer Only the sender of a data transmission needs to be concerned about the rules or protocols that govern how it communicates with the receiver. Answer: False Difficulty: Easy Reference: Introduction L.O.: Understand the role of the data link layer Most computer networks managed by a host mainframe computer use contention media access control. Answer: Difficulty: Reference: L.O.:

5.

False Medium Media Access Control Become familiar with two basic approaches to controlling access to the media Polling is the process of permitting all clients to transmit or receive at any time. Answer: Difficulty: Reference: L.O.:

False Medium Media Access Control Become familiar with two basic approaches to controlling access to the media


6.

With roll-call polling, a server polls clients in a consecutive, pre-arranged priority list. Answer: Difficulty: Reference: L.O.:

7.

True Easy Media Access Control Become familiar with two basic approaches to controlling access to the media Token passing is a term that refers to hub polling, in which one computer starts a poll and passes it to the next computer on a multipoint circuit. Answer: Difficulty: Reference: L.O.:

8.

9.

True Easy Media Access Control Become familiar with two basic approaches to controlling access to the media With contention, a computer does not have to wait before it can transmit. A computer can transmit at anytime. Answer: False Difficulty: Medium Reference: Media Access Control L.O.: Become familiar with two basic approaches to controlling access to the media Contention is commonly used with Ethernet local area networks. Answer: Difficulty: Reference: L.O.:

10.

True Easy Media Access Control Become familiar with two basic approaches to controlling access to the media Controlled access MAC approaches work better in a large network with high usage. Answer: Difficulty: Reference: L.O.:

11. 12.

13.

True Easy Media Access Control Become familiar with two basic approaches to controlling access to the media

The two categories of network errors are: lost data and delimited data. Answer: False Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention If a computer transmits a message containing “ABC” and the destination computer receives “abc” as the message, the message is corrupted. Answer: Difficulty: Reference: L.O.:

True Medium Error Control Become familiar with common sources of error and their prevention


14.

Data transmission errors are typically uniformly distributed in time.

15.

Answer: False Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Undesirable stray electrical voltage can cause data communication errors.

16.

Answer: True Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Gaussian noise is a special type of attenuation.

17.

Answer: False Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Impulse noise is caused by the thermal agitation of electrons.

18.

19.

20.

21.

Answer: False Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Crosstalk occurs when the signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Answer: True Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Attenuation refers to the loss of signal strength. Answer: True Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention When the signals from two circuits combine to form a new signal that falls into a frequency band reserved for another signal, this is called intermodulation noise. Answer: True Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Ethernet has been refined over the years and is now formally standardized as IEEE802.3ac. Answer: Difficulty: Reference: L.O.:

True Easy Data Link Protocols Become familiar with several commonly used data link protocols


22.

23.

24.

25.

The distance between repeaters or amplifiers on a telephone circuit is determined by the amount of power gained per unit length of the transmission. Answer: False Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention When we amplify the signal on an analog circuit, we also amplify any noise that is present on the circuit. Answer: True Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention For effective error detection and correction, extra error detection “data” must be included with each message Answer: True Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention In an odd parity-checking scheme, the parity bit is set to make the total number of ones in the byte (including the parity bit) an even number.

26.

Answer: False Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Parity checking can only detect an error when an even number of bits are switched.

27.

Answer: False Difficulty: Medium Reference: Error Control L.O.: Become familiar with common sources of error and their prevention Cyclical redundancy check is one of the most popular polynomial error-checking schemes.

28.

Answer: True Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention The simplest method for error correction is retransmission. Answer: Difficulty: Reference: L.O.:

True Easy Error Control Become familiar with common sources of error and their prevention


29.

Another term for stop-and-wait ARQ is sliding window.

30.

Answer: False Difficulty: Easy Reference: Error Control L.O.: Become familiar with common sources of error and their prevention One type of forward error correction is the Hamming code.

31.

Answer: True Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods Forward error correction is commonly used in satellite transmission.

32.

Answer: True Difficulty: Easy Reference: Error Control L.O.: Understand three common error detection and correction methods HDLC is very similar to the SDLC synchronous data link protocol.

33.

34.

Answer: True Difficulty: Medium Reference: Data Link Protocols L.O.: Become familiar with several commonly used data link protocols Overhead bits are used for error checking and marking the start and end of characters and packets. Answer: True Difficulty: Easy Reference: Transmission Efficiency L.O.: Understand the role of the data link layer Transmission efficiency refers to the percentage of bits transmitted without errors. Answer: Difficulty: Reference: L.O.:

False Medium Transmission Efficiency Understand the role of the data link layer

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, and hard) and the page number(s) relevant to the topic is also furnished.


1.

2.

3.

4.

As part of the five-layer network model used in this textbook, the data link layer sits directly between: a. the physical and the application layers b. the network and the application layers c. the network and transport layers d. the physical and the application layers e. the physical and the network layers Answer: E Difficulty: Easy Reference: Introduction L.O.: Understand the role of the data link layer Which of the following is true with respect to the data link layer? a. It accepts streams of bits from the application layer. b. It is responsible for encoding the bit-stream as a series of electronic voltages. c. It performs error detection. d. It performs routing functions. e. It organizes data from the physical layer and passes these coherent messages directly to the application layer. Answer: C Difficulty: Medium Reference: Introduction L.O.: Understand the role of the data link layer ____________ is not a function of a data link protocol. a. Media access control b. Message delineation c. Amplitude shift keying d. Indicating when a message starts and stops e. Error control Answer: C Difficulty: Medium Reference: Introduction L.O.: Understand the role of the data link layer Media access control: a. is not very important in point-to-point with full duplex configuration b. is not very important in local area networks c. is not very important in a point-to-point with a half duplex configuration d. is not very important in a multipoint configuration e. does not control when computers transmit Answer: Difficulty: Reference: L.O.: media

A Easy Media Access Control Become familiar with two basic approaches to controlling access to the


5.

6.

7.

Which of the following is not a controlled access method of media access control? a. Token passing b. CSMA/CD c. polling d. roll call polling e. hub polling Answer: B Difficulty: Easy Reference: Media Access Control L.O.: Become familiar with two basic approaches to controlling access to the media ________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive. a. Contention b. Polling c. Pooling d. Carrier sense e. CRC Answer: B Difficulty: Medium Reference: Media Access Control L.O.: Become familiar with two basic approaches to controlling access to the media Which of the following is true about roll call polling? a. It can not be modified to increase priority of clients or terminals. b. It does not require a server or host or special device that performs the polling. c. It is also called token passing. d. It is a type of contention approach to media access control. e. It typically involves some waiting because the server has to wait for a response from the polled client or terminal. Answer: Difficulty: Reference: L.O.: media

E Medium Media Access Control Become familiar with two basic approaches to controlling access to the


8.

With contention: a. computers wait until the circuit is free before they send data b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media c. the front end processor must wait for a response from the polled client or terminal d. one computer starts the poll and passes it to the next computer on the multipoint circuit e. there is never a chance for “collision,” or two computers trying to send data at the same time

9.

Answer: A Difficulty: Easy Reference: Media Access Control L.O.: Become familiar with two basic approaches to controlling access to the media In general, controlled approaches: a. work better than contention approaches for small networks that have low usage b. work better than contention approaches for large networks that have high usage c. work better than contention approaches for all sizes of networks d. do not require a host, server, or active monitor to assign media access control e. have many collisions

10.

Answer: B Difficulty: Medium Reference: Media Access Control L.O.: Become familiar with two basic approaches to controlling access to the media In a _________ , more than one data bit is changed by the error-causing condition. a. burst error b. data rate shift c. Trellis-coded modulation d. uniform distribution e. amplitude key shift

11.

Answer: A Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods Errors on a network can occur: a. only on dial-up type of circuits b. because of noise on the line c. only on poorly maintained networks d. only due to Gaussian noise e. only due to lightning strikes Answer: Difficulty: Reference: L.O.:

B Medium Error Control Understand three common error detection and correction methods


12.

13.

14.

15.

The two sublayers of the data link layer consist of the media access control sublayer and the________ . a. logical link control sublayer b. network control sublayer c. session sublayer d. physical sublayer e. transport sublayer Answer: A Difficulty: Medium Reference: Introduction L.O.: Understand the role of the data link layer Which of the following media is least susceptible to noise? a. fiber optic cable b. coaxial cable c. twisted pair d. unshielded twisted pair e. shielded twisted pair Answer: A Difficulty: Easy Reference: Error Control L.O.: Understand three common error detection and correction methods Optical media is: a. more likely to suffer from noise than electrical media b. has about the same likelihood of suffering from noise as electrical media c. has about the same likelihood of suffering from noise as coaxial cable d. less likely to suffer from noise than electrical media e. more prone to noise than twisted pair media Answer: D Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods ____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission. a. Contracted bits b. Polled bits c. Inverse multiplexed bits d. Flipped bits e. Bit delineation Answer: Difficulty: Reference: L.O.:

D Medium Error Control Understand three common error detection and correction methods


16.

17.

18.

19.

Another term for impulse noise is: a. Gaussian noise b. spikes c. attenuation d. cross-talk e. intermodulation noise Answer: B Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods The familiar background static on radios and telephones is called: a. echoes b. intermodulation noise c. impulse noise d. cross-talk e. white noise Answer: E Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods The primary source of error in data communications is: a. echoes b. intermodulation noise c. spikes d. attenuation e. cross-talk Answer: C Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods __________can obliterate a group of bits, causing a burst error. a. Cross-talk b. Attenuation c. Impulse noise d. Intermodulation noise e. White noise Answer: Difficulty: Reference: L.O.:

C Medium Error Control Understand three common error detection and correction methods


20.

21.

22.

23.

Cross-talk: a. occurs when one circuit picks up signals in another b. is always bothersome because it has a high signal strength c. decreases with increased proximity of two wires d. decreases during wet or damp weather e. increases with lower frequency signals Answer: A Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods When a signal is reflected back to the transmitting equipment, it is called a(n) _________. a. white noise b. echo c. crosstalk d. attenuation e. impulse noise Answer: B Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods The loss of power a signal suffers as it travels from the transmitting computer to a receiving computer is: a. white noise b. spiking c. attenuation d. intermodulation noise e. echo Answer: C Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods If a signal with a frequency of 500 MHz combines with a another signal of 1500 MHz and they form a new signal of 2000 MHz; this is an example of: a. intermodulation noise b. attenuation c. echo d. white noise e. cross-talk Answer: Difficulty: Reference: L.O.:

A Medium Error Control Understand three common error detection and correction methods


24.

25.

26.

27.

_____________ is an effective way to prevent impulse noise, cross talk, and intermodulation noise. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters to a circuit d. Adding amplifiers to a circuit e. Shorting a circuit Answer: A Difficulty: Easy Reference: Error Control L.O.: Understand three common error detection and correction methods _____________ is an effective way to prevent attenuation. a. Shielding wires b. Adding fluorescent lights c. Adding repeaters or amplifiers to a circuit d. Changing multiplexing techniques e. Shorting a circuit Answer: C Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods Which of the following is way to reduce or eliminate crosstalk on a circuit? a. physically separating the cables from other communication cables b. adding repeaters or amplifiers to a circuit c. reducing the length of the cable d. adding fluorescent lights e. shorting a circuit Answer: A Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods On digital circuits, we use _________ to reshape the incoming signal and prevent attenuation. a. amplifiers b. repeaters c. multiplexers d. digitizers e. modems Answer: Difficulty: Reference: L.O.:

B Medium Error Control Understand three common error detection and correction methods


28.

29.

Which of the following is not an error detection method used in the data link layer? a. parity checking b. cyclic redundancy checking c. CRC-32 d. pulse code checking e. odd parity Answer: D Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods With odd parity (assume that the parity bit (in bold) has been placed at the end of each of the following) and a 7-bit ASCII code, which of the following is incorrect? a. b. c. d. e.

30.

31.

01101011 00011011 00100101 10110110 11111110

Answer: B Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods The probability of detecting an error, given that one has occurred, using parity checking is about: a. 100% b. 0% c. 50% d. 75% e. 98% Answer: C Difficulty: Easy Reference: Error Control L.O.: Understand three common error detection and correction methods Using parity, the probability for detecting an error, given that one has occurred, is: a. about 50% for either even or odd parity b. about 70% for even parity and 30% for odd parity c. about 30% for even parity and 70% for odd parity d. about 0% for either even or odd parity e. about 100% for either even or odd parity Answer: Difficulty: Reference: L.O.:

A Medium Error Control Understand three common error detection and correction methods


32.

33.

34.

35.

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about: a. 75% b. 0% c. exactly 100% d. 50% e. > 99% Answer: E Difficulty: Easy Reference: Error Control L.O.: Understand three common error detection and correction methods ARQ means that: a. a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error b. the common carrier Automatically Returns Queries to the subscriber upon receipt of such queries c. a sender is using a data link protocol called Asynchronous Repeating reQuest d. a fiber optic cable meets the American Registered Quality, a certification standard for use in high-quality data communication transmission lines e. a sender is using a parity scheme called Array Resource Quality Answer: A Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods In ARQ, a NAK: a. is sent by the recipient if the message was received without error b. is sent by the sender at the same time as it sends a data packet c. is sent by the recipient if the message contains an error d. refers to non-asynchronous Kermit technique e. means that the sender should continue with sending the next message Answer: C Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods Stop-and-wait ARQ uses ___________ type of data flow. a. full simplex b. half complex c. full duplex d. half duplex e. full complex Answer: Difficulty: Reference: L.O.:

D Medium Error Control Understand three common error detection and correction methods


36.

37.

38.

39.

With __________ ARQ, the sender pauses for a response from the receiver to alter each message or packet of data. a. open window b. halt and be recognized (HBR) c. sliding window d. stop and wait e. continuous Answer: D Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods With __________ ARQ, the sender immediately sends the next message or packet of data. a. continuous b. immediate c. open window d. stop-and-wait e. halt and be recognized (HBR) Answer: A Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods ______________ controls errors by detecting and correcting them at the receiving end without retransmission of the original message. a. Hamming code b. Huffman encoding c. Front end processing d. Wave division multiplexing e. Hub polling Answer: A Difficulty: Medium Reference: Error Control L.O.: Understand three common error detection and correction methods Asynchronous transmission: a. is used to transmit each character simultaneously with all other characters b. has a pre-determined, fixed time between sending characters c. is typically used on multipoint half duplex circuits d. uses a continuous series of start bits as an idle signal e. each character is transmitted independently of all other characters Answer: Difficulty: Reference: L.O.:

E Medium Data Link Protocols Become familiar with several commonly used data link protocols


40.

41.

42.

43.

Which of the following is not a type of synchronous protocol? a. SDLC b. VT100 c. HDLC d. Ethernet e. PPP Answer: B Difficulty: Medium Reference: Data Link Protocols L.O.: Become familiar with several commonly used data link protocols Synchronous transmission: a. cannot be used on multipoint circuits b. is used to send one character at a time c. uses start bits before each character to be sent d. uses stop bits after each character to be sent e. is used to transmit a “frame” or “packet” of data at a time Answer: E Difficulty: Medium Reference: Data Link Protocols L.O.: Become familiar with several commonly used data link protocols Which of the following is true about the data link protocol, SDLC: a. It is a client-server protocol developed by Compaq in 1996. b. It transmits each character independently of one another and includes start and stop bits for each character sent. c. It uses a special bit pattern called a flag at the beginning and end of every frame (or packet). d. It uses a contention media access control protocol and is used in most LANs today. e. It does not have any error detection capabilities. Answer: C Difficulty: Medium Reference: Data Link Protocols L.O.: Become familiar with several commonly used data link protocols Which of the following is true about the data link protocol, Ethernet (IEEE 802.3)? a. it is not very popular b. it is a bit-oriented protocol c. it uses block check characters for error detection d. newer version permits jumbo frames e. it uses parity bits for error detection Answer: Difficulty: Reference: L.O.:

D Medium Data Link Protocols Become familiar with several commonly used data link protocols


44.

45.

46.

47.

Which of the following is true about the data link protocol, PPP? a. it is commonly used in WANs b. it is a bit-oriented protocol c. it uses block check characters for error detection d. it was developed in the 1960s e. it uses parity bits for error detection Answer: A Difficulty: Medium Reference: Data Link Protocols L.O.: Become familiar with several commonly used data link protocols In communication protocols, _________ are used to convey the user’s meaning. a. information bits b. overhead bits c. stop bits d. start bits e. flag bits Answer: A Difficulty: Medium Reference: Data Link Protocols L.O.: Become familiar with several commonly used data link protocols _________________ is defined as the total number of information bits divided by the total number of bits in the transmission. a. Asynchronous rate b. Protocol percentage c. Throughput d. Transmission Rate of Information Bits e. Transmission efficiency Answer: E Difficulty: Medium Reference: Transmission Efficiency L.O.: Understand the role of the data link layer Calculating the actual throughput of a data communication network is: a. not normally required for synchronous networks because they are so fast b. complex because many factors affect throughput c. simple because packet size is the primary factor affecting throughput d. not needed for satellite-based networks e. far less complicated if the system operates on a contention basis Answer: Difficulty: Reference: L.O.:

B Easy Transmission Efficiency Understand the role of the data link layer


48.

TRIB, an acronym that relates to throughput, stands for: a. Throughput Reduction of Information Barriers b. Transmission Rate of Information Bits c. Throughput Rate of Iso-synchronous Bytes d. Transmission Regulation for Inverse-multiplexing Bands e. Trellis-coded Regulation of Information Bits Answer: Difficulty: Reference: L.O.:

B Medium Transmission Efficiency Understand the role of the data link layer


Essay and Short Answer Questions 1. What does the data link layer do? What are its primary responsibilities? Where does the data link layer sit in terms of the simplified five layer network model? 2. What is media access control and why is it important? What are two examples of controlled access methods and contention based media access methods? When might one access method be preferred over another in a network, and why? Under what conditions do contention-based media access control techniques outperform controlled-access techniques (i.e., have lower response time)? Explain. 3. Compare and contrast roll call polling, hub polling (or token passing), and contention. Which is better, hub polling or contention? Explain. 4. Errors normally appear in ______________________________, which is when more than one data bit is changed by the error-causing condition. Is there any difference in the error rates of lower speed lines and of higher speed lines? What kinds of lines are more prone to errors? 5. Briefly define noise. Describe five types of noise and the underlying causes of this noise. Which type of noise is likely to pose the greatest problem to network managers? What does error look like in a data network? 6. How do amplifiers differ from repeaters? 7. What are three ways of reducing errors and the types of noise they affect? 8. Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations. 9. Briefly describe how even parity and odd parity work. Give an example of even parity with a 7-bit ASCII code, for the following: 0110110, using a 0 start bit and a 1 stop bit. 10. How does cyclical redundancy checking work? 11. How does forward error correction work? How is it different from other error correction methods? Under what circumstances is forward error correction desirable? What is one type of forward error correction by name? Given a diagram like that in the text of forward error correction, be able to explain how the system works. 12. Compare and contrast stop-and-wait ARQ and continuous ARQ.


13. Describe from a high level perspective the packet layout for SDLC, Ethernet, and PPP. 14. What is transparency? 15. What is transmission efficiency? How do information bits differ from overhead bits? What are three issues which might effect packet throughput rates? Which is better for file transfer, large packet sizes or small packet sizes? 16. What is asynchronous transmission v. synchronous transmission? Describe one protocol of each type. 17. Think about a recent world impact event and how useful the technologies of communications might have been related to helping people impacted by that event (Hurricane Katrina, Pakistan earthquakes, or some other large world event). How might telecom have a positive role in large scale human events? Use insight gained from the technological underpinnings provided in the course. Be creative.


Chapter 5 Network and Transport Layers True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided . The level of difficulty (easy, medium, hard) and the page number(s) relevant to the topic are also furnished.

1.

2.

3.

4.

5.

TCP/IP is a data link protocol that is used on the Internet. Answer: False Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The network layer sits directly between the application layer and the data link layer in the Internet five-layer network model. Answer: False Difficulty: Easy Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management The network layer is responsible for end-to-end delivery of the message. Answer: False Difficulty: Easy Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management The transport layer routes messages thought the network selecting the best path from the source to the destination station. Answer: False Difficulty: Easy Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer Answer: True Difficulty: Medium Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management


6.

TCP is the network layer protocol used on the Internet today.

7.

Answer: False Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols IP is responsible for error-free delivery of packets on a TCP/IP network.

8.

Answer: False Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The TCP portion of TCP/IP performs linking to the application layer.

9.

10.

11.

12.

Answer: True Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to. Answer: False Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. Answer: True Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits. Answer: False Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application layer port addresses to distinguish among many open applications on a computer Answer: True Difficulty: Medium Reference: Transport Layer Functions L.O.: Be aware of the TCP/IP protocols


13.

14.

15.

16.

17.

18.

19.

Source port address is the logical address generated by the application layer on the source computer to identify the application, which is sending the data. Answer: True Difficulty: Easy Reference: Transport Layer Functions L.O.: Be aware of the TCP/IP protocols The standard port number for Telnet is 53. Answer: False Difficulty: Easy Reference: Transport Layer Functions L.O.: Be familiar with addressing Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller packets. Answer: True Difficulty: Medium Reference: Transport Layer Functions L.O.: Be aware of the TCP/IP protocols Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver. Answer: False Difficulty: Medium Reference: Transport Layer Functions L.O.: Be aware of the TCP/IP protocols TCP/IP operates only as connection-oriented. Answer: False Difficulty: Medium Reference: Transport Layer Functions L.O.: Be aware of the TCP/IP protocols Quality of Service routing is a special type of connection-oriented routing in which different connections are assigned different priorities. Answer: True Difficulty: Easy Reference: Transport Layer Functions L.O.: Be familiar with routing An example of an application layer address is www.indiana.edu Answer: True Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing


20.

21.

22.

23.

24.

25.

26.

The network layer address for IP is ten bytes long when using IPv4. Answer: False Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing The data link layer address is generally encoded in a network card by the card’s manufacturer. Answer: True Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet. Answer: False Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. Answer: True Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing The most common standard for dynamic addressing for TCP/IP networks is Dynamic Host Control Protocol. Answer: True Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing Translating an application layer address to a network layer address and finally to a data link layer address is called address resolution. Answer: True Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing Part of the function of address resolution is translating the application layer address of the destination into a network layer address. Answer: True Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing


27.

28.

29.

30.

Domain Name Servers provide the equivalent of directory assistance for application layer addresses. Answer: True Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address. Answer: True Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient. Answer: True Difficulty: Easy Reference: Routing L.O.: Be familiar with routing There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing.

31.

Answer: False Difficulty: Medium Reference: Routing L.O.: Be familiar with routing When using dynamic routing, routing decisions are always made by a central host or server.

32.

Answer: False Difficulty: Easy Reference: Routing L.O.: Be familiar with routing A hop in a routing calculation is defined as one link or circuit.

33.

Answer: True Difficulty: Easy Reference: Routing L.O.: Be familiar with routing An autonomous system is a network operated by one organization. Answer: True Difficulty: Easy Reference: Routing L.O.: Be familiar with routing


34.

35.

36.

A routing protocol used inside an autonomous system is called an exterior routing protocol. Answer: False Difficulty: Easy Reference: Routing L.O.: Be familiar with routing Enhanced Interior Gateway Routing Protocol is a dynamic link state interior routing protocol developed by Cisco. Answer: True Difficulty: Medium Reference: Routing L.O.: Be familiar with routing A multicast message can be used to send a message to a maximum of two other computers.

Answer: False Difficulty: Medium Reference: Routing L.O.: Be familiar with routing 37. Connections on a router, to the Internet and other routers for example, are called applications. Answer: False Difficulty: Easy Reference: Routing L.O.: Be familiar with routing

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the page number(s) relevant to the topic are also furnished.

1.

The ____________ layer links the application layer with the network layer is responsible for end-to-end delivery of messages. a. physical b. transport c. session d. presentation e. data link Answer: B Difficulty: Easy Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management


2.

__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller packets e. interfacing with the network layer

3.

Answer: C Difficulty: Medium Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management _______ is the dominant network protocol today. a. SDLC b. SNA c. IPX/SPX d. TCP/IP e. X.25

4.

Answer: D Difficulty: Easy Reference: Introduction L.O.: Be familiar with linking to the application layer, segmenting, and session management Transmission Control Protocol/Internet Protocol was developed for ________ in 1974. a. ARPANET b. IBM c. Hewlett-Packard d. University of Minnesota e. Xerox Answer: Difficulty: Reference: L.O.:

5.

A Easy Introduction Be familiar with linking to the application layer, segmenting, and session management

TCP/IP: a. is the least commonly used network protocol for LANs because it cannot be combined with Ethernet b. performs packetizing, as well as routing and addressing functions c. is not very efficient and is prone to errors d. is compatible with only one type of data link protocol, SDLC e. refers to Telephone Control Procedures/Inter-exchange Procedures Answer: B Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols


6.

7.

8.

9.

A typical TCP packet has a _______ header of control information. a. 32-bit b. 64-bit c. 160-bit d. 192-bit e. 32-byte Answer: D Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The source destination port identifier tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer. Answer: C Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols TCP uses _____________ so that the destination station can reassemble the packets into the correct order. a. IP addresses b. sequence numbers c. port numbers d. packet numbers e. reassembly value Answer: B Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The older version of IP has a ________ header of control information. a. 128-bit b. 192-bit c. 1024-bit d. 160-bit e. 320-bit Answer: B Difficulty: Easy Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols


10.

IP: a. b. c. d. e.

11.

12.

13.

performs packetizing functions does not have a header is currently in use with only one packet form or structure performs routing functions performs error control functions

Answer: D Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols The newer form of IP, version 6 (Ipv6): a. Is running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header

Answer: C Difficulty: Medium Reference: Transport and Network Layer Protocols L.O.: Be aware of the TCP/IP protocols Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the: a. data link layer address b. port address c. application layer address d. network address e. IP address Answer: B Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management The transport layer must break messages from the application layer into several _____ that can be sent to the data link layer. a. bits b. bytes c. frames d. packets e. strings Answer: D Difficulty: Easy Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management


14.

15.

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request Answer: D Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management A TCP connection is established in the ___________ routing method. a. asynchronous b. connection-oriented c. frequency division d. application net e. connectionless Answer: B Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management

16.

_____________ routing is a method of routing in which each packet makes its own way through the network. a. Frequency division b. Connection-oriented c. PCMCIA d. Connectionless e. Application net Answer: D Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management


17.

18.

Which of the following is not a protocol used at the application layer. a. HTTP b. SMTP c. FTP d. Telnet e. UDP Answer: E Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management ______________ routing is most commonly used when the application data or message can fit into one single packet. a. Frame-oriented b. Connection-oriented c. Connectionless d. Physical-oriented e. Byte-oriented

19.

Answer: C Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management UDP is not commonly used for: a. network management control messages b. RIP messages c. DHCP addressing messages d. HTTP requests e. routing control messages

20.

Answer: D Difficulty: Medium Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management With QoS routing different __________ are defined, each with different priorities. a. classes of service b. domain names c. application layer addresses d. data link layer addresses e. classes of Internet addresses Answer: A Difficulty: Easy Reference: Transport Layer Functions L.O.: Be familiar with linking to the application layer, segmenting, and session management


21.

22.

23.

24.

An application layer address using TCP/IPv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. user@cba.uga.edu d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3 Answer: B Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing A client computer is assigned a data link layer address is by: a. hardware manufacturers b. software manufacturers c. middleware manufacturers d. network managers who configure a file in a computer’s network layer software package e. ISO Answer: A Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing ICANN: a. developed the IPX/SPX network layer protocol b. assigns data link layer addresses c. approves which network layer addresses (usually, approved or assigned in groups or classes) can be used by an organization for its computers that will connect to the Internet d. developed X.25 network layer protocol e. refers to Interchange Computer Addressing Networks and Nodes Answer: C Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8 Answer: D Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing


25.

26.

27.

28.

IPv4 uses ________ bytes per Internet address. a. 4 b. 32 c. 8 d. 24 e. 16 Answer: A Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net Answer: B Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255 Answer: D Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing Dynamic addressing: a. assigns a permanent network layer address to a client computer in a network b. makes network management more complicated in dial-up networks c. has only one standard, bootp d. is always performed for servers only e. can solve many updating headaches for network managers who have large, growing, changing networks Answer: E Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing


29.

30.

31.

32.

___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service coding Answer: C Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service Answer: E Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing When TCP/IP translates an application layer address into an IP address, it sends a special __________ to the nearest DNS server. a. broadcast message b. DNS request packet c. SNA packet d. IPX message e. X.25 packet Answer: B Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet Answer: D Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing


33.

34.

35.

36.

_________ is a specially formatted request used to perform IP address to data link address resolution. a. Address Resolution Protocol b. Domain Service Request c. HTTP request d. Link state request e. Autonomous System Request Answer: A Difficulty: Medium Reference: Addressing L.O.: Be familiar with addressing ___________ is the process of determining the path that a message will travel from sending computer to receiving computer. a. Routing b. Addressing c. Interfacing d. Broadcasting e. Packetizing Answer: A Difficulty: Medium Reference: Routing L.O.: Be familiar with routing The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table Answer: A Difficulty: Medium Reference: Routing L.O.: Be familiar with routing In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column. a. linking loader b. routing table c. configuration listing d. bus header assignment list e. file allocation table Answer: B Difficulty: Medium Reference: Routing L.O.: Be familiar with routing


37.

38.

39.

40.

The three fundamental approaches to routing are: a. circuitous, flat, and direct routing b. connectionless, static, and connection-oriented c. subordinate, master, and insubordinate routing d. host, client, and client-server routing e. centralized, static routing, and dynamic routing Answer: E Difficulty: Medium Reference: Routing L.O.: Be familiar with routing An advantage of centralized routing is: a. routing does reflect changing network conditions, such as computers that are overloaded by many messages b. if anything happens to the computer developing the routing table, the routing tables cannot be changed until that computer is fixed, or until a new computer is selected to perform the function c. routing decisions are simple d. the routing tables are stored at all computers in the network e. it requires more processing by each computer or router in the network than dynamic routing Answer: C Difficulty: Medium Reference: Routing L.O.: Be familiar with routing With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. a. circuitous b. decentralized c. distance vector d. indirect e. link state Answer: C Difficulty: Medium Reference: Routing L.O.: Be familiar with routing ____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing Answer: C Difficulty: Medium Reference: Routing L.O.: Be familiar with routing


41.

42.

43.

44.

_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing Answer: D Difficulty: Easy Reference: Routing L.O.: Be familiar with routing One drawback to dynamic routing is: a. Routing usually does not reflect changing network conditions, such as computers that are overloaded by many messages b. It cannot be used with non-government networks c. The transmission of status information “wastes” network capacity that could be used to send user messages d. It is the job of the network manager, not the computers or devices themselves, to maintain the routing table. e. It requires less processing by each computer than static routing. Answer: C Difficulty: Medium Reference: Routing L.O.: Be familiar with routing The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First Answer: B Difficulty: Medium Reference: Routing L.O.: Be familiar with routing A type of message that is used when sending a message from one computer to another computer is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message Answer: A Difficulty: Easy Reference: Routing L.O.: Be familiar with routing


45.

46.

47.

48.

A special type of message that is used when sending the same message to a specific group of computers is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message Answer: B Difficulty: Easy Reference: Routing L.O.: Be familiar with routing A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message Answer: C Difficulty: Easy Reference: Routing L.O.: Be familiar with routing IGMP refers to: a. Internet Giga Memory Parameters b. Interchange Group Management Parameters c. Internet Guided Meta Protocol d. Internet Group Management Protocol e. Interchange Guided Meta Protocol Answer: D Difficulty: Easy Reference: Routing L.O.: Be familiar with routing Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information? a. application layer address b. subnet mask c. its own IP address d. IP address of its DNS server e. IP address of a gateway, router, or a switch outside of its subnet

Answer: A Difficulty: Medium Reference: TCP/IP Example L.O.: Be familiar with addressing 49. Which of the following is not a component of a router? a. CPU b. Interface c. Memory


d. Keyboard e. Port Answer: D Difficulty: Easy Reference: Routing L.O.: Be familiar with routing 50. A majority of routers use the following operating system: a. Windows 95 b. Red Hat Linux c. Windows Server 2008 d. Cisco Internetwork Operating System e. Linksys OSI System Answer: D Difficulty: Easy Reference: Routing L.O.: Be familiar with routing 51. The ______ defines what type of packets should be routed and what types of packets should be discarded. a. ACL b. AFL c. TCP d. IOS e. OSI Answer: A Difficulty: Easy Reference: Routing L.O.: Be familiar with routing 52. _________created a service that allows organizations to transfer IPv4 addresses they don’t need to another organization. a. TCP/IP b. ARPANET c. ARIN d. AIS e. OSPF Answer: C Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing 53. IPv4 provides ___________ IP addresses. a. a. 4.3 billion b. b. 144 million c. c. 64 billion d. d. 3.14 billion e. e. 1 million Answer: A Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing


54. The _____ address range is reserved for a computer to communicate with itself and is called the loopback. a. 121 b. 127 c. 239 d. 254 e. 111 Answer: B Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing 55. IP addresses from 224 to 239 belong to Class D and are reserved for a. the government b. ISPs c. multicasting d. broadcasting e. private networks Answer: C Difficulty: Easy Reference: Addressing L.O.: Be familiar with addressing


Short Answer and Essay Questions 1. What does the network layer do? Where does it sit in relationship to the other four layers of our simplified network model? 2. What are the parts of TCP/IP and what do they do? Who is the primary user of TCP/IP? 3. Compare and contrast the three types of addresses used in a network. 4. What are the different classes of Internet addresses and how are they different? 5. What is a subnet and why do networks need them? What is a subnet mask? 6. How does dynamic addressing work? What benefits and problems does dynamic addressing provide? 7. What is address resolution? How does TCP/IP perform address resolution for network layer addresses? How does TCP/IP perform address resolution for data link layer addresses? 8. What is routing? How does decentralized routing differ from centralized routing? How does static routing differ from dynamic routing? When would you use static routing? When would you use dynamic routing? How does static routing differ from dynamic routing? When would you use static routing? When would you use dynamic routing? 9. What are the differences between connectionless and connection-oriented routing? Discuss this in detail. When might UDP be used? TCP? What is a virtual circuit? What is Quality of Service routing and why is it useful? 10. Compare and contrast unicast, broadcast, and multicast messages. Explain how multicasting works. 11. Explain how the client computer in the LAN figure in the book (Figure 5.15) would obtain the data link layer address of its subnet gateway. 12. Explain how TCP/IP works in a high level way, using a detailed diagram including the different roles of TCP vs. IP, and the times at which each function is utilized in the process. 13. List and describe five reasons why TCP/IP has become the predominant protocol for Internet level transport applications. What do you think is the future market share potential for proprietary standards? What are some limitations of TCP/IP in terms of future Internet growth capabilities?


14. What is a routing table? What is the simplest form of a routing table? 15. What is a virtual circuit? 16. Suppose a client computer wants to access a web page on a web server. Assume that it knows all of the IP addresses and data link layer addresses in the network, except those for the web server itself. Describe how the client would obtain the IP address for the web server. 17. What is ARP and how and why does it work? What is MAC address resolution and how does it work? 18. Suppose a client computer wants to access a web page on a web server. Assume that it knows all of the IP addresses and data link layer addresses in the network, except those for the web server itself. If the web server was on the same subnet as the client, how would the client obtain the data link layer address for the web server? 19. Under what conditions does decentralized dynamic routing provide better performance than decentralized static routing? 20. What is DHCP and why would network managers want to use it? 21. What four pieces of information does a computer using TCP/IP need in order to send messages using TCP/IP. Explain why each of these is required. 22. Suppose your manager asks you to discuss how the company’s backbone network functions in just about four paragraphs to take to senior management. How would you answer the question? Discuss two or three major points. Your manager doesn't understand technical terms so be sure to explain any jargon you use. 23. What is the difference between centralized routing and decentralized routing? What is the difference between static routing and dynamic routing? What is a distance vector algorithm and what is a link state algorithm? What is interior routing and what is exterior routing? Define and describe RIP, OSPF, EIGRP, BGP protocols using these terms. 24. Be able to convert back and forth between binary and decimal notation for IPv4 addresses. 25. Describe how Domain Name Server works and is hierarchically organized. What happens if a URL is not in a local DNS server? 26. List and describe the three ways that a network manager can connect to a router and configure and maintain it.


Chapter 6 Network Design True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic are also furnished. 1.

A key problem when designing data communications networks is how to adapt to new technologies while organizations change. Answer: Difficulty: Reference: L.O.:

2.

A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. Answer: Difficulty: Reference: L.O.:

3.

True Easy Introduction Describe the overall process of designing and implementing a network

Today, the most expensive part of the network is the hardware. Answer: Difficulty: Reference: L.O.:

6.

False Easy Introduction Describe the overall process of designing and implementing a network

Today, most network designers use a three to five year planning horizon. Answer: Difficulty: Reference: L.O.:

5.

True Easy Introduction Describe the overall process of designing and implementing a network

The traditional network design approach works very well for rapidly changing networks. Answer: Difficulty: Reference: L.O.:

4.

True Easy Introduction Describe the overall process of designing and implementing a network

False Easy Introduction Describe the overall process of designing and implementing a network

Today, many organizations design networks using the building-block approach. Answer: Difficulty: Reference: L.O.:

True Easy Introduction Describe the overall process of designing and implementing a network


7.

Needs analysis is the final step in the building block approach to network design. Answer: Difficulty: Reference: L.O.:

8.

In technology design, a network designer looks at available technologies to see which options will satisfy users’ needs. Answer: Difficulty: Reference: L.O.:

9.

True Easy Needs Analysis Describe the overall process of designing and implementing a network

The goal of the needs analysis step in network design is to develop a physical network design. Answer: Difficulty: Reference: L.O.:

13.

False Easy Needs Analysis Describe the overall process of designing and implementing a network

The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared. Answer: Difficulty: Reference: L.O.:

12.

True Easy Introduction Describe the overall process of designing and implementing a network

The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs. Answer: Difficulty: Reference: L.O.:

11.

True Easy Introduction Describe the overall process of designing and implementing a network

Cost assessment is used to look at the relative cost of technologies used in a network design. Answer: Difficulty: Reference: L.O.:

10.

False Medium Introduction Describe the overall process of designing and implementing a network

False Easy Needs Analysis Describe the overall process of designing and implementing a network

Today, all network traffic is due to traffic from internal application systems. Answer: Difficulty: Reference: L.O.:

False Easy Needs Analysis Understand the seven network architecture components


14.

Networks requirements can be divided into mandatory, desirable, and wish-list requirements. Answer: Difficulty: Reference: L.O.:

15.

Capacity planning is used to design circuit capacity. Answer: Difficulty: Reference: L.O.:

16.

True Easy Cost Assessment Understand network design principles

When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible. Answer: Difficulty: Reference: L.O.:

20.

True Medium Technology Design Understand network design principles

Cost assessment is the step in the network design in which many complex factors related to costs are documented. Answer: Difficulty: Reference: L.O.:

19.

False Medium Technology Design Describe techniques for developing a logical network design

Simulation is a tool that can be used in designing networks. Answer: Difficulty: Reference: L.O.:

18.

True Easy Technology Design Describe techniques for developing a logical network design

The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed. Answer: Difficulty: Reference: L.O.:

17.

True Medium Needs Analysis Describe techniques for developing a logical network design

False Easy Cost Assessment Describe the overall process of designing and implementing a network

The campus backbone is usually faster than the backbones used inside buildings. Answer: Difficulty: Reference: L.O.:

True Easy Introduction Understand the seven network architecture components


MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, difficult) and the section(s) relevant to the topic is also furnished.

1.

Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth. Answer: Difficulty: Reference: L.O.:

2.

B Medium Introduction Describe the overall process of designing and implementing a network

The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing Answer: Difficulty: Reference: L.O.:

B Easy Introduction Describe the overall process of designing and implementing a network


3.

Which of the following is not making the traditional design approach less appropriate for today’s networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware Answer: Difficulty: Reference: L.O.:

4.

Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 2GB of RAM, a 300 GB hard drive, and 2 Ghz processors. e. Multimedia applications on networks are becoming common. Answer: Difficulty: Reference: L.O.:

5.

E Medium Introduction Describe the overall process of designing and implementing a network

D Easy Introduction Describe the overall process of designing and implementing a network

Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities Answer: Difficulty: Reference: L.O.:

E Medium Introduction Describe the overall process of designing and implementing a network


6.

The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat Answer: Difficulty: Reference: L.O.:

7.

Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network Answer: Difficulty: Reference: L.O.:

8.

A Easy Introduction Describe the overall process of designing and implementing a network

Which of the following is not a step used in newer types of network design processes? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer Answer: Difficulty: Reference: L.O.:

9.

B Easy Introduction Describe the overall process of designing and implementing a network

C Easy Introduction Describe the overall process of designing and implementing a network

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: Difficulty: Reference: L.O.:

B Easy Introduction Describe the overall process of designing and implementing a network


10.

In __________, the network designer examines the available technologies and assesses which options will meet the users’ needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: Difficulty: Reference: L.O.:

11.

In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering Answer: Difficulty: Reference: L.O.:

12.

A Easy Introduction Describe techniques for developing a logical network design

D Easy Introduction Describe techniques for developing a logical network design

Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network Answer: Difficulty: Reference: L.O.:

D Medium Needs Analysis Understand network design principles


13.

In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue Answer: Difficulty: Reference: L.O.:

14.

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP Answer: Difficulty: Reference: L.O.:

15.

B Medium Needs Analysis Understand network design principles

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design Answer: Difficulty: Reference: L.O.:

16.

B Medium Needs Analysis Understand network design principles

E Easy Needs Analysis Understand network design principles

__________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization’s possible changes in product mix c. Understanding the organization’s strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization’s projections of sales Answer: Difficulty: Reference: L.O.:

A Medium Needs Analysis Understand network design principles


17.

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices Answer: Difficulty: Reference: L.O.:

18.

Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer Answer: Difficulty: Reference: L.O.:

19.

E Medium Needs Analysis Understand network design principles

A Easy Needs Analysis Describe techniques for developing a physical network design

Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network Answer: Difficulty: Reference: L.O.:

D Easy Needs Analysis Describe techniques for developing a physical network design


20.

Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center Answer: Difficulty: Reference: L.O.:

21.

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. technology design d. turnpike design e. backplane design Answer: Difficulty: Reference: L.O.:

22.

23.

E Easy Technology Design Describe techniques for developing a physical network design

C Easy Introduction Describe techniques for developing a logical network design

Which of the following is a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. 100 Mbps d. WAN e. SNA Answer: Difficulty: Reference: L.O.:

A Medium Technology Design Describe techniques for developing a physical network design

Answer: Difficulty: Reference: L.O.:

D Medium Technology Design Describe techniques for developing a logical network design

Estimating the size and type of the “standard” and “advanced” network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs


24.

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps Answer: Difficulty: Reference: L.O.:

25.

In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage Answer: Difficulty: Reference: L.O.:

26.

B Medium Technology Design Describe techniques for developing a physical network design

D Medium Technology Design Describe techniques for developing a logical network design

___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation Answer: Difficulty: Reference: L.O.:

A Easy Technology Design Describe techniques for developing a physical network design


27.

__________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer Answer: Difficulty: Reference: L.O.:

28.

To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node Answer: Difficulty: Reference: L.O.:

29.

A Medium Technology Design Describe techniques for developing a physical network design

According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20 Answer: Difficulty: Reference: L.O.:

30.

C Easy Technology Design Describe techniques for developing a physical network design

C Medium Technology Design Describe techniques for developing a physical network design

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan Answer: Difficulty: Reference: L.O.:

C Medium Technology Design Describe techniques for developing a physical network design


31.

There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement Answer: Difficulty: Reference: L.O.:

32.

________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users Answer: Difficulty: Reference: L.O.:

33.

D Medium Technology Design Describe techniques for developing a physical network design

Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system Answer: Difficulty: Reference: L.O.:

34.

A Medium Technology Design Describe techniques for developing a physical network design

A Medium Cost Assessment Describe techniques for developing a physical network design

Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers Answer: Difficulty: Reference: L.O.:

D Easy Cost Assessment Describe techniques for developing a physical network design


35.

To estimate costs for large network purchases, organizations often: a. purchase all network purchases ‘off the shelf’ b. obtain ‘book value’ information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors Answer: Difficulty: Reference: L.O.:

36.

RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol Answer: Difficulty: Reference: L.O.:

37.

A Medium Cost Assessment Describe the overall process of designing and implementing a network

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more Answer: Difficulty: Reference: L.O.:

38.

E Medium Cost Assessment Understand network design principles

A Easy Cost Assessment Describe the overall process of designing and implementing a network

Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on the growth in network use e. discuss SNA architecture Answer: Difficulty: Reference: L.O.:

D Easy Cost Assessment Describe the overall process of designing and implementing a network


39.

Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice Answer: Difficulty: Reference: L.O.:

40.

The large network purchases are done: a. before the vendor(s) are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendor(s) are selected d. after the vendor(s) are selected e. after the network has been implemented Answer: Difficulty: Reference: L.O.:

41.

D Medium Cost Assessment Describe the overall process of designing and implementing a network

The network architecture component which enables users to access the network is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN Answer: Difficulty: Reference: L.O.:

42.

B Easy Cost Assessment Describe the overall process of designing and implementing a network

A Medium Introduction Understand the seven network architecture components

The network architecture component that is sometimes referred to as the distribution layer is the a. LAN b. building backbone c. campus backbone d. enterprise edge e. WAN Answer: Difficulty: Reference: L.O.:

B Medium Introduction Understand the seven network architecture components


43.

The network architecture component which contains the organization’s servers is called the a. LAN b. building backbone c. data center d. enterprise edge e. WAN Answer: Difficulty: Reference: L.O.:

44.

The network architecture component that is a special LAN with a group of servers that enables electronic data exchange of between the organization and the external entities it does business with is called the a. LAN b. building backbone c. data center d. enterprise edge e. e-commerce edge Answer: Difficulty: Reference: L.O.:

45.

C Medium Introduction Understand the seven network architecture components

E Medium Introduction Understand the seven network architecture components

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) a. bottleneck b. building backbone c. breakneck d. congested network e. e-commerce edge Answer: Difficulty: Reference: L.O.:

A Medium Technology Design Understand network design principles


Short Answer and Essay Questions: 1. 2. 3. 4.

Describe the RFP process in detail. Describe the concept of linking the RFP to the vendor contract. Why is the RFP so important? Why is it important to “sell” a proposal to management? How should this be done? 5. In a quickly evolving network, which design method is recommended? Why? 6. Describe the tools that can be used in designing a network. 7. List and describe each of the seven network architecture components. 8. Describe the difference between a building backbone network and the campus backbone. 9. Compare and contrast the building-block network design process with the traditional network design process. 10. What are some of the considerations that network designers have when planning for circuit capacities across a LAN and backbones? 11. Describe some of the network design tools that can be helpful in the design process.


Chapter 7 Wired and Wireless LANs True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard) and the section relevant to the topic are also furnished. 1.

As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks. Answer: Difficulty: Reference: L.O.:

2.

3.

4.

5.

False Medium LAN Components Understand the major components of LANs

A Network Operating System (NOS), such as Linux or Windows Server 2008, must be used in addition to the ‘normal’ operating system, such as Windows, on a server in a dedicated server LAN. Answer: False Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs By offloading printing tasks from the main LAN server, a print server increases network efficiency. Answer: True Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs The Network Interface Card (NIC) permits a computer to be physically connected to a network’s cable, which provides the network layer connection among the computers in the network. Answer: False Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs LANs that run on radio frequencies use a type of wired media. Answer: Difficulty: Reference: L.O.:

False Easy LAN Components Understand the major components of LANs


6.

7.

8.

9.

10.

11.

12.

