Cayf12e Testbank 07 - Network
Cayf12e Testbank 07 - Network
Cayf12e Testbank 07 - Network
5) Which of the following network devices has the capability to determine the best path to
transmit data and determine alternative pathways?
A) Router
B) Switch
C) Pathfinder
D) Director
1
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
A) Lack of privacy
B) Loss of autonomy
C) Sharing important information
D) Security issues
9) Which of the following is the approximate effective inside range for wireless LAN signals?
A) 2,500 to 3,500 feet
B) 500 to 1,500 feet
C) 125 to 300 feet
D) 1 mile
10) How do most wireless LANs ensure security with radio transmission?
A) By using a random series of frequencies
B) By scrambling the signals
C) By splitting the signals
D) All of the above
11) A local area network (LAN) in which all the computers are equals is called a(n) ________
network.
A) equal resource
B) peer-to-peer
C) client/server
D) equal sharing
12) A VPN operates as a private network over which larger type of network?
A) LAN
B) WAN
C) Internet
D) Governmental network
2
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16) In a(n) ________ topology, the network nodes are connected to a central hub or switch.
A) star
B) hierarchical
C) layered
D) ring
17) Limitations of the bus topology include all of the following EXCEPT:
A) loss of signal strength.
B) length restrictions.
C) breakage in the ring.
D) number of nodes.
18) A ________ is a simple broadcast device that does not manage traffic and usually results in
frequent collisions.
A) plug
B) centralized computer
C) hub
D) switch
21) ________ protocols are used to ensure that modems can communicate with each other.
A) MMT
B) TCP/IP
C) Modulation
D) Oscillation
3
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
D) Error checking standards
24) Because of their complexity, networks use an architecture that is divided into separate
network:
A) levels.
B) modules.
C) layers.
D) elements.
26) Which of the following types of media is used to connect today's Ethernet star network?
A) Twisted-pair wire
B) Coaxial cable
C) Phone lines
D) Microwave signals
27) Because a network's layers are arranged vertically similar to the floors in a building, with
each "floor" having its own protocols, the layers are known as a:
A) protocol suite.
B) protocol stack.
C) modulation protocols.
D) top-down protocols.
31) Which of the following features enable the strongest WiFi encryption protection?
4
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
A) WEP
B) WDDI
C) WAP
D) WPA
32) The ________ standard is used for Bluetooth technology and has a very short range (up to 10
meters).
A) 802.15
B) 802.11n
C) 802.11g
D) 802.16
33) ________, where networked computers work on small pieces of large complex tasks, is
revolutionizing research in a number of areas.
A) Complex-parceling
B) Distributed computing
C) Shared resources
D) Group work
35) To carry computer data over the long haul, WANs need to have a(n) ________ in multiple
towns and cities.
A) ISP
B) router
C) POP
D) hub
36) Which of the following is the name for the high-capacity transmission lines that carry WAN
traffic?
A) Negotiators
B) Backbones
C) Coaxial cables
D) Cores
5
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
A) five sets of numbers separated by periods.
B) four sets of numbers separated by periods.
C) five sets of numbers separated by commas.
D) four sets of numbers separated by commas.
40) Which of the following is the maximum transfer speed for all digital line protocols such as
switched multimegabit data service (SMDS)?
A) 11 Mbps
B) 56 Kbps
C) 1 Gbps
D) 155 Mbps
41) A(n) ________ is comprised of several linked computer systems exchanging and sharing
data and resources.
42) ________ area networks use cables, radio waves, or infrared transmissions to connect
computers and peripherals devices.
46) Each node on a network has a unique name or ________ address assigned by the software in
use.
47) A wireless access point is commonly used as a bridge between a wireless node and a(n)
________ network.
48) Whether wired or wireless, LANs can be differentiated by the networking ________ they
use.
50) ________ occurs when two or more computers try access the LAN at the same time.
51) A(n) ________ topology solves the expansion problems of the bus topology by using a
central switch.
52) A network in which each node is connected to the line is called a(n) ________ topology.
6
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
53) A network using a ring topology uses a(n) ________ to prevent collisions.
54) A(n) ________ is a simple broadcast device that does not manage traffic and usually results
in frequent collisions.
55) A(n) ________ home, which was manufactured and decorated from recycled and reusable
resources is located in Chicago's Museum of Science and Industry.
56) The standards that allow network-connected devices to communicate with each other are
called ________.
57) Network protocols are fixed, formalized exchanges that specify how dissimilar network
components can establish ________.
58) The rate at which two modems can exchange data is known as the data-________ rate.
62) When ________ switching is used, data is transmitted over a physical end-to-end circuit
between the sending and receiving computers.
63) The delay found in packet-switching networks due to the examination of individual packets
by multiple routers is called ________.
65) Home ________ networks are wireless networks in which each computer on the network
broadcasts its information to another using radio signals.
68) The physical address of a network node is assigned by the software in use.
69) A wireless access point is commonly used as a bridge between a wireless and a wired
network.
7
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
72) VPN is the acronym for virtual public network.
74) Many businesses use VPNs to provide their employees and customers with a quick, secure
access to corporate information.
75) In a P2P network, users can choose which files they wish to share.
76) With respect to wireless networks, it is important to properly secure your network and data,
due to the fact that signals can extend beyond the walls of your home.
78) Hubs are the only central wiring devices available to use the star topology.
79) A gigaPoP is a POP that provides access to a backbone service capable of data transfer rates
exceeding 1 Gbps.
83) Circuit switching works best when avoiding delivery delays is essential.
89) With packet switching, the message is sent over a physical end-to-end circuit.
90) The term wireless access point is used to describe a node on a network that acts as a receiver
and transmitter of wireless radio signals between other nodes on a network.
8
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
E) Special connector at the end of a bus
F) Has all nodes attached in a circular wiring arrangement
91) Collision
92) Contention
93) Terminator
94) Switch
95) Token
98) POP
99) SMDS
100) X.25
9
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall