• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/230

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

230 Cards in this Set

  • Front
  • Back
Which of the following allows the sharing of resources and central location management for multiple computers?
A. Workstations
B. Clients
C. Stand-alone computers
D. Networks
D. Networks
Chapter 1
What network design offers simplicity in configuration and low costs to set up and maintain?
A. Client/Server
B. peer-to-peer
C. Bus Topology
D. Wide Area Network (WAN)
B. peer-to-peer
Chapter 1
Which of the following is an advantage of a client/server network?
A. it is simple to configure
B. It can connect more than a handful of computers on a network.
C. It is often suitable for environments in which saving money is critical.
D. It avoids scalability.
B. It can connect more than a handful of computers on a network.
Chapter 1
What term describes the phenomenon of offering multiple types of communications services on the same network?
A. Unified communications
B. Convergence
C. Hybrid network topology
D. Client/server architecture
B. Convergence
Chapter 1
Which network function is the oldest and still most frequently used?
A. Internet Services
B. Print services
C. Remote access services
D. Mail services
D. Mail services
Chapter 1
The simplest form of a network is a client-server network. (T/F)
False
Chapter 1
A segment is part of a network usually composed of a group of nodes that use the same communications channel for all their traffic. (T/F)
True
Chapter 1
General technical skills are not useful in assisting network professionals who choose to specialize in a particular area. (T/F)
False
Chapter 1
Soft Skills refer to those skills that are easily measureable. (T/F)
False
Chapter 1
The Association for Computing Machinery (ACM) is the most advantageous and highly respected professional organization in the industry today. (T/F)
False
Chapter 1
A(n) ________ is a group of computers and other devices that are connected by some type of transmission media.
network
Chapter 1
In a(n) ___________ network, every computer can communicate directly with every other computer.
peer-to-peer
Chapter 1
Client/server networks are more ________ than peer-to-peer networks, meaning client/server networks can be more easily added onto and extended than peer-to-peer networks.
scalable
Chapter 1
The functions provided by a network are usually referred to as ________ _________.
network services.
Chapter 1
The process of proving your mastery in material pertaining to a particular hardware system, operating system, programming language, or software application by passing a series of exams is known as _____________.
certification.
Chapter 1
Which of the following is the acceptable performance level of a product or service as defined by a standard?
A. maximum
B. minimum
C. standard
D. ideal
B. minimum
Chapter 2
What international society is composed of engineering professionals with a goal of promoting the development and education in the electrical engineering and computer science fields?
A. ANSI
B. IEA
C. IEEE
D. ISO
C. IEEE
Chapter 2
Which OSI model layer accepts data from the Session layer and manages end-to-end delivery of data?
A. Network
B. Physical
C. Data link
D. Transport
D. Transport
Chapter 2
Which type of address contains subsets of data that incrementally narrow the location of a node?
A. Network
B. Physical
C. Logical
D. Segmented
A. Network
Chapter 2
Which OSI model layer divides data received from the Network layer into distinct frames that can then be transmitted by the Physical layer.
A. Transport
B. Application
C. Session
D. Data link
D. Data link
Chapter 2
Standards help to assure network designers that hardware and software from different manufacturers will work together. (T/F)
True
Chapter 2
The OSI model is a physical representation of what happens between two nodes communicating on a network. (T/F)
False
Chapter 2
Software applications such as Microsoft Word or Excel may be found in the OSI model's application layer. (T/F)
False
Chapter 2
The OSI model's Presentation layer serves as a translator. (T/F)
True
Chapter 2
Most LAN's will support both Ethernet and token ring frames. (T/F)
False
Chapter 2
The ANSI (American National Standards Institute) organization does not dictate that manufacturers comply with its standards, but it requests _________ compliance.
voluntary
Chapter 2
A(n) ________ ________ ________ is a not-for-profit agency that manages the distribution of IP addresses to private and public entities.
Regional Internet Registry (RIR)
Chapter 2
A helpful model for understanding and developing computer-to-computer communications over a network is known as the ____ model.
OSI (Open Systems Interconnect)
Chapter 2
A user or device initiates a data exchange through the OSI ___________ layer.
application
Chapter 2
______________ occurs when OSI data link layer protocols add a header to the front of each packet and a trailer to the end of each packet to make frames.
Encapsulation
Chapter 2
What terms characterize data transmission by the direction signals may travel over media?
A. Noise, throughput, attenuation, and latency
B. Amplitude, frequency, wavelength, and phase
C. Simplex, half-duplex, full-duplex, and multiplex
D. Multiplexing
C. Simplex, half-duplex, full-duplex, and multiplex
Chapter 3
Which of the following describes the loss of signal as it travels away from its source?
A. Noise
B. Crosstalk
C. Attenuation
D. Latency
C. Attenuation
Chapter 3
What is the most significant factor in choosing a transmission method?
A. Noise
B. Throughput
C. Cost
D. Scalability
B. Throughput
Chapter 3
What cabling consists of one or more insulated wire pairs in a plastic sheath?
A. Coaxial
B. STP (Shielded twisted pair)
C. UTP (unshielded twisted pair)
D. Fiber
C. UTP (unshielded twisted pair)
Chapter 3
What type of fiber uses a small-diameter core?
A. mini-mode
B. Unimode
C. Multimode
D. Single-mode
D. Single-mode
Chapter 3
Digital signals are composed of pulses of precise, positive voltages and zero voltages. (T/F)
True
Chapter 3
Throughput is the measure of how much data is transmitted during a given period of time. (T/F)
True
Chapter 3
Broadband is a transmission form in which (typically) digital signals are sent through direct current (DC) pulses applied to the wire. (T/F)
False
Chapter 3
Because of shielding, most coaxial cable has a high resistance to noise. (T/F)
True
Chapter 3
A layer of glass or plastic surrounding the fibers in a fiber-optic cable is called cladding. (T/F)
True
Chapter 3
_________ is a term used by networking professionals to describe the non-data information that must accompany data for a signal to be properly routed and interpreted by the network.
Overhead
Chapter 3
In ___________ , a simple wave, called a carrier wave, is combined with another analog signal to produce a unique signal that gets transmitted from one node to another.
modulation
Chapter 3
A form of transmission that allows multiple signals to travel simultaneously over one medium is known as _____________.
multiplexing
Chapter 3
If you terminate the RJ-45 plugs at both ends of a patch cable identically, following one of the TIA/EIA 568 standards, you will create a(n) ________ _______ cable.
straight-through
Chapter 3
When connecting DTE (data terminal equipment) and DCE (data circuit-terminating equipment) using a serial cable, EIA/TIA has codified a popular serial data transmission method known as ______.
RS-232 (Recomended Standard 232)
Which TCP/IP core protocol operates in the Network layer of the OSI model as a connectionless protocol?
A. TCP
B. UDP
C. IP
D. ICMP
C. IP
Chapter 4
Which IPv4 network class address contains a first octet in the range of 128 to 191?
A. Class A
B. Class B
C. Class C
D. Class D
B. Class B
Chapter 4
How many bits are in an IPv6 address?
A. 32
B. 64
C. 128
D. 256
C. 128
Chapter 4
In the domain name www.google.com, which of the following describes the label for com?
A. Top-level domain (TLD)
B. Second-level domain
C. Third-level domain
D. Host-level domain
A. Top-level domain (TLD)
Chapter 4
Which TCP/IP appliction protocol allows users to log on to remote hosts?
A. Ping
B. FTP
C. NNTP
D. Telnet
D. Telnet
Chapter 4
RARP maps MAC addresses to host IP Addresses. (T/F)
False
Chapter 4
BOOTP provides a way to manually assign static IP addresses. (T/F)
False
Chapter 4
In IPv6, the loopback address has a value of 0:0:0:0:0:0:0:1. (T/F)
True
Chapter 4
The term namespace refers to the database of Internet IP addresses and their associated names. (T/F)
True
Chapter 4
DNS (Domain Name System or Domain Name Service) is a hierarchical way of tracking domain names and their addresses. (T/F)
True
Chapter4
A(n) _________ protocol carries Network layer addressing information that can be interpreted by a router.
routable
Chapter 4
In the IPv4 ______ ______ ________, a decimal number between 0 and 255 represents each binary octet and a period, or dot, seperates each decimal.
dotted decimal notation
chapter 4
A(n) ______ _____ is a special 32-bit number that, when combined with the device's IP address, informs the rest of the network about the segment or network to which the device is attached.
subnet mask
Chapter 4
______ provides a Microsoft Windows 98, Me, 2000, XP, Vista, Windows Server 2003, and Windows Server 2008 operating systems computer with an IP address automaticlly if a DHCP server is unavailable.
APIPA (Automatic Private IP Addressing)
Chapter 4
A process's port number plus it's host machine's IP address equals the process's ______.
socket
Chapter 4
Class A network contains?
A. 1-126
B. 127
C. 128-191
D. 192-223
A. 1-126
Chapter 4
Class B network contains?
A. 1-126
B. 127
C. 128-191
D. 192-223
C. 128-191
Chapter 4
Class C network contains?
A. 1-126
B. 127
C. 128-191
D. 192-223
D. 192-223
Chapter 4
IPv4 Loopback address
A. 0:0:0:0:0:0:0:1
B. 127.0.0.1
C. ipconfig /all
D. 169.254.0.0
B. 127.0.0.1
Chapter 4
APIPA (Automatic Private IP Addressing) reserved set of IP addresses.
A. 0:0:0:0:0:0:0:1
B. 127.0.0.1
C. ipconfig /all
D. 169.254.0.0 -169.254.255.255
D. 169.254.0.0 -169.254.255.255
Chapter 4
Which of the following describes a ring topology?
A. A single cable connects all nodes on a network without intervening connectivity devices.
B. Each node is connected to the two nearest nodes so that the entire network forms a circle.
C. Every node on the network is connected through a central device, such as a hub, router, or switch.
D. Signals follow a circular path between sender and receiver.
B. Each node is connected to the two nearest nodes so that the entire network forms a circle.
Chapter 5
A star-wired bus is referred to as which of the following topology types?
A. Physical
B. Logical
C. Hybrid
D. Backbone
C. Hybrid
Chapter 5
Which of the following has a backbone network topology that uses arouter or switch as the single central connection point for multiple subnetworks?
A. serial
B. Distributed
C. Collapsed
D. Parallel
C. Collapsed
Chapter 5
What switching technique establishes a connection between two network nodes before transmitting data?
A. Circuit switching
B. Messaging switching
C. Packet switching
D. MPLS (Multiple Lable Switching)
A. Circuit switching
Chapter 5
Which of the following is a 10-Gigabyte Fiber-optic Ethernet standard?
A. 10GBase-LR
B. 10Base-T
C. 10GBase-T
D. 100Base-FX
A. 10GBase-LR
Chapter 5
The most common logical topologies are bus and ring. (T/F)
True
Chapter 5
Connecting two or more internetworking devices by a sigle cable in a daisy-chain fasion makes the serial network backbone complex. (T/F)
False
Chapter 5
The most popular method for connecting nodes on a network is packet switching. (T/F)
True
Chapter 5
On heavily trafficked Ethernet network segments, collisions are fairly common. (T/F)
True
Chapter 5
The various Ethernet standards for copper cable utilize encoding methods that affect maximum throughput, segment length, and wiring requirements. (T/F)
True
Chapter 5
A physical _________ is the physical layout, or pattern, of the nodes on a network.
topology
Chapter 5
The term ________ _________ refers to the way in which data is transmitted between nodes.
logical topology
Chapter 5
All Ethernet networks use the _______ access method.
SCMA/CD (Carrier Sense Multiple Access with Collision Detection)
Chapter 5
Most modern networks rely on _________ frames.
Ethernet II (DIX)
Chapter 5
The IEEE 802.3af standard, which specifies a method for supplying electrical power over Ethernet connections, is also known as ____.
PoE (Power over Ethernet)
Chapter 5
Which bus type allows a NIC to be attached externally?
A. PCI
B. PCIe
C. PCMCIA
D. ISA
C. PCMCIA
Chapter 6
Which device acts most like a router?
A. OSI model Layer 1 repeater
B. OSI model Layer 2 hub
C. OSI model Layer 2 bridge
D. OSI model Layer 3 switch
D. OSI model Layer 3 switch
Chapter 6
Which term identifies a router category that directs data between nodes on an autonomous LAN?
A. Interior
B. Exterior
C. Border
D. Gateway
A. Interior
Chapter 6
Which routing technique is used to program a router to use specific paths between nodes?
A. Dynamic routing
B. Static routing
C. Interior routing
D. Exterior routing
B. Static routing
Chapter 6
Which routing protocol is commonly used on LANs that use exclusively Cisco router?
A. RIPv2
B. OSPF
C. BGP
D. EIGRP
D. EIGRP
Chapter 6
When choosing a NIC for your workstation or server, the most critical factor is transmission speed. (T/F)
False
Chapter 6
EEPROM is a particular type of ROM with data that can be erased or changed by applying electrical charges to the chip. (T/F)
True
Chapter 6
Bridges can move data more rapidly than traditional routers. (T/F)
True
Chapter 6
Routers are protocol dependant. (T/F)
True
Chapter 6
Routing protocols are the same as routable protocols, such as TCP/IP. (T/F)
False
Chapter 6
A(n) _________ is the simplest type of connectivity device that simply regenerates a digital signal.
repeater
Chapter 6
A(n) ____ is a repeater with more than one output port.
hub
Chapter 6
A(n) _______ is a device that connects two network segments by analyzing incoming frames and making decisions about where to direct them based on each frame's MAC address.
bridge
Chapter 6
A switch running in ___________ mode reads a frame's header and decides where to forward the data before it receives the entire packet.
cut-through
Chapter 6
_________ are combinations of networking hardware and software that connect two dissimilar kinds of networks.
Gateways
Chapter 6
Which WAN topology is practical for connecting fewer than four or five locations?
A. Star
B. Mesh
C. Ring
D. Partial-mesh
C. Ring
Chapter 7
What is a disadvantage of using the PSTN for an Internet connection?
A. High cost
B. Marginal security
C. Complexity
D. Lack of availability
B. Marginal security
Chapter 7
Which type of DSL would a bank's branch office that sends large volumes of account information to the central server at the bank's headquarters and, in turn, receives large amounts of account information from the central server at the bank's headquarters, require?
A. ADSL
B. HDSL
C. G.Lite
D. VDSL
B. HDSL
Chapter 7
What advantage is gained from ATM's fixed-size, 53-byte packet?
A. Increased throughput
B. Less overhead
C. Predictable network performance
D. Low costs for small networks
C. Predictable network performance
Chapter 7
Which WAN technology is the best choice for linking WANs between North America, Europe, and Asia?
A. SONET
B. Frame Relay
C. ATM
D. Broadband
A. SONET
Chapter 7
WANs typically send data over pubicly available communications networks (T/F)
True
Chapter 7
A bus WAN topology scales well. (T/F)
False
Chapter 7
Broadband cable is a symmetrical technology. (T/F)
False
Chapter 7
The speed of a T-carrier depends on its signal leverl (T/F)
True
Chapter 7
Remote access is a service that allows a client to connect with and log on to a LAN or WAN in a different geographical location. (T/F)
True
Chapter 7
A(n) _____ topology WAN incorporates many directly interconnected sites such that data can travel directly from its origin to its destination.
mesh
Chapter 7
In a(n) _______ topology WAN, sites connected in a star or ring formations are interconnected at different levels, with the interconnection points being organized into layers to form hierarchical groupings.
tiered
Chapter 7
A(n) _____ refers to the network of lines and carrier equipment that provides telephone service to most homes and businesses.