Fiber optic cable is thicker and heavier than unshielded twisted pair. Answer: False Difficulty: Easy Reference: LAN Components L.O.: Be able to design wired Ethernet LANs Many network hubs incorporate repeaters or amplifiers to regenerate signals so that attenuation of the signal does not occur. Answer: True Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs The NOS software for the server computer provides the physical, data link, and network layer functions. Answer: False Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs One of the most important functions of Network Operating System (NOS) is a directory service. Answer: True Difficulty: Easy Reference: LAN Components L.O.: Understand the major components of LANs LDAP is an industry standard directory protocol. Answer: True Difficulty: Easy Reference: LAN Components L.O.: Understand the major components of LANs A hardware device that is not included in a network profile cannot be accessed by another computer on the network. Answer: True Difficulty: Easy Reference: LAN Components L.O.: Understand the major components of LANs Network profile refers to what resources on each server are available on the network for use by other computers and which devices or people are allowed access on the network. Answer: Difficulty: Reference: L.O.:

True Medium LAN Components Understand the major components of LANs


13.

Traditional Ethernet is also known as shared Ethernet.

14.

Answer: True Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs Ethernet is a layer 3 protocol, which operates at the network layer.

15.

Answer: False Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs The Ethernet standard was developed first by the IEEE.

16.

17.

Answer: False Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs Topology refers to the geometric layout of the network and describes how the computers are interconnected. Answer: True Difficulty: Easy Reference: Wired Ethernet L.O.: Understand the major components of LANs A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.

18.

Answer: True Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs The three latest versions of Ethernet run at speeds of 1Gbps, 10Gbps, and 50 Gbps.

19.

Answer: False Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable.

20.

Answer: False Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs A switch always broadcasts all the packets it receives to all the computers that are connected to the switch. Answer: Difficulty: Reference: L.O.:

False Easy Wired Ethernet Understand the major components of LANs


21.

22.

23.

24.

25.

A forwarding table tells a switch which port it should send out a packet to get to the destination computer. Answer: True Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs When a switch receives a packet with a destination address that is not in its forwarding table, the switch will broadcast the packet to all of its ports. Answer: True Difficulty: Easy Reference: Wired Ethernet L.O.: Understand the major components of LANs Cut through switching has fewer errors than store and forward switching. Answer: False Difficulty: Easy Reference: Wired Ethernet L.O.: Understand the major components of LANs Store and forward switching cannot be used unless incoming and outgoing data circuit has the same data rate. Answer: False Difficulty: Easy Reference: Wired Ethernet L.O.: Understand the major components of LANs A switch can send and receive on all circuits simultaneously. Answer: Difficulty: Reference: L.O.:

True Easy Wired Ethernet Understand the major components of LANs

26.

Wireless LANs are never connected to a wire network.

27.

Answer: False Difficulty: Easy Reference: Wireless Ethernet L.O.: Understand the best practice recommendations for LAN design 802.11b is a faster wireless standard than 802.11a.

28.

Answer: False Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs The maximum data rate of 802.11b LANs is 12 Mbps. Answer: Difficulty: Reference: L.O.:

False Easy Wireless Ethernet Be able to design wireless Ethernet LANs


29.

30.

31.

An access point (AP) is required to connect a WLAN to a wired network. Answer: True Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs An access point ensures that all computers within range of the access point can communicate with each other, Answer: True Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 802.11b provides three separate channels for indoor use in the U.S. that can be used for communication between the access point and other wireless devices on the network. Answer: Difficulty: Reference: L.O.:

True Medium Wireless Ethernet Be able to design wireless Ethernet LANs

32.

Most access points (AP) deployed in wireless LANs use directional antennas.

33.

Answer: False Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs Directional antennas signals are much stronger than omnidirectional antennas.

34.

35.

Answer: True Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs Wireless LANs use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for medic access control. Answer: False Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before transmitting any more packets. Answer: Difficulty: Reference: L.O.:

True Medium Wireless Ethernet Be able to design wireless Ethernet LANs


36.

Point Coordination Function requires that each station that wishes to transmit on the wireless network sends a request-to-transmit (RTS) packet to the access point and waits for a clear-tosend (CTS) packet from the AP before it can communicate with other nodes on the network.

37.

Answer: True Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs The DCF function of Wi-Fi resolves the hidden node problem.

38.

Answer: False Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 802.11b LANs operate at speeds up to 11 Mbps. Answer: Difficulty: Reference: L.O.:

True Medium Wireless Ethernet Be able to design wireless Ethernet LANs

39.

The frequency ranges of some access points are the same as some cordless telephones.

40.

Answer: True Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 802.11a provides for speeds of up to 54 Mbps under perfect conditions.

41.

Answer: True Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs The maximum transmission speed of 802.11a LANs is 11 Mbps.

42.

Answer: False Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 802.11a LANs provide more channels than 802.11b LANs Answer: Difficulty: Reference: L.O.:

True Easy Wireless Ethernet Be able to design wireless Ethernet LANs


43.

It takes 802.11a more access points to provide the same coverage as one 802.11b access point. Answer: Difficulty: Reference: L.O.:

44.

An 802.11g NIC can communicate with an 802.11n access point. Answer: Difficulty: Reference: L.O.:

45.

47.

False Easy Wireless Ethernet Understand the best practice recommendations for LAN design

The data link layer protocols used by wireless LANs are similar to the ones used on Ethernet LANs Answer: True Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs Wireless LANs do not share the bandwidth capacity of the wireless network. Answer: Difficulty: Reference: L.O.:

48.

True Easy Wireless Ethernet Be able to design wireless Ethernet LANs

Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point. Answer: Difficulty: Reference: L.O.:

46.

True Easy Wireless Ethernet Understand the best practice recommendations for LAN design

False Easy Wireless Ethernet Be able to design wireless Ethernet LANs

A site survey is not an important component of a WLAN design. Answer: Difficulty: Reference: L.O.:

False Medium Wireless Ethernet Be able to design wireless Ethernet LANs


49.

50.

51.

Wired Equivalent Privacy requires that each user have a preconfigured key in order to communicate with an access point. Answer: True Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs Wi-Fi Protected Access (WPA) uses the same key for every packet that is transmitted to the client. Answer: False Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs Directional antennas produce a stronger signal over longer distances than omnidirectional antennas. Answer: Difficulty: Reference: L.O.:

True Medium Wireless Ethernet Be able to design wireless Ethernet LANs

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the page number(s) relevant to the topic is also furnished. 1.

A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server Answer: Difficulty: Reference: L.O.:

D Medium LAN Components Understand the major components of LANs


2.

3.

4.

5.

A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server Answer: C Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system Answer: B Difficulty: Easy Reference: LAN Components L.O.: Understand the major components of LANs Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber) Answer: E Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media Answer: Difficulty: Reference: L.O.:

C Medium LAN Components Understand the major components of LANs


6.

7.

8.

9.

Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above Answer: A Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair Answer: A Difficulty: Easy Reference: LAN Components L.O.: Understand the major components of LANs Hubs: a. usually incorporate repeaters or amplifiers b. have connection points called handles c. limit the distance of a network to a few meters in length d. are a difficult method to connect network cables e. operate at the application layer Answer: A Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs __________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables Answer: E Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs


10. _____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System Answer: A Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs 11. The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer’s own operating system Answer: A Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs 12. _____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services Answer: B Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs 13. A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint Answer: B Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs


14. A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________. a. ADS b. domain c. forest d. tree e. NDS Answer: C Difficulty: Medium Reference: LAN Components L.O.: Understand the major components of LANs 15. A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list Answer:

C

Difficulty:

Easy

Reference: LAN Components L.O.: Understand the major components of LANs 16. The cheapest time to install network cabling is: a. during the construction of the building b. as soon as the building is completed c. as soon as the building is occupied d. about five years after the building is occupied so that the exact office locations for each network computer is known e. any time that a network needs to be installed Answer: A Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 17. Ethernet LAN was developed by: a. IBM b. ARPANET c. DEC, Xerox, and Intel d. University of Minnesota e. CERN laboratory in Geneva Answer: C Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs


18. ___________ is how the network works conceptually. a. Physical topology b. Logical topology c. Network topology d. Ethernet e. Media access control Answer: B Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 19. The type of logical topology that Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected Answer: B Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 20. A logical bus topology: a. is always used by token ring protocol LANs b. has all computers connected to each other in point-to-point connections c. is limited to short distances since devices like a hub or repeater cannot be used with this type of topology d. permits every message to be received by every computer on the bus, even when those messages are intended for other computers e. has a central control device, such as a mainframe Answer: D Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 21. Media access control refers to: a. the price of fiber optic cable b. security over floppy disks in a user environment c. the ability for a user to use multimedia equipment in a LAN d. controlling access to a media by more than one computer in a LAN e. the control over coax cable installed by a cable service provider Answer: D Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs


22. Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit ‘listen’ before transmitting Answer: B Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 23. _________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet Answer: E Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 24. 10Base-T: a. supports 10 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct Answer: E Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 25. 1000 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 1000Base-SLCX Answer: A Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs


26. ________ is a hybrid version of Ethernet that uses either 10Base-T or 100Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100 Ethernet d. Token ring Ethernet e. FDDI Ethernet Answer: C Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 27. 10/100 Ethernet: a. uses 100 Mbps throughout the entire network b. is not useful in the short run for organizations that are uncertain about which Ethernet standard to use c. uses 10 Mbps throughout 100% of the entire network d. provides traditional 10 Mbps Ethernet connections to client computers utilizing traditional 10Base-T, with 100 Mbps generally used to the server e. uses 10 Gbps throughout 100% of the entire network Answer: D Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 28. Which of the following is not true about 10/100 Ethernet? a. It is not a hybrid type of Ethernet. b. It provides flexibility for organizations that want to use both the 10Base-T and 100Base-T standards at the same time. c. 10/100 autosense hubs (and/or switches) are able to detect the signal transmitted by the client’s NIC and use 10 Mbps or 100 Mbps, depending on what the client uses. d. Depending upon how it is configured, a 10/100 Ethernet NIC can run at either 10 Mbps or at 100 Mbps. e. It provides flexibility for organizations that are uncertain about which Ethernet standard to use in the short term. Answer: A Difficulty: Easy Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs 29. Switch-based Ethernet: a. uses a hub to connect computers b. has a physical topology of a ring c. has a logical topology of a ring d. has a logical topology of a bus e. usually enables all attached circuits to send or receive packets simultaneously Answer: E Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs


30. A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion Answer: B Difficulty: Easy Reference: Wired Ethernet L.O.: Understand the major components of LANs 31. Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to route the packet to the correct circuit/computer. e. The switch chooses which packet to transmit first if it receives more than one packet destined for the same computer at the same time, and stores the other packet(s) temporarily. Answer: B Difficulty: Medium Reference: Wired Ethernet L.O.: Understand the major components of LANs 32. Which of the following is not true about switched Ethernet? a. The switch has a physical bus topology. b. It uses a switch instead of a hub. c. It has faster connections (almost immediate) than traditional Ethernet. d. It essentially provides a point-to-point connection between computers. e. It has forwarding tables in which entries are learned over time. Answer: A Difficulty: Medium Reference: Wired Ethernet L.O.: Understand the major components of LANs 33. Which of the following is a mode in which a switch operates: a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching Answer: Difficulty: Reference: L.O.:

C Medium Wired Ethernet Understand the major components of LANs


34. Each of the circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. a. multipoint b. point-to-point c. shared d. ring e. star Answer: B Difficulty: Easy Reference: Wired Ethernet L.O.: Understand the major components of LANs 35. Wired Ethernet is a _______________ technology for small SOHO devices, meaning that manufacturers are no longer creating new products. . a. host b. legacy c. caching d. hub e. peak Answer: B Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wired Ethernet LANs

36. LAN bottlenecks are usually found at the: a. data entry keyboard and client video monitors b. LAN server and network circuit c. hub repeaters and transducer circuit modules d. client operating system and diskette drive e. client hard drive and processor Answer: B Difficulty: Easy Reference: Improving LAN Performance L.O.: Be able to improve LAN performance 37. Which of the following can provide fault tolerance for the storage space on a server? a. RAID b. SCSI c. IDE d. USB e. EIDE Answer: A Difficulty: Easy Reference: Improving LAN Performance L.O.: Be able to improve LAN performance


38. Which of the following is not a potential bottleneck for LAN performance? a. number and speed of hard disks in the server b. amount of memory in the server c. speed of server’s CPU d. network interface card e. all of the answers are potential bottlenecks for LAN performance Answer: E Difficulty: Medium Reference: Improving LAN Performance L.O.: Be able to improve LAN performance 39. If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)? a. adding one or more additional servers b. upgrading the server’s CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable Answer: E Difficulty: Medium Reference: Improving LAN Performance L.O.: Be able to improve LAN performance 40. To increase the volume of simultaneous messages the LAN circuit can transmit from network clients to the server(s), you can: a. increase the CPU of the server b. upgrade to a bigger circuit c. increase the number of hard disks on the server d. increase the amount of disk capacity of the server e. increase the amount of memory of the server Answer: B Difficulty: Easy Reference: Improving LAN Performance L.O.: Be able to improve LAN performance 41. Breaking a network into smaller parts is called network: a. fragmentation b. segmentation c. localization d. allocation e. mitigation Answer: B Difficulty: Easy Reference: Improving LAN Performance L.O.: Be able to improve LAN performance


42. Which of the following is not an effective way to reduce LAN network demand: a. move files to client computers b. use disk caching on the client machines c. find an application that places a large demand on the network and run it a time when the network is lightly loaded d. add hidden nodes e. shift the users’ routines Answer: D Difficulty: Medium Reference: Improving LAN Performance L.O.: Be able to improve LAN performance 43. Which of the following is not a WLAN standard? a. 802.11ac b. 802.11a c. 802.3 d. 802.11b e. 802.11g Answer: C Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 44. The IEEE designation for the type of wireless standard that uses both the 2.4 and 5 GHz range is __________. a. 802.11n b. 802.11a c. 802.3 d. 802.11b e. 802.11g Answer: A Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 45. A(n) _____________ is used in a computer to connect it to a WLAN. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub Answer: C Difficulty: Easy Reference: LAN Components L.O.: Be able to design wireless Ethernet LANs


46. A(n) ___________ is a radio transceiver that plays the same role as a hub or switch in a wired network and connects the WLAN to the wired network. a. Ethernet NIC b. antennae c. wireless NIC d. access point e. hub Answer: D Difficulty: Medium Reference: LAN Components L.O.: Be able to design wireless Ethernet LANs 47. How many channels does the 802.11ac standard provide for communication between the access point and clients? a. 4 b. 6 c. 8 d. 11 e. 2 Answer: C Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 48. How can a set of 802.11b access points be configured to operate without interference? a. assigning each access point a different channel to communicate with clients b. separate each access point by more than 10 meters c. assign the same channel to no more than two access points d. use omnidirectional antennas on some access points and directional on others. e. none of the above Answer: A Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 49. __________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical Answer: C Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs


50. __________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical Answer: A Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 51. CSMA/CA is an acronym for: a. Carrier Sense Multiple Access with Collision Acknowledgment b. Carrier Sense Mode Access with Carrier Avoidance c. Carrier Sense Multiple Access with Collision Avoidance d. Carrier Sensory Multiple Access without Collision Acknowledgment e. Carrier Sense Multiple Acknowledgment with Collision Avoidance Answer: C Difficulty: Medium Reference: Wired Ethernet L.O.: Be able to design wireless Ethernet LANs 52. Another name for distributed coordination function (DCF) is __________. a. distributed carrier sense method b. physical carrier sense method c. physical carrier sense mode d. distributed carrier sense mode e. distributed coordination mode Answer: B Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 53. When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: a. out of range problem b. collision problem c. hidden node problem d. controlled access problem e. media access problem Answer: Difficulty: Reference: L.O.:

C Medium Wireless Ethernet Be able to design wireless Ethernet LANs


54. The maximum data rate of a an 802.11ad WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps Answer: D Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 55. 802.11g is backward compatible with which type of LAN? a. 802.11a b. 802.11b c. 802.15 d. 802.3 e. 802.5 Answer: B Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 56. How many channels does 802.11g provide for communication with clients, a. 20 b. 12 c. 10 d. 3 e. 8 Answer: D Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 57. The maximum data rate of an 802.11g WLAN is a. 24 Mbps b. 36 Mbps c. 11 Mbps d. 54 Mbps e. 9 Mbps Answer: D Difficulty: Easy Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs


58. Which of the following standards is backward compatible with IEEE802.11a, b, and g? a. 802.11a b. 802.11b c. 802.11g d. 802.11n e. 802.15 Answer: D Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 59. Many organizations today are installing traditional wired Ethernet for desktop users and install Wi-Fi as ______________. a. overlay networks b. Bluetooth c. cellular networks d. mobile networks e. Ethernet networks Answer: A Difficulty: Medium Reference: The Best Practice LAN Design L.O.: Be able to design wireless Ethernet LANs 60. Which of the following is not determined by a site survey? a. feasibility of the desired coverage b. potential sources of interference c. the security of the WLAN d. estimated number of access points needed to provide coverage e. current locations of the wired network into which the WLAN will connect. Answer: C Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to improve LAN performance 61. _____________ refers to practice of writing symbols in chalk on sidewalks and walls to indicate the presence of an unsecured WLAN. a. wardriving b. chalking c. warchalking d. marking e. identifying Answer: C Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs


62. With _____________, the AP permits the owner to provide a list of valid addresses that can connect. a. EAP. b. SSID c. WEP d. MAC address filtering e. SWEP Answer: D Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 63. IEEE 802.11ac runs on which of the following two different frequency spectrums simultaneously? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz Answer: A Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs

64. WiGig is standardized as a. IEEE 802.11ad b. IEEE 802.11ac c. IEEE 802.11n d. IEEE 802.11g e. IEEE 802.11a Answer: A Difficulty: Medium Reference: Wireless Ethernet L.O.: Be able to design wireless Ethernet LANs 65. A second type of network that a wireless access point provides is a ______ that is secured by a separate password that is entered on a Web page when you first connect to the network. a. WI-LO network b. guest network c. transient network d. IEEE 802.temp e. IEEE 802.11guest Answer: Difficulty: Reference: L.O.:

A Medium Wireless Ethernet Be able to design wireless Ethernet LANs


66. The ___________ is where the organization housing its primary servers. a. MDF b. guest house c. SOHO network d. data center e. load balancer Answer: Difficulty: Reference: L.O.:

D Medium The Best Practice LAN Design Understand the major components of LANs

67. The ________ acts as a router at the front of the server farm. a. load router b. MDF c. Layer 2 switch d. front-end loader e. load balancer Answer: Difficulty: Reference: L.O.:

E Medium The Best Practice LAN Design Understand the major components of LANs

68. ____ is the process of creating several logically separate servers on the same physical computer. a. Server virtualization b. Server optimization c. Server proliferation d. Server platforming e. Server redundancy

Answer: Difficulty: Reference: L.O.:

A Medium The Best Practice LAN Design Understand the major components of LANs

69. A ___ has a set of high-speed storage devices and servers that are networked together using a very high speed network. a. wide area network b. local area network c. storage area network d. storage server e. local area storage WAN Answer: Difficulty:

C Medium


Reference: L.O.:

The Best Practice LAN Design Understand the major components of LANs

70. The _____ contains the servers that are designed to serve data to customers and suppliers. a. e-commerce edge b. SAN c. LAN d. domain controller e. bottleneck Answer: Difficulty: Reference: L.O.:

A Medium The Best Practice LAN Design Understand the major components of LANs


Short Answer and Essay Questions: 1. What does a NOS do? What are the major software parts of a NOS? What is the most important characteristic of a NOS? What are two NOS product names? 2. Describe CSMA, CD and CA. How does this work, in essence? Compare this to wireless LANS? How are they similar, and how are they different in terms of MAC? 3. Identify and describe the components of a data center. 4. What are two other names for NIC cards? 5. Describe in detail the difference between a hub and a switch in a LAN. Draw a diagram of each, and then mark it to show some of the points that you have made in your discussion of the differences. Discuss the difference between shared Ethernet and switched Ethernet in light of your answer. 6. Given a specific description of an Ethernet type, be prepared to answer questions regarding its speed, type of transmission and physical structure, e.g., 100BaseT, etc. 7. Define the three modes of switch operations. 8. What is the best practice Ethernet at the present time? Describe, and explain why this is best practice. What is the best practice wireless at the present time? Describe and explain why this is best practice. Would you install a wired or wireless Ethernet right now? Describe, if you were a manager, what your network of choice would be and why. 9. Discuss in detail how you would improve a LAN network’s performance, and what you would look for. 10. What is the difference in a logical and physical topology? 11. What are three reasons why Wi Fi has grown in popularity? 12. What is the “hidden node” problem, and what do you need to do about it in the best LAN design for wireless? 13. How might you as a network manager improve WLAN performance? 14. What devices are needed to build a wireless network? 15. Describe war-chalking, war-driving, and war-walking. 16. Compare a switched Ethernet to a wireless Ethernet. What are four essential differences between these two approaches to building a LAN? Give three reasons why a switched Ethernet is preferable to wireless. Three reasons why wireless might be preferred to switched? 17. Select three different types of IEEE 802.11 and describe when it might be best to use each one.


18. Discuss wireless network security. What are some of the critical problems, what are some of the defenses against these problems? List five potential weaknesses in security and five potential solutions to these perceived weaknesses. 19. Describe how you might secure your home wireless network. 20. What is the purpose of the e-commerce edge?


Chapter 8 Backbone Networks True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic are also furnished. 1.

A backbone network is a high-speed network that connects many networks Answer: Difficulty: Reference: L.O.:

2.

Backbone networks typically use lower speed circuits to interconnect a series of LANs and provide connections to other backbone networks. Answer: Difficulty: Reference: L.O.:

3.

False Easy Introduction Understand the routed backbone architecture

One basic component of a backbone network is the hardware device that connects other networks to the backbone. Answer: Difficulty: Reference: L.O.:

5.

False Easy Introduction Understand the Internetworking devices used in BNs

A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone. Answer: Difficulty: Reference: L.O.:

4.

True Easy Introduction Understand the Internetworking devices used in BNs

True Easy Introduction Understand the routed backbone architecture

Switches and routers are devices that can connect networks to the BN. Answer: Difficulty: Reference: L.O.:

True Easy Introduction Understand the Internetworking devices used in BNs


6.

The cable to connect BNs is usually twisted pair.

7.

Answer: False Difficulty: Easy Reference: Introduction L.O.: Understand the best practice recommendations for backbone design A hardware device that operates at the application layer is a router.

8.

Answer: False Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture Routers can only connect the same type of cable.

9.

Answer: False Difficulty: Easy Reference: Routed Backbones L.O.: Understand the routed backbone architecture Routers use network layer address to forward packets between network segments.

10.

Answer: True Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture Routers operate at the application layer.

11.

12.

13.

Answer: False Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture Routers connect two or more network segments that use the same or different data link protocols, but the same network protocol. Answer: True Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture One difference between a switch and a router is that a router will only process messages addressed to the router, while a switch processes all messages. Answer: True Difficulty: Easy Reference: Routed Backbones L.O.: Understand the routed backbone architecture Layer-3 switches switch messages based on their data link layer address. Answer: Difficulty: Reference: L.O.:

False Easy Switched Backbones Understand the switched backbone architecture


14.

Routed backbones use switches that move packets based on data link layer addresses.

15.

Answer: False Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture The distribution layer of a backbone connects LANs together.

16.

17.

18.

Answer: True Difficulty: Easy Reference: Switched Backbones L.O.: Understand the switched backbone architecture The primary advantage of a routed backbone is that it clearly segments each part of the network connected to the backbone because each segment has its own subnet addresses that can be managed separately. Answer: True Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture One advantage of a routed backbone is that is requires little management. Answer: False Difficulty: Easy Reference: Routed Backbones L.O.: Understand the routed backbone architecture A routed backbone tends to be used more for large networks than VLANs, although VLAN high speed switches and this new type of LAN-BN architecture are now being considered. Answer: Difficulty: Reference: L.O.:

19.

20.

True Easy Virtual LANs Understand Virtual LAN architecture

A switched backbone uses a bus topology Answer: False Difficulty: Easy Reference: Switched Backbones L.O.: Understand the switched backbone architecture A room that contains a rack of equipment for a rack-based collapsed backbone is also called the main distribution facility (MDF) or central distribution facility (CDF). Answer: Difficulty: Reference: L.O.:

True Easy Switched Backbones Understand the switched backbone architecture


21.

A key advantage of a chassis switch is its flexibility.

22.

Answer: True Difficulty: Easy Reference: Switched Backbones L.O.: Understand the switched backbone architecture A VLAN network assigns computers to LAN segments by hardware.

23.

24.

Answer: False Difficulty: Easy Reference: Virtual LANs L.O.: Understand Virtual LAN architecture A VLAN requires the computer manager to reconfigure the physical cables to the switch if a computer is moved from one port to another port on a switch. Answer: False Difficulty: Medium Reference: Virtual LANs L.O.: Understand Virtual LAN architecture VLANs provide faster performance compared to switched, collapsed or routed backbone architectures. Answer: Difficulty: Reference: L.O.:

True Easy Virtual LANs Understand Virtual LAN architecture


MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the page number(s) relevant to the topic is also furnished. 1.

Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs. Answer: Difficulty: Reference: L.O.:

2.

Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used Answer: Difficulty: Reference: L.O.:

3.

E Medium Introduction Understand the Internetworking devices used in BNs

C Medium Introduction Understand the Internetworking devices used in BNs

Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches Answer: Difficulty: References: L.O.:

A Medium Switched Backbones Understand the switched backbone architecture


4.

5.

6.

7.

Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer Answer: D Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the “best” route between networks for forwarding a packet Answer: A Difficulty: Hard Reference: Routed Backbones L.O.: Understand the routed backbone architecture Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses. Answer: E Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone Answer: Difficulty: Reference: L.O.:

B Easy Routed Backbones Understand the routed backbone architecture


8.

9.

10.

11.

Which of the following is not a technology layer that is considered when designing backbone networks? a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options Answer: C Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Answer: E Difficulty: Medium Reference: Routed Backbone L.O.: Understand the routed backbone architecture _________ move packets along the backbone based on their network layer address. a. Bridged backbones b. Hubbed backbones c. Multistation access unit backbones d. Routed backbones e. NIC backbones Answer: D Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture Routers: a. require more management than switches b. are not susceptible to time delays c. use data link layer addresses to move packets that leave the subnet d. require only a few set of TCP/IP addresses e. don’t need much time to establish separate subnet addresses for each LAN Answer: Difficulty: Reference: L.O.:

A Medium Routed Backbones Understand the routed backbone architecture


12.

13.

14.

15.

A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone Answer: E Difficulty: Medium Reference: Routed Backbones L.O.: Understand the routed backbone architecture A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone Answer: D Difficulty: Easy Reference: Switched Backbones L.O.: Understand the switched backbone architecture _________ have no backbone cable. a. Switched backbones b. Cloud routed backbones c. Hubbed backbones d. Bridged backbones e. Multistation access unit backbones Answer: A Difficulty: Easy Reference: Switched Backbones L.O.: Understand the switched backbone architecture Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building c. use a star topology with one device, usually a switch d. have a great deal of cable in their backbones e. tend to have less cable, but more network devices Answer: Difficulty: Reference: L.O.:

C Medium Switched Backbones Understand the switched backbone architecture


16.

17.

18.

19.

Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable Answer: C Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based Answer: A Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility Answer: B Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone Answer: Difficulty: Reference: L.O.:

B Easy Virtual LANs Understand Virtual LAN architecture


20.

21.

22.

23.

Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements. Answer: E Difficulty: Medium Reference: Virtual LANs L.O.: Understand Virtual LAN architecture Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network Answer: C Difficulty: Easy Reference: Improving Backbone Performance L.O.: Be aware of ways to improve BN performance Circuit capacity on a backbone network will not be improved by: a. going from 100Base-T Ethernet to 10Base-T Ethernet b. going from 100Base-T Ethernet to gigabit Ethernet c. adding additional circuits alongside heavily used ones d. replacing a shared circuit backbone with a switched circuit backbone e. providing a faster circuit to the server Answer: A Difficulty: Medium Reference: Improving Backbone Performance L.O.: Be aware of ways to improve BN performance Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options Answer: Difficulty: Reference: L.O.:

D Medium Improving Backbone Performance Be aware of ways to improve BN performance


24.

25.

26.

Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia Answer: C Difficulty: Medium Reference: Improving Backbone Performance L.O.: Be aware of ways to improve BN performance Which of the following would not be part of an “ideal” backbone design for the future? a. access layer composed of 10/100 layer 2 Ethernet switches b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T c. redundant switches d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber e. coax cabling throughout LANs and BN Answer: E Difficulty: Medium Reference: Improving Backbone Performance L.O.: Be aware of ways to improve BN performance The backbone architecture layer that is closest to the users is the a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer Answer: Difficulty: Reference: L.O.:

27.

A Easy Switched Backbones Understand the switched backbone architecture

The _______ is the part of the backbone that connects the LANs together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer Answer: Difficulty: Reference: L.O.:

B Easy Switched Backbones Understand the switched backbone architecture


28.

29.

30.

31.

The _________ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer Answer: C Difficulty: Easy Reference: Switched Backbones L.O.: Understand the switched backbone architecture With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack Answer: E Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches Answer: A Difficulty: Medium Reference: Switched Backbones L.O.: Understand the switched backbone architecture Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access Answer: Difficulty: Reference: L.O.:

D Medium Virtual LANs Understand Virtual LAN architecture


32.

33.

Computers can be assigned to a VLAN based on the ________. a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer Answer: C Difficulty: Medium Reference: Virtual LANs L.O.: Understand Virtual LAN architecture The biggest drawbacks to VLANs are their_________________. a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size Answer: Difficulty: Reference: L.O.:

34.

35.

A Medium The Best Practice Backbone Design Be aware of ways to improve BN performance

VLANs prioritize traffic based on the ______. a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics Answer: A Difficulty: Medium Reference: Virtual LANs L.O.: Understand Virtual LAN architecture Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11 Answer: B Difficulty: Medium Reference: The Best Practice Backbone Design L.O.: Be aware of ways to improve BN performance


Short Answer and Essay Questions: 1. What is a backbone network? What is typical of this kind of network? 2. What are some business trends we are seeing in backbone networks? 3. Given network devices such as routers and switches, discuss three major technological trends that are helpful in explaining the differences between these devices. 4. When might a router be useful than a switch? 5. List and describe five managerial factors to consider when selecting best practices for a backbone network design. 6. What are six actions that you might undertake as a network manager to improve backbone performance? 7. Even though the access layer isn’t part of the backbone, why is it important to the backbone? 8. What are the main benefits of Virtual LANs? 9. Describe how a VLAN works.


Chapter 9 Wide Area Networks True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided . The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic are also furnished. 1.

In building Wide Area Networks, many organizations do not build their own long distance communication circuits Answer: Difficulty: Reference: L.O.:

2.

WANs can connect BNs across distances that can span up to thousands of miles. Answer: Difficulty: Reference: L.O.:

3.

True Easy Introduction Understand the best practice recommendations for WAN design

Today, a common carrier that provides long distance services is typically called a local exchange carrier. Answer: Difficulty: Reference: L.O.:

5.

True Easy Introduction Understand the best practice recommendations for WAN design

Common carriers sell or lease communication services and facilities to the public. Answer: Difficulty: Reference: L.O.:

4.

True Easy Introduction Understand the best practice recommendations for WAN design

False Easy Introduction Understand the best practice recommendations for WAN design

A dedicated circuit is usually not available late at nights or on weekends. Answer: Difficulty: Reference: L.O.:

False Easy Dedicated Circuit Networks Understand dedicated-circuit services and architectures


6.

A WAN with a ring topology can use full or half duplex circuits Answer: Difficulty: Reference: L.O.:

7.

A disadvantage of a star architecture is that the failure of one circuit will disrupt the entire network. Answer: Difficulty: Reference: L.O.:

8.

False Medium Dedicated Circuit Networks Understand dedicated-circuit services and architectures

Full mesh networks are inexpensive. Answer: Difficulty: Reference: L.O.:

9.

True Medium Dedicated Circuit Networks Understand dedicated-circuit services and architectures

False Medium Dedicated Circuit Networks Understand dedicated-circuit services and architectures

Full mesh design networks are more common than partial mesh design networks. Answer: Difficulty: Reference: L.O.:

False Medium Dedicated Circuit Networks Understand dedicated-circuit services and architectures

10. ` T carrier circuits can only be used to transmit voice. Answer: Difficulty: Reference: L.O.: 11.

A T1 circuit provides a data rate of 1.544Mbps. Answer: Difficulty: Reference: L.O.:

12.

