This site is 100% ad supported. Please add an exception to adblock for this site.

Networking Media Chapter 2

Terms

undefined, object
copy deck
What was the first type of microcomputer network to be implemented?

A. MAN
B. WAN
C. LAN
D. PAN
C. LAN
Using modem connections, how many modems would it take to allow connections from ten individuals computers within the same location?

A. One
B. Five
C. Ten
D. Fifteen
C. Ten
What is the information that is "burned in" to tanetwork interface card?

A. NIC
B. MAC address
C. Hub
D. LAN
B. MAC address
Which topology has all its nodes connected directly to one center point and has no other connections between nodes?

A. Bus
B. Ring
C. Star
D. Mesh
C. Star
What do TIA and EIA stand for?

A. Television INdustry Association, Electronic Industries Association

B. Telecommunications Industry Association, Electronic Industries Alliance

C. Telecommunications Industry Alliance, Elec
B. Telecommunications Industry Association, Electronic Industries Alliance
LANs are designed to do which of the following? (Select all that apply.)

A. Operate within a limited geographic area

B. Allow many users to access high-bandwidth media

C. Connect to the Internet

D. Provide full
A. Operate within a limited geographic area

B. Allow many users to access high-bandwidth media

D. Provide full-time connectivity to local services
Which of the following statements best describes a WAN?

A. It connects LANs that are separated by a large geographic area.

B. It connects workstations, terminals, and other devices in a metropolitan area.

C. It connects L
A. It connects LANs that are separated by a large geographic area.
Which of the following statements correctly describes a MAN?

A. A MAN is a network that connects workstations, peripherals, teminals, and other devices in a single building.

B. A MAN is a network that serves users across a broad geo
C. A MAN is a network that spans a metropolitan area such as a city or suburban area.
Which of the following is not one of the features of a SAN?

A. SANs enable concurrent access of disk or tape arrays, provifing enhabced system performance.

B. SANs provide a reliable disaster recovery solution.

C. SANs ar
D. SANs minimize system and data availability.
What service offers secure, reliable connectivity over a shared public network infrastructure?

A. Internet
B. Virtual private network
C. Virtual public network
D. WAN
B. Virtual private network
What links enterprise customer headquarters, remote offices, and branch offices to an internal network over a shared infrastructre?

A. Access VPN
B. Intranet VPN
C. Extranet VPN
D. Internet VPN
B. Intranet VPN
What is the name of the part of a company's LAN that is made available to select parties such as employees, customers, and aprtners?

A. The Internet
B. The extranet
C. The intranet
D. The LAN
B. The extranet
What is the movement of data through layers?

A. Wrapping
B. Encapsulation
C. Traveling
D. Transmission
B. Encapsulation
The OSI model has how many laters?

A. Four
B. Five
C. Six
D. Seven
D. Seven
What is the OSI model?

A. A conceptual framework that specifies how information travels through networks.

B. A model that describes how data makes its way from one application program to another throughout a network.

C. A
D. All of the above

A. A conceptual framework that specifies how information travels through networks.

B. A model that describes how data makes its way from one application program to another throughout a network.

C. A conceptual framework that specifies which network functions occur at each layer.
Which of the following is the correct order of the network layers?

A.
1:Physical
2:Data link
3:Transport
4:Network
5:Presentaion
6:Session
7:Application

B.
1:Physical
2:Data link
3:N
B.
1:Physical
2:Data link
3:Network
4:Transport
5:Session
6:Presentaion
7:Application
Which layer of the OSI model handles physical addressing, network topology, network access, and flow control?

A. The physical layer
B. The data link layer
C. The transport layer
D. The network layer
B. The data link layer
Which of the folowing best defines encapsulation?

A. Segmenting data so that it flows uninterrupted through the network

B. Compressing data so that it moves faster

C. Moving data in froups so tha it stays together
D. Wrapping data in a particular protocol header
An e-mail message is sent from Host A to Host B on a LAN. Before this message can be sent, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed?

A. The packet is transmitted along the
B. The packet is encapsulated into a frame.
In the TCP/IP model, which layer deals with reliability, flow control, and error correction?

A. Application
B. Transport
C. Internet
D. Network access
B. Transport
Repeaters can provide a simple solution for what problem?

A. Too many types of incompatible equipment on the network

B. Too much traffic on a network

C. Too-slow convergence rates

D. Too much distance between n
D. Too much distance between nodes or not enough cable
Which of the following is true of bridge and its forwarding decisions?

A. Bridges operate at OSI Layer 2 and use IP addresses to make decisions.

B. Bridges operate at OSI Layer 3 and use IP addresses to make decisions.

C.
C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.
Which of the following is true of a swithc's function?

A. Swutcges uncrease the size of collision domains.

B. Switches combine the connectivity of a hub with the capability to filter or flood trafic based on the destination MAC addr
B. Switches combine the connectivity of a hub with the capability to filter or flood trafic based on the destination MAC address of the frame.
What does a router route?

A. Layer 1 bits
B. Layer 2 frames
C. Layer 3 packets
D. Layer 4 segments
C. Layer 3 packets
What is/are the function(s) of a AAA server? (Select all that apply.)

A. To ensure that only authenticated users can get into the network

B. To ensure that the users are allowed access to only the resources they need

C. T
D. All of the above.

A. To ensure that only authenticated users can get into the network

B. To ensure that the users are allowed access to only the resources they need

C. To ensure that records are kept of everything the authentic users do after they ar eallowed entey.

Deck Info

25

permalink