False Easy Dedicated Circuit Networks Understand dedicated-circuit services and architectures

True Easy Dedicated Circuit Networks Understand dedicated-circuit services and architectures

SONET is made up of very high speed dedicated circuits that incorporate inverse multiplexing (IMUX) for all levels above the OC-1 level. Answer: Difficulty: Reference: L.O.:

True Medium Dedicated Circuit Networks Understand dedicated-circuit services and architectures


13.

An OC-1 circuit provides a data rate of 155 Mbps. Answer: Difficulty: Reference: L.O.:

14.

To connect into a packet switched network, a network terminator is generally used. Answer: Difficulty: Reference: L.O.:

15.

False Medium Packet-Switched Networks Understand packet-switched services and architectures

Frame relay is a reliable packet service. Answer: Difficulty: Reference: L.O.:

19.

False Easy Packet-Switched Networks Understand packet-switched services and architectures

The committed information rate (CIR) in a permanent virtual circuit is the maximum allowable rate that the network will attempt to provide. Answer: Difficulty: Reference: L.O.:

18.

True Easy Packet-Switched Networks Understand packet-switched services and architectures

Datagrams are connection-oriented. Answer: Difficulty: Reference: L.O.:

17.

False Medium Packet-Switched Networks Understand packet-switched services and architectures

Packet switched networks enable packets from separate messages or separate organizations to be interleaved for transmission. Answer: Difficulty: Reference: L.O.:

16.

False Easy Dedicated Circuit Networks Understand dedicated-circuit services and architectures

False Easy Packet-Switched Networks Understand packet-switched services and architectures

Ethernet/IP packet networks are not provided by common carriers such as AT&T. Answer: Difficulty: Reference: L.O.:

True Easy Packet-Switched Networks Understand packet-switched services and architectures


20.

Virtual private networks permit users to create permanent virtual circuits, or tunnels, through the Internet. Answer: Difficulty: Reference: L.O.:

21.

MPLS operate at layer 4. Answer: Difficulty: Reference: L.O.:

22.

False Easy Packet-Switched Networks Understand packet-switched services and architectures

VPNs offer high security because they operate through the Internet. Answer: Difficulty: Reference: L.O.:

23.

True Easy Virtual Private Networks Understand Internet-based VPN services and architectures

False Easy Virtual Private Networks Understand Internet-based VPN services and architectures

An intranet VPN connects different organizations over the Internet. Answer: Difficulty: Reference: L.O.:

False Easy Virtual Private Networks Understand Internet-based VPN services and architectures

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic is also furnished. 1.

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs Answer: Difficulty: Reference: L.O.:

A Easy Introduction Understand the best practice recommendations for WAN design


2.

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT Answer: Difficulty: Reference: L.O.:

3.

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS Answer: Difficulty: Reference: L.O.:

4.

C Medium Introduction Understand the best practice recommendations for WAN design

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only Answer: Difficulty: Reference: L.O.:

5.

D Easy Introduction Understand the best practice recommendations for WAN design

B Medium Dedicated Circuit Networks Understand dedicated-circuit services and architectures

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only Answer: Difficulty: Reference: L.O.:

A Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures


6.

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM Answer: Difficulty: Reference: L.O.:

7.

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh Answer: Difficulty: Reference: L.O.:

8.

C Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design Answer: Difficulty: Reference: L.O.:

9.

C Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

D Easy Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-topoint connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver Answer: Difficulty: Reference: L.O.:

A Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures


10.

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic Answer: Difficulty: Reference: L.O.:

11.

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above Answer: Difficulty: Reference: L.O.:

12.

A Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

C Easy Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design Answer: Difficulty: Reference: L.O.:

D Easy Dedicated-Circuit Networks Understand dedicated-circuit services and architectures


13.

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails Answer: Difficulty: Reference: L.O.:

14.

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design Answer: Difficulty: Reference: L.O.:

15.

B Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

A Easy Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded Answer: Difficulty: Reference: L.O.:

B Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures


16.

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN Answer: Difficulty: Reference: L.O.:

17.

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps Answer: Difficulty: Reference: L.O.:

18.

A Easy Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36 Answer: Difficulty: Reference: L.O.:

19.

D Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

C Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps Answer: Difficulty: Reference: L.O.:

C Easy Dedicated-Circuit Networks Understand dedicated-circuit services and architectures


20.

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities Answer: Difficulty: Reference: L.O.:

21.

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don’t have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don’t have to specify all the interconnecting services you need for your WAN when you buy the service. Answer: Difficulty: Reference: L.O.:

22.

C Hard Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

A Medium Packet – Switched Networks Understand packet-switched services and architectures

A _____________ is a user’s connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device Answer: Difficulty: Reference: L.O.:

D Medium Packet – Switched Networks Understand packet-switched services and architectures


23.

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network Answer: Difficulty: Reference: L.O.:

24.

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit Answer: Difficulty: Reference: L.O.:

25.

C Medium Packet – Switched Networks Understand packet-switched services and architectures

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network Answer: Difficulty: Reference: L.O.:

26.

D Easy Packet – Switched Networks Understand packet-switched services and architectures

A Medium Packet – Switched Networks Understand packet-switched services and architectures

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design Answer: Difficulty: Reference: L.O.:

C Medium Packet – Switched Networks Understand packet-switched services and architectures


27.

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks Answer: Difficulty: Reference: L.O.:

28.

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps Answer: Difficulty: Reference: L.O.:

29.

A Medium Dedicated-Circuit Networks Understand dedicated-circuit services and architectures

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP Answer: Difficulty: Reference: L.O.:

30.

D Medium Packet – Switched Networks Understand packet-switched services and architectures

B Medium Packet – Switched Networks Understand packet-switched services and architectures

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps Answer: Difficulty: Reference: L.O.:

A Medium Packet – Switched Networks Understand packet-switched services and architectures


31.

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network Answer: Difficulty: Reference: L.O.:

32.

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds Answer: Difficulty: Reference: L.O.:

33.

C Medium Virtual Private Networks Understand Internet-based VPN services and architectures

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user Answer: Difficulty: Reference: L.O.:

34.

B Medium Virtual Private Networks Understand Internet-based VPN services and architectures

A Easy Virtual Private Networks Understand Internet-based VPN services and architectures

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP Answer: Difficulty: Reference: L.O.:

A Medium Virtual Private Networks Understand Internet-based VPN services and architectures


35.

36.

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization’s network from a remote location Answer: D Difficulty: Medium Reference: Virtual Private Networks L.O.: Understand Internet-based VPN services and architectures __________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay Answer: Difficulty: Reference: L.O.:

37.

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic Answer: Difficulty: Reference: L.O.:

38.

B Medium Improving WAN Performance Be familiar with how to improve WAN performance

A Easy Improving WAN Performance Be familiar with how to improve WAN performance

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with “bursty” traffic d. should be used in 80 to 90 percent of total networks’ capacity e. is another term for static routing in WANs Answer: Difficulty: Reference: L.O.:

A Medium Improving WAN Performance Be familiar with how to improve WAN performance


39.

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times Answer: Difficulty: Reference: L.O.:

40.

D Medium Improving WAN Performance Be familiar with how to improve WAN performance

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability Answer: Difficulty: Reference: L.O.:

A Medium The Best Practice WAN Design Understand the best practice recommendations for WAN design

41.

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier’s packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN Answer: A Difficulty: Medium Reference: Packet – Switched Networks L.O.: Understand packet-switched services and architectures

42.

Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1 Answer: C Difficulty: Medium Reference: Packet – Switched Networks L.O.: Understand packet-switched services and architectures


Short Answer and Essay Questions: 1. Using a chart format, list, define and briefly describe two dedicated circuit services and two packet switched services. 2. Draw a diagram of packet switched service, and describe packet switching concepts. 3. How does a SVC differ from a PVC? 4. Explain the differences between CIR and MAR. 5. Where does packetizing take place? 6. Compare and contrast frame relay, MPLS and Ethernet service networks. 7. Describe six ways in which a network manager might improve WAN service. 8. Suppose you joined a company that had a WAN composed of SONET, T carrier services, and frame relay, each selected to match a specific network need for a certain set of circuits. Would you say this was a well-designed network? Explain. 9. What are the main benefits of using a VPN? 10. Describe the three types of VPN. 11. What are the benefits of IP services over other packet-switched options? 12. Compare the ring, star, and mesh architectures. Provide one example of when each one might be better to use compared to the others. 13.


Chapter 10 The Internet True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic are also furnished. 1.

The Internet is one large network.

2.

Answer: False Difficulty: Easy Reference: Introduction L.O.: Understand the overall design of the Internet The Internet is flat in structure.

3.

Answer: False Difficulty: Easy Reference: Introduction L.O.: Understand the overall design of the Internet Tier 1 service providers connect together and exchange data at IXPs.

4.

Answer: True Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet IXPs were originally designed to connect only tier 3 ISPs.

5.

Answer: False Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages.

6.

Answer: True Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet A point of presence is the place at which the ISP provides services to its customers. Answer: Difficulty: Reference: L.O.:

True Easy How the Internet Works Understand the overall design of the Internet


7.

Technologies such as DSL and cable modem are called narrowband technologies.

8.

Answer: False Difficulty: Easy Reference: How the Internet Works L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax Digital Subscriber Line is a family of multipoint technologies. Answer: Difficulty: Reference: L.O.:

9.

To use DSL, a customer needs a DSL Access Multiplexer installed at his or her location. Answer: Difficulty: Reference: L.O.:

10.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

The most common type of DSL today is ADSL. Answer: Difficulty: Reference: L.O.:

13.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

DSL uses a remote loop to connect homes to the telephone company end office. Answer: Difficulty: Reference: L.O.:

12.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

Another term for a DSL modem is a DSL brouter. Answer: Difficulty: Reference: L.O.:

11.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

True Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

The most common cable modem standard is Data over Cable Service Interface Specification. Answer: Difficulty: Reference: L.O.:

True Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax


14.

The device similar to a DSL router, but used in a FTTH environment is called an optical unit network. Answer: Difficulty: Reference: L.O.:

15.

A distribution hub includes a combiner and a Cable modem termination system. Answer: Difficulty: Reference: L.O.:

16.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

The Internet Engineering Steering Group provides strategic architectural oversight for the Internet. Answer: Difficulty: Reference: L.O.:

20.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

IBM recently developed a new WiMAX chip set. Answer: Difficulty: Reference: L.O.:

19.

False Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

WiMAX is an older wireless technology that probably won’t be used much longer. Answer: Difficulty: Reference: L.O.:

18.

True Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

In a DSL environment, the line splitter and DSL modem are always two separate devices. Answer: Difficulty: Reference: L.O.:

17.

True Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

False Medium The Future of the Internet Be familiar with possible future directions of the Internet

Internet 2 is the common name for the Abilene network. Answer: Difficulty: Reference: L.O.:

True Easy The Future of the Internet Be familiar with possible future directions of the Internet


21.

Each of the networks in Internet 2 has a set of access points called terapops. Answer: Difficulty: Reference: L.O.:

False Easy The Future of the Internet Be familiar with possible future directions of the Internet

MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic is also furnished. 1.

2.

3.

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines Answer: B Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet Tier 1 ISPs connect together and exchange data at ___________. a. IXPs b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center Answer: A Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet __________ has led to the belief that the Internet is “free”. a. Encrypting b. Peering c. Bridging d. Tolling e. Polling Answer: Difficulty: Reference: L.O.:

B Medium How the Internet Works Understand the overall design of the Internet


4.

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. b. c. d. e.

5.

6.

Answer: B Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange Answer: D Difficulty: Medium Reference: How the Internet Works L.O.: Understand the overall design of the Internet In general, tier 3 ISPs make money by charging ________. a. b. c. d. e.

7.

Popping Peering Yiping Napping Chargebacking

customers ICANN UCAID the DSLAM CSUs/DSUs

Answer: A Difficulty: Easy Reference: How the Internet Works L.O.: Understand the overall design of the Internet A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server Answer: Difficulty: Reference: L.O.:

B Medium How the Internet Works Understand the overall design of the Internet


8.

Which of the following is one of the tier 1 ISPs in North America? a. b. c. d. e.

9.

10.

IETF IEEE IAB Sprint ISOC

Answer: D Difficulty: Medium Reference: How the Internet Works L.O.: Understand the overall design of the Internet Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband Answer: E Difficulty: Easy Reference: Internet Access Technologies L.O.: Understand the overall design of the Internet Digital _________ Line is a family of point-to-point technologies designed to provide highspeed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch Answer: Difficulty: Reference: L.O.:

11.

D Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point Answer: Difficulty: Reference: L.O.:

C Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax


12.

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. b. c. d. e. Answer: Difficulty: Reference: L.O.:

13.

A Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

Data traffic from the customers premises is sent to a __________ which is located at the local carrier’s end office. a. modem b. codec c. DSLAM d. NIC e. ATM Answer: Difficulty: Reference: L.O.:

14.

line splitter V.32bis modem line analyzer main distribution frame network access point

C Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

The _________ is the connection from a home or business to the telephone company end office. a. b. c. d. e.

distribution hub RFC UCAID local loop CA*net 3

Answer: Difficulty: Reference: L.O.:

D Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax


15.

A DSL modem is also known as a: a. b. c. d. e.

DSL bridge DSL brouter DSL router DSL gateway DSL hub

Answer: Difficulty: Reference: L.O.: 16.

C Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

At the DSL local carrier’s office, the __________ demultiplexes the data streams and converts them into ATM data. a. b. c. d. e.

DSLAM GrandSlam WAP line splitter X.25 PAD

Answer: Difficulty: Reference: L.O.:

A Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

17.

Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles Answer: A Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

18.

Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. a. gigapop b. autonomous system c. ISP d. IXP e. Service provider Answer: D Difficulty: Medium Reference: How the Internet Works L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax


19.

At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge Answer: C Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

20.

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively. Answer: Difficulty: Reference: L.O.:

21.

A digital service offered by cable companies is the _________. a. b. c. d. e.

Abilene network WAP proxy G.Lite ADSL cable modem Next Generation Internet

Answer: Difficulty: Reference: L.O.: 22.

A Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

D Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. b. c. d. e.

fixed wireless mobile wireless distribution hub hybrid fiber coax fibrax

Answer: Difficulty: Reference: L.O.:

D Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax


23.

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. b. c. d. e.

9000 8.4 1.5 650 6.1

Answer: Difficulty: Reference: L.O.: 24.

C Medium Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

A headend is also referred to as a: a. b. c. d. e.

Abilene network WAP proxy cable modem distribution hub fiber node

Answer: Difficulty: Reference: L.O.:

D Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

25.

In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack Answer: D Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

26.

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. b. c. d. e.

CA*net 3 RFC WAP proxy fixed wireless connection optical-electrical converter

Answer: Difficulty: Reference: L.O.:

E Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax


27.

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. b. c. d. e.

Internet steering system optical-electrical converter WAP proxy cable modem termination system fixed wireless system

Answer: Difficulty: Reference: L.O.:

D Easy Internet Access Technologies Be familiar with DSL, cable modem, fiber to the home, and WiMax

28.

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS Answer: D Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

29.

The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps Answer: E Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

30.

Fiber to the Home uses a. frequency division multiplexing b. wavelength division multiplexing c. time division multiplexing d. statistical time division multiplexing e. all of the above Answer: B Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax


31.

WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH Answer: C Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

32.

WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz Answer: C Difficulty: Medium Reference: Internet Access Technologies L.O.: Be familiar with DSL, cable modem, fiber to the home, and WiMax

33.

The closest the Internet has to an “owning” organization is the ___________. a. b. c. d. e.

Internet Service Provider Abilene network CA*Net3 University Corporation for Advanced Internet Development Internet Society

Answer: Difficulty: Reference: L.O.: 34.

E Easy The Future of the Internet Understand the overall design of the Internet

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards Answer: Difficulty: Reference: L.O.:

B Medium The Future of the Internet Understand the overall design of the Internet


35.

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force Answer: Difficulty: Reference: L.O.:

36.

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force Answer: Difficulty: Reference: L.O.:

37.

B Medium The Future of the Internet Understand the overall design of the Internet

C Medium The Future of the Internet Understand the overall design of the Internet

The _________operates like the IETF through small research groups focused on specific issues. a. b. c. d. e. Answer: Difficulty: Reference: L.O.:

Internet Society University Corporation for Advanced Internet Development Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force E Easy The Future of the Internet Understand the overall design of the Internet


38.

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. b. c. d. e.

CA*Net3 UCAID Next Generation Internet Internet 3 WAP proxy

Answer: Difficulty: Reference: L.O.: 39.

Which of the following new Internet efforts was started by 34 universities? a. b. c. d. e.

CA*net 3 ARDNOC vBNS NGI Internet2

Answer: Difficulty: Reference: L.O.: 40.

E Easy The Future of the Internet Be familiar with possible future directions of the Internet

A high-speed Internet has a set of access points called ____pops that provide point-ofpresence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit Answer: Difficulty: Reference: L.O.:

41.

C Medium The Future of the Internet Understand the overall design of the Internet

A Easy The Future of the Internet Be familiar with possible future directions of the Internet

Some of the new applications being developed for a high-speed Internet include a.) Tele-immersion b.) Tele-conferencing c.) QoS d.) Broadband e.) Tele-phoning Answer: A Difficulty: Easy Reference: The Future of the Internet L.O.: Be familiar with possible future directions of the Internet


42.

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750 Answer: C Difficulty: Easy Reference: The Future of the Internet L.O.: Be familiar with possible future directions of the Internet


Short Answer and Essay Questions: 1. What is the basic structure of the Internet? 2. Draw a picture that describes the peering arrangements, and explores the concept that the Internet is a network of networks. 3. Explain why you might have to wait a long time to get a web page from a server in your own city. 4. Draw a chart with the headings of 1. Internet access type, 2. How Internet Access Type works, 3. Analysis of Internet Access type. Then, proceed to fill out the chart for DSL and Cable Modem. 5. Do you think cable modem or DSL service is better? Why? 6. Which will be the technology of the Internet in five years? Why? Defend your answer. 7. What is Internet 2? 8. What are the principal organizations responsible for the governance of the Internet and what do these groups do? 9. What are some future technologies that might change how we access the Internet? 10. Describe how WiMAX works. 11. Why is FTTH such a good option if it is available in your area?


Chapter 11 Network Security True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided in square brackets. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic are also furnished. 1.

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. Answer: Difficulty: Reference: L.O.:

2.

The rise of the Internet has increased significantly the potential vulnerability of an organization’s assets. Answer: Difficulty: Reference: L.O.:

3.

True Easy Introduction Be familiar with the major threats to network security

A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000. Answer: Difficulty: Reference: L.O.:

5.

True Easy Introduction Be familiar with the major threats to network security

The CERT was established at Carnegie Mellon University. Answer: Difficulty: Reference: L.O.:

4.

True Easy Introduction Be familiar with the major threats to network security

True Easy Introduction Be familiar with the major threats to network security

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. Answer: Difficulty: Reference: L.O.:

True Medium Introduction Be familiar with the major threats to network security


6.

Integrity is not a primary goal of security. Answer: Difficulty: Reference: L.O.:

7.

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. Answer: Difficulty: Reference: L.O.:

8.

True Easy Introduction Be familiar with the major threats to network security

Corrective controls reveal or discover unwanted events. Answer: Difficulty: Reference: L.O.:

12.

True Easy Introduction Be familiar with the major threats to network security

Controls are mechanisms that reduce or eliminate threats to network security. Answer: Difficulty: Reference: L.O.:

11.

False Easy Introduction Be familiar with the major threats to network security

Intrusion refers to confidentiality and integrity of data Answer: Difficulty: Reference: L.O.:

10.

True Easy Introduction Be familiar with the major threats to network security

Confidentiality is not a threat to business continuity. Answer: Difficulty: Reference: L.O.:

9.

False Easy Introduction Be familiar with the major threats to network security

False Easy Introduction Be familiar with the major threats to network security

Preventive controls mitigate or stop a person from acting or an event from occurring. Answer: Difficulty: Reference: L.O.:

True Easy Introduction Be familiar with the major threats to network security


13.

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. Answer: Difficulty: Reference: L.O.:

14.

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders. Answer: Difficulty: Reference: L.O.:

15.

False Easy Risk Assessment Be familiar with how to conduct a risk assessment

Disk mirroring writes duplicate copies of all data on at least two different disks. Answer: Difficulty: Reference: L.O.:

18.

True Medium Risk Assessment Be familiar with how to conduct a risk assessment

An uninterruptible power supply utilizes a second redundant disk for every disk on the server. Answer: Difficulty: Reference: L.O.:

17.

True Easy Risk Assessment Be familiar with how to conduct a risk assessment

A denial-of-service attack occurs when someone external blocks access to your network. Answer: Difficulty: Reference: L.O.:

16.

True Easy Risk Assessment Be familiar with how to conduct a risk assessment

True Medium Risk Assessment Be familiar with how to conduct a risk assessment

The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. Answer: Difficulty: Reference: L.O.:

True Easy Risk Assessment Be familiar with how to conduct a risk assessment


19.

Macro viruses can spread when an infected file is opened. Answer: Difficulty: Reference: L.O.:

20.

Researchers estimate that only one or two new viruses are developed every week. Answer: Difficulty: Reference: L.O.:

21.

True Medium Ensuring Business Continuity Understand how to ensure business continuity

Fault-intolerant servers contain many redundant components to prevent failure. Answer: Difficulty: Reference: L.O.:

24.

True Easy Ensuring Business Continuity Understand how to ensure business continuity

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages. Answer: Difficulty: Reference: L.O.:

23.

False Easy Ensuring Business Continuity Understand how to ensure business continuity

The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed. Answer: Difficulty: Reference: L.O.:

22.

True Easy Ensuring Business Continuity Understand how to ensure business continuity

False Easy Ensuring Business Continuity Understand how to ensure business continuity

Crackers are casual hackers with a limited knowledge of computer security. Answer: Difficulty: Reference: L.O.:

False Medium Intrusion Prevention Understand how to prevent intrusion


25.

The most common access point used by attackers to gain access to an organization’s network is the dial-up access via a modem. Answer: Difficulty: Reference: L.O.:

26.

Physical security of an organization’s IT resources is not an important element in preventing intrusion to an internal LAN. Answer: Difficulty: Reference: L.O.:

27.

False Medium Intrusion Prevention Understand how to prevent intrusion

False Easy Intrusion Prevention Understand how to prevent intrusion

Network cables are the easiest target for eavesdropping. Answer: Difficulty: Reference: L.O.:

False Easy Intrusion Prevention Understand how to prevent intrusion

28.

Triple DES uses a total of 512 bits as the key. Answer: False Difficulty: Medium Reference: Intrusion Prevention L.O.: Understand how to prevent intrusion

29.

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. Answer: Difficulty: Reference: L.O.:

30.

False Easy Intrusion Prevention Understand how to prevent intrusion

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall Answer: Difficulty: Reference: L.O.:

True Easy Intrusion Prevention Understand how to prevent intrusion


31.

With application level firewalls, any access that has not been disabled is permitted. Answer: Difficulty: Reference: L.O.:

32.

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet. Answer: Difficulty: Reference: L.O.:

33.

False Easy Intrusion Prevention Understand how to prevent intrusion

A Trojan horse allows a user to access a computer from a remote location. Answer: Difficulty: Reference: L.O.:

37.

True Medium Intrusion Prevention Understand how to prevent intrusion

Microsoft’s Windows operating system meets A1 level security. Answer: Difficulty: Reference: L.O.:

36.

True Easy Intrusion Prevention Understand how to prevent intrusion

A patch is a software solution to correct a security hole Answer: Difficulty: Reference: L.O.:

35.

True Medium Intrusion Prevention Understand how to prevent intrusion

A security hole is a bug that permits intrusion to a computer. Answer: Difficulty: Reference: L.O.:

34.

False Easy Intrusion Prevention Understand how to prevent intrusion

True Easy Intrusion Prevention Understand how to prevent intrusion

Decryption is the process of converting plaintext into ciphertext. Answer: Difficulty: Reference: L.O.:

False Easy Intrusion Prevention Understand how to prevent intrusion


38.

Asymmetric encryption uses the same key to encrypt and decrypt an message.. Answer: Difficulty: Reference: L.O.:

39.

A brute-force attack is a method of trying to guess the correct password by trying every possible key. Answer: Difficulty: Reference: L.O.:

40.

True Easy Intrusion Prevention Understand how to prevent intrusion

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. Answer: Difficulty: Reference: L.O.:

43.

False Easy Intrusion Prevention Understand how to prevent intrusion

When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender’s public key. Answer: Difficulty: Reference: L.O.:

42.

True Easy Intrusion Prevention Understand how to prevent intrusion

DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM. Answer: Difficulty: Reference: L.O.:

41.

False Medium Intrusion Prevention Understand how to prevent intrusion

True Easy Intrusion Prevention Understand how to prevent intrusion

Secure Sockets Layer is an encryption standard designed for use on the Web. Answer: Difficulty: Reference: L.O.:

True Easy Intrusion Prevention Understand how to prevent intrusion


44.

In transport mode, IPSec encrypts the entire IP packet. Answer: Difficulty: Reference: L.O.:

45.

Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account. Answer: Difficulty: Reference: L.O.:

46.

True Easy Intrusion Prevention Understand how to prevent intrusion

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. Answer: Difficulty: Reference: L.O.:

49.

False Easy Intrusion Prevention Understand how to prevent intrusion

The most common authentication protocol used today is Kerberos. Answer: Difficulty: Reference: L.O.:

48.

True Easy Intrusion Prevention Understand how to prevent intrusion

Social engineering refers to creating a team that solves virus problems. Answer: Difficulty: Reference: L.O.:

47.

False Medium Intrusion Prevention Understand how to prevent intrusion

True Easy Intrusion Prevention Understand how to prevent intrusion

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. Answer: True Difficulty: Easy Reference: Risk Assessment L.O.: Be familiar with how to conduct a risk assessment


MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic is also furnished. 1.

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster Answer: Difficulty: Reference: L.O.:

2.

In recent years, management’s concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization’s assets e. remained the same because there are very few threats to data communications Answer: Difficulty: Reference: L.O.:

3.

C Easy Introduction Be familiar with the major threats to network security

D Easy Introduction Be familiar with the major threats to network security

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster Answer: Difficulty: Reference: L.O.:

D Medium Introduction Be familiar with the major threats to network security


4.

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion Answer: Difficulty: Reference: L.O.:

5.

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster Answer: Difficulty: Reference: L.O.:

6.

A Easy Introduction Be familiar with the major threats to network security

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster Answer: Difficulty: Reference: L.O.:

7.

A Easy Introduction Be familiar with the major threats to network security

B Medium Introduction Be familiar with the major threats to network security

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster Answer: Difficulty: Reference: L.O.:

D Easy Introduction Be familiar with the major threats to network security


8.

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements Answer: Difficulty: Reference: L.O.:

9.

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup Answer: Difficulty: Reference: L.O.:

10.

D Easy Introduction Be familiar with the major threats to network security

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup Answer: Difficulty: Reference: L.O.:

11.

B Easy Introduction Be familiar with the major threats to network security

A Easy Introduction Be familiar with the major threats to network security

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup Answer: Difficulty: Reference: L.O.:

A Easy Introduction Be familiar with the major threats to network security


12.

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan Answer: Difficulty: Reference: L.O.:

13.

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design Answer: Difficulty: Reference: L.O.:

14.

A Easy Risk Assessment Be familiar with how to conduct a risk assessment

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall Answer: Difficulty: Reference: L.O.:

15.

A Medium Risk Assessment Be familiar with how to conduct a risk assessment

D Medium Risk Assessment Be familiar with how to conduct a risk assessment

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design Answer: Difficulty: Reference: L.O.:

C Medium Risk Assessment Be familiar with how to conduct a risk assessment


16.

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization Answer: Difficulty: Reference: L.O.:

17.

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls Answer: Difficulty: Reference: L.O.:

18.

A Medium Risk Assessment Be familiar with how to conduct a risk assessment

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk Answer: Difficulty: Reference: L.O.:

19.

D Medium Risk Assessment Be familiar with how to conduct a risk assessment

C Medium Risk Assessment Be familiar with how to conduct a risk assessment

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus Answer: Difficulty: Reference: L.O.:

B Medium Ensuring Business Continuity Understand how to ensure business continuity


20.

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users’ messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming Answer: Difficulty: Reference: L.O.:

21.

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees Answer: Difficulty: Reference: L.O.:

22.

A Medium Ensuring Business Continuity Understand how to ensure business continuity

A Easy Intrusion Prevention Understand how to prevent intrusion

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is ‘idle’ for a certain amount of time e. performing social engineering Answer: Difficulty: Reference: L.O.:

E Medium Intrusion Prevention Understand how to prevent intrusion


23.

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above Answer: Difficulty: Reference: L.O.:

24.

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable Answer: Difficulty: Reference: L.O.:

25.

A Easy Intrusion Prevention Understand how to prevent intrusion

Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics Answer: Difficulty: Reference: L.O.:

26.

A Medium Intrusion Prevention Understand how to prevent intrusion

D Medium Intrusion Prevention Understand how to prevent intrusion

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming Answer: Difficulty: Reference: L.O.:

A Easy Intrusion Prevention Understand how to prevent intrusion


27.

Which of the following is not a method for deterring outside intruders from gaining access to the organization’s office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices Answer: Difficulty: Reference: L.O.:

28.

A sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program Answer: Difficulty: Reference: L.O.:

29.

D Medium Intrusion Prevention Understand how to prevent intrusion

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering Answer: Difficulty: Reference: L.O.:

30.

E Easy Intrusion Prevention Understand how to prevent intrusion

A Medium Intrusion Prevention Understand how to prevent intrusion

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion. Answer: Difficulty: Reference: L.O.:

C Medium Intrusion Prevention Understand how to prevent intrusion


31.

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization’s network. a. firewall b. token system c. ANI d. call-back modem e. firefighter Answer: Difficulty: Reference: L.O.:

32.

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall Answer: Difficulty: Reference: L.O.:

33.

A Medium Intrusion Prevention Understand how to prevent intrusion

A Easy Intrusion Prevention Understand how to prevent intrusion

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization’s networks Answer: Difficulty: Reference: L.O.:

A Medium Intrusion Prevention Understand how to prevent intrusion


34.

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization’s networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall Answer: Difficulty: Reference: L.O.:

35.

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub Answer: Difficulty: Reference: L.O.:

36.

A Medium Intrusion Prevention Understand how to prevent intrusion

B Easy Intrusion Prevention Understand how to prevent intrusion

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system Answer: Difficulty: Reference: L.O.:

A Medium Intrusion Prevention Understand how to prevent intrusion


37.

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches Answer: Difficulty: Reference: L.O.:

38.

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring Answer: Difficulty: Reference: L.O.:

39.

C Medium Intrusion Prevention Understand how to prevent intrusion

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules Answer: Difficulty: Reference: L.O.:

40.

C Medium Intrusion Prevention Understand how to prevent intrusion

D Medium Intrusion Prevention Understand how to prevent intrusion

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits Answer: Difficulty: Reference: L.O.:

A Easy Intrusion Prevention Understand how to prevent intrusion


41.

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard Answer: Difficulty: Reference: L.O.:

42.

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm Answer: Difficulty: Reference: L.O.:

43.

C Medium Intrusion Prevention Understand how to prevent intrusion

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids Answer: Difficulty: Reference: L.O.:

44.

A Easy Intrusion Prevention Understand how to prevent intrusion

A Medium Intrusion Prevention Understand how to prevent intrusion

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board Answer: Difficulty: Reference: L.O.:

D Medium Intrusion Prevention Understand how to prevent intrusion


45.

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode Answer: Difficulty: Reference: L.O.:

46.

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter Answer: Difficulty: Reference: L.O.:

47.

C Medium Intrusion Prevention Understand how to prevent intrusion

Which of the following is not true about one-time passwords? a. Users’ pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system. Answer: Difficulty: Reference: L.O.:

48.

D Medium Intrusion Prevention Understand how to prevent intrusion

E Medium Intrusion Prevention Understand how to prevent intrusion

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above is an appropriate answer Answer: Difficulty: Reference: L.O.:

B Easy Intrusion Prevention Understand how to prevent intrusion


49.

A fundamental technique to determine if an intrusion is in progress in a stable network is: a. anomaly detection b. armoring cable c. RSA algorithm d. patching e. scanning a user’s fingerprint Answer: Difficulty: Reference: L.O.:

50.

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES Answer: Difficulty: Reference: L.O.:

51.

A Medium Intrusion Prevention Understand how to prevent intrusion

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection Answer: Difficulty: Reference: L.O.:

52.

A Medium Intrusion Prevention Understand how to prevent intrusion

D Medium Intrusion Prevention Understand how to prevent intrusion

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth Answer: A Difficulty: Medium Reference: Introduction L.O.: Be familiar with the major threats to network security


53.

54.

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks Answer: C Difficulty: Medium Reference: Introduction L.O.: Be familiar with the major threats to network security Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety Answer: D Difficulty: Medium Reference: Risk Assessment L.O.: Be familiar with how to conduct a risk assessment

55.

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks Answer: A Difficulty: Medium Reference: Risk Assessment L.O.: Be familiar with how to conduct a risk assessment

56.

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event Answer: C Difficulty: Medium Reference: Risk Assessment L.O.: Be familiar with how to conduct a risk assessment


Short Answer and Essay Questions: 1. Using a chart format, describe 8 possible threats to a data network (such as hardware, software, files, circuits, internal personnel, physical security, external people, and users). Describe 8 possible solutions to these conceivable threats. 2. How does a packet level firewall work? Describe the proxy server function, the packet layer firewall function, the DMZ and the architecture of this design. 3. What is a packet level firewall as compared to a NAT firewall and as compared to an applications layer firewall? 4. What is IP spoofing? 5. Explain how a Trojan horse works. 6. Compare and contrast symmetric and asymmetric encryption. 7. Describe how symmetric encryption works, draw a chart of this approach. How does DES differ from 3DES? From RC4? From AES? 8. Compare and contrast DES and public key encryption. 9. Describe how asymmetric encryption works, using a chart to help to explain this approach. 10. What is PKI and why is it important? 11. How does PGP differ from SSL? How does SSL differ from IPsec? Compare and contrast IPSec tunnel mode and IPSec transfer mode. 12. Describe five biometric technologies. How can a biometric enhance security in a network? What are some of the advantages and disadvantages of biometrics? 13. How does a network manager utilize a user profile? 14. What is social engineering? 15. What is the difference between a network-based IPS, host-based IPS and application-based IPS? 16. How does IPS anomaly detection differ from misuse detection? 17. What is a honey pot? 18. Some people think that CERT’s posting of security alerts causes more break ins than it prevents. What are the pros and cons of this argument? Do you think CERT should continue to post security holes? 19. What are the most important servers to protect on a network and why? 20. Describe the three main reasons why there has been an increase in computer security over the past few years. 21. List three risk assessment frameworks that are commonly used. 22. Describe the four risk control strategies and when you might use each one.


Chapter 12 Network Management True-False Questions The following are possible True/False questions for tests. The statement is given and the answer is provided. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic are also furnished. 1.

Network managers manage the configuration management of their networks as one of their key tasks. Answer: Difficulty: Reference: L.O.:

2.

Network management is the process to operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users. Answer: Difficulty: Reference: L.O.:

3.

True Easy Introduction Understand what is required to manage the day-to-day operation of networks

If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems. Answer: Difficulty: Reference: L.O.:

4.

True Easy Introduction Understand what is required to manage the day-to-day operation of networks

False Medium Introduction Understand what is required to manage the day-to-day operation of networks

Due to changing communication technologies, most companies have combined voice and data communications functions. Answer: Difficulty: Reference: L.O.:

True Medium Introduction Understand what is required to manage the day-to-day operation of networks


5.

One of the least common configuration activities is adding and deleting user accounts. Answer: Difficulty: Reference: L.O.:

6.

One common configuration activity is updating the software on the client computers in the network. Answer: Difficulty: Reference: L.O.:

7.

True Easy Configuration Management Understand configuration management

To help in negotiating site licenses for software, it is important to document which software packages are installed on each client. Answer: Difficulty: Reference: L.O.:

10.

False Easy Configuration Management Understand configuration management

In many organizations, configuration documentation takes the form of a large set of network diagrams, one for each LAN, BN, and WAN. Answer: Difficulty: Reference: L.O.:

9.

True Easy Configuration Management Understand configuration management

Desktop Management software requires managers to install software on client computers manually. Answer: Difficulty: Reference: L.O.:

8.

False Medium Configuration Management Understand configuration management

True Easy Configuration Management Understand configuration management

User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user. Answer: Difficulty: Reference: L.O.:

True Easy Configuration Management Understand configuration management


11.

Performance management means ensuring the network is operating as efficiently as possible. Answer: Difficulty: Reference: L.O.:

12.

Network management software is used by most large organization to monitor and control their networks. Answer: Difficulty: Reference: L.O.:

13.

True Medium Performance and Fault Management Understand performance and fault management

Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments. Answer: Difficulty: Reference: L.O.:

16.

False Medium Performance and Fault Management Understand performance and fault management

Trouble tickets are reports produced by a software package that records fault information. Answer: Difficulty: Reference: L.O.:

15.

True Easy Performance and Fault Management Understand performance and fault management

Failure control requires developing a decentralized control philosophy for problem reporting. Answer: Difficulty: Reference: L.O.:

14.

True Easy Performance and Fault Management Understand performance and fault management

False Medium Performance and Fault Management Understand performance and fault management

To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network. Answer: Difficulty: Reference: L.O.:

True Medium Performance and Fault Management Understand performance and fault management


17.

Management reports can be helpful in determining network availability statistics. Answer: Difficulty: Reference: L.O.:

18.

Mean Time Between Failures is a statistic that is used to track device reliability. Answer: Difficulty: Reference: L.O.:

19.

True Medium Performance and Fault Management Understand performance and fault management

When users receive training about fundamentals of network use, they become confident about what they need to do when working on a network. Answer: Difficulty: Reference: L.O.:

22.

True Easy Performance and Fault Management Understand performance and fault management

Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider. Answer: Difficulty: Reference: L.O.:

21.

True Medium Performance and Fault Management Understand performance and fault management

Quality control charts are a simple tool that can be used by network managers to monitor network conditions. Answer: Difficulty: Reference: L.O.:

20.

True Medium Performance and Fault Management Understand performance and fault management

True Easy End User Support Be familiar with end user support

Network management software is designed primarily to provide automated support for at least some of the network management functions. Answer: Difficulty: Reference: L.O.:

True Easy Cost Management Be familiar with cost management


MULTIPLE CHOICE The following are possible multiple-choice questions for tests. The question is posed and the answer is provided under the choices. The level of difficulty (easy, medium, hard) and the section(s) relevant to the topic is also furnished. 1.

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan. a. Panicking b. Multiplexing c. Multitasking d. Firefighting e. Fireflying Answer: Difficulty: Reference: L.O.:

2.

Which of the following is not a basic function of a network manager? a. Web surfing to shop on eBay b. cost management c. performance and fault management d. configuration management e. end user support Answer: Difficulty: Reference: L.O.:

3.

D Medium Introduction Understand what is required to manage the day-to-day operation of networks

A Easy Introduction Understand what is required to manage the day-to-day operation of networks

To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. a. planning and organizing the network and networking staff b. LAN manual c. fault log d. trouble ticket e. troubleshooting log Answer: Difficulty: Reference: L.O.:

A Medium Introduction Understand what is required to manage the day-to-day operation of networks


4.

Which of the following is not considered a key management task for running a network? a. knowledge of frame relay b. planning c. organizing activities d. directing activities e. controlling activities Answer: Difficulty: Reference: L.O.:

5.

___________ refers to managing and documenting the network’s hardware and software configuration. a. Visioning b. Troubleshooting c. Firefighting d. Configuration management e. Implementation Answer: Difficulty: Reference: L.O.:

6.

A Medium Introduction Understand what is required to manage the day-to-day operation of networks

D Medium Configuration Management Understand configuration management

____________ is also called automatic software distribution. a. Electronic Data Interchange b. Software architecture c. Desktop management d. Automatic configuration management e. Email Software Uploading Answer: Difficulty: Reference: L.O.:

C Easy Configuration Management Understand configuration management


7.

Desktop management: a. increases the cost of configuration management over the long term b. requires managers to install software manually on client computers c. automatically produces documentation of software installed on each client computer d. can not maintain documentation of software installed on each client computer e. decreases costs in the short term Answer: Difficulty: Reference: L.O.:

8.

Which of the following is typically not a part of configuration documentation? a. hardware documentation b. sales brochures for new hardware products being considered by the organization c. user profiles d. network software documentation e. software documentation Answer: Difficulty: Reference: L.O.:

9.

C Medium Configuration Management Understand configuration management

B Medium Configuration Management Understand configuration management

Documentation for network and application software: a. usually does not include information about the network operating system b. usually does not include information about any special purpose network software c. includes information about which data files each user can access d. is not generally needed since networks are comprised of hardware only e. is important for monitoring adherence to software license rules Answer: Difficulty: Reference: L.O.:

E Medium Configuration Management Understand configuration management


10.

___________ ensures that the network is operating as efficiently as possible. a. Firefighting b. Fault tolerance c. Fault management d. Performance management e. Troubleshooting Answer: Difficulty: Reference: L.O.:

11.

__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software. a. Fault management b. Fault tolerance c. Firefighting d. Performance management e. Troubleshooting Answer: Difficulty: Reference: L.O.:

12.

D Easy Performance and Fault Management Understand performance and fault management

A Easy Performance and Fault Management Understand performance and fault management

____________ refers to keeping track of the operation of network circuits to make sure they are working properly. a. Network monitoring b. Fault tolerance c. Fault management d. Firefighting e. Downtime Answer: Difficulty: Reference: L.O.:

A Easy Performance and Fault Management Understand performance and fault management


13.

_____________ are used by many large and small organizations to monitor and control their networks today. a. Network management software packages b. Firefighter packages c. Fault creating packages d. Fault toleraters e. NICs Answer: Difficulty: Reference: L.O.:

14.

A Easy Performance and Fault Management Understand performance and fault management

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems. a. mission critical area b. fault tolerance department c. network operations center d. mullion delimiter agency e. Web surfing guru headquarters Answer: Difficulty: Reference: L.O.:

C Easy Performance and Fault Management Understand performance and fault management


15.

Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS? a. stats on multiplexers b. stats on modems c. stats on circuits in the network d. stats on user response times e. stats on malfunctioning devices Answer: Difficulty: Reference: L.O.:

16.

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information. a. voice-activated b. bursty c. faulty d. dumb e. intelligent Answer: Difficulty: Reference: L.O.:

17.

D Medium Performance and Fault Management Understand performance and fault management

D Easy Performance and Fault Management Understand performance and fault management

_______ are network devices that record data on the messages they process as well as performing their “normal” message processing functions. a. Faulty b. Bursty c. Trouble tickets d. Voice-activated e. Managed devices Answer: Difficulty: Reference: L.O.:

E Medium Performance and Fault Management Understand performance and fault management


18.

____________ are reports produced by numerous network software packages for recording fault information. a. Wish list documentation b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Roger systems checks Answer: Difficulty: Reference: L.O.:

19.

___________ allows the network manager to determine who is responsible for correcting any outstanding problems. a. Load balancing b. MTBF c. Availability d. Reliability e. Problem tracking Answer: Difficulty: Reference: L.O.:

20.

B Easy Performance and Fault Management Understand performance and fault management

E Easy Performance and Fault Management Understand performance and fault management

_____________ helps ensure that critical problems get priority over less important ones. a. Protocol analyzing b. Problem prioritizing c. Uptime d. Availability e. Reliability Answer: Difficulty: Reference: L.O.:

B Easy Performance and Fault Management Understand performance and fault management


21.

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. a. MTBF b. Availability c. MTTRespond d. MTTDiagnose e. MTTRate Answer: Difficulty: Reference: L.O.:

22.

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails. a. MTTDiagnose b. MTTRespond c. MTTRepair d. MTTFix e. MTBF Answer: Difficulty: Reference: L.O.:

23.

D Easy Performance and Fault Management Understand performance and fault management

E Easy Performance and Fault Management Understand performance and fault management

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. a. MTTDiagnose b. MTTRespond c. MTBF d. MTTFix e. MTTRate Answer: Difficulty: Reference: L.O.:

D Easy Performance and Fault Management Understand performance and fault management


24.

_____________ is the percentage of time the network is usable by users. a. Retransmission rate b. Availability c. MTTDiagnose d. Downtime e. MTBF Answer: Difficulty: Reference: L.O.:

25.

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. a. Quality control chart b. Quality of service c. Service leveling chart d. Desktop management e. Alarm cloud Answer: Difficulty: Reference: L.O.:

26.

B Easy Performance and Fault Management Understand performance and fault management

A Easy Performance and Fault Management Understand performance and fault management

___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. a. Service level agreements b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Wish list documentation Answer: Difficulty: Reference: L.O.:

A Easy Performance and Fault Management Understand performance and fault management


27.

Which of the following is not a main function within end user support? a. resolving network faults b. training c. resolving user problems d. spin control e. none of these answers are appropriate Answer: Difficulty: Reference: L.O.:

28.

Which of the following is not one of the three major sources of a user’s equipment problem that can be solved by network support? a. use of the CD-ROM as a cup holder b. failed hardware device c. lack of user knowledge d. incompatibility between user software and network hardware and software e. none of the above is an appropriate answer Answer: Difficulty: Reference: L.O.:

29.

D Medium End User Support Be familiar with end user support

A Easy End User Support Be familiar with end user support

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. a. firefought b. spun c. escalated d. burst e. delimited Answer: Difficulty: Reference: L.O.:

C Easy End User Support Be familiar with end user support


30.

________ is a measure of how much it costs per year to keep one computer operating. a. Web gardening b. Software installation cost c. Hardware upgrade cost d. Total cost of ownership e. Support staff cost Answer: Difficulty: Reference: L.O.:

31.

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users. a. Charge-back b. Web spinning c. Internet access fees d. Support staff billing e. ESD Answer: Difficulty: Reference: L.O.:

32.

D Easy Cost Management Be familiar with cost management

A Medium Cost Management Be familiar with cost management

Which of the following is not an important step in reducing network costs? a. moving to fat client architectures b. automating as much of the network management process as possible c. developing standards for computers on the network d. reducing the time spent manually installing new software e. centralizing help desks Answer: Difficulty: Reference: L.O.:

A Easy Cost Management Be familiar with cost management


33.

___________ provides information about configuration management on a network. a. Circuit management software b. Device management software c. System management software d. Application management software e. Desktop management software Answer: Difficulty: Reference: L.O.:

34.

Most organizations strive to resolve between _______ of requests at the first Level of support in less than an hour. a. 10% and 15% b. 20% and 30% c. 50% and 55% d. 75% and 85% e. 95% and 99% Answer: Difficulty: Reference: L.O.:

35.

D Easy End User Support Be familiar with end user support

In-class training for end users should focus on a. security exclusively b. all network topics c. 20% of the network functions that the user will use 80% of the time d. proper data entry e. the half of the applications that this particular uses most of the time Answer: Difficulty: Reference: L.O.:

36.

E Medium Configuration Management Understand configuration management

C Easy End User Support Be familiar with end user support

A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as “wasted” time is referred to as a. total cost of ownership b. network cost of ownership c. transactions costs d. ownership privileges e. total direct costs Answer: Difficulty: Reference: L.O.:

C Easy Cost Management Be familiar with cost management


Short Answer and Essay Questions: 1. What do network managers do, and what are their key tasks? What is the most important of these tasks in order to avoid constant firefighting? 2. Describe the process of managing network performance and fault management, including network monitoring, failure control, and problem resolution. 3. Describe "total cost of ownership." 4. Compare total cost of ownership and network cost of ownership. 5. List and describe 5 steps a network manager might use to reduce costs. 6. What are some differences between LAN and WAN management? 7. Describe why a shift has occurred towards LANs and the Internet. 8. Why is desktop management important? 9. What can be done to improve performance on networks? 10. Why is user training so important? 11. Problems with user equipment (as distinct from network equipment) usually stem from three major sources. Describe each of these problems.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.