PSTN (Public Service Telephone Network)
Chapter 7
The dial-up networking software that Microsoft provided with Windows 95, 98, NT, and 2000 client operating systems is called ____.
RAS (Remote Access Service)
Chapter 7
_______ ________ _________ allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.
Remote virtual computing
Chapter 7
Which antenna type issues and receives wireless signals with equal strength and clarity in all directions?
A. Radiant
B. Omnidirectional
C. Directional
D. Unidirectional
B. Omnidirectional
Chapter 8
Which wireless frequency band do the newer types of WLANs use?
A. 1.2GHz
B. 2.4GHz
C. 5GHz
D. 50GHz
C. 5GHz
Chapter 8
Which term describes the use of multiple frequeencies to transmit a signal?
A. spread-spectrum technology
B. broadband
C. Narrowband
D. full-duplexing
A. spread-spectrum technology
Chapter 8
What innovation in the 802.11n standard combines two adjacent 20MHz channels to make a 40MHz channel that achieves high throughput?
A. MIMI (Multiple input-multiple output)
B. Channel bonding
C. Higher modulation rates
D. Frame aggragation
B. Channel bonding
Chapter 8
Which Internet service type makes more sense on a citywide network?
A. Satellite
B. Wi-Fi
C. WiMAX
D. Broadband
C. WiMAX
Chapter 8
Attenuation is the most severe flaw affecting wireless signals. (T/F)
False
Chapter 8
As long as a receiver is within the range to receive accurate signals consistently, signals will remain intelligible. (T/F)
False
Chapter 8
In most WLAN scenarios, stations must remain within 600 feet of an access point to maintain optimal transmission speeds. (T/F)
False
Chapter 8
WiMAX is not available to residential customers. (T/F)
False
Chapter 8
In satellite return Internet access service, a subscriber sends and receives data to and from the internet using a satellite uplink and downlink. (T/F)
True
Chapter 8
In _______ wireless, the receiver can be located anywhere within the transmitter's range.
mobile
Chapter 8
__________ is a mobile wireless networking standard that uses FHSS (frequency hopping spread spectrum) RF signals in the 2.4GHz band.
Bluetooth
Chapter 8
A(n) _____ _______ assesses client requirements, facility characteristics, and coverage areas to determine an access point arrangment that will ensure reliable wireless connectivity within a given area.
site survey
Chapter 8
Collectively, the 802.16 standards are known as ______.
WiMAX (Worldwide Interoperability for Microwave Access)
Chapter 8
_______________ orbiting satellites are the type used by the most popular satellite Internet access service providers.
Geosynchronous
Chapter 8
Which item identifies one of the most important functions of an NOS?
A. Client support
B. Remote user connectivity
C. Network element monitoring
D. Data backup and recovery
A. Client support
Chapter 9
Which type of licensing allows an unlimited number of users to legally access an application for a fixed price?
A. per seat
B. site
C. per user
D. Per system
B. site
Chapter 9
Which is the minimum processor requirement for the Windows 2008 Server Standard Edition?
A. 1GHz Processor
B. 2GHz Processor
C. Intel-based system with a Pentium-class processor
D. Intel-compatible x86 processor
A. 1GHz Processor
Chapter 9
What is the minimum amount of RAM required for a Linux server
A. 64MB
B. 512MB
C. 1,024MB
D. 2,048MB
A. 64MB
Chapter 9
Which operating system is proprietary?
A. Red Hat
B. Fedora
C. Solaris
D. Ubuntu
C. Solaris
Chapter 9
The components included in each NOS and every version of a particular NOS vary. (T/F)
True
Chapter 9
One difference between NOSs is the file access protocol that enables one system to access resources stored on another system on the network. (T/F)
True
Chapter 9
In most cases, an organization designates an administrator as the print server in charge of managing print services. (T/F)
False
Chapter 9
A process is a self-contained, well-defined task within a thread. (T/F)
False
Chapter 9
In all flavors of UNIX, the use of a GUI (graphical user interface) remains optional. (T/F)
True
Chapter 9
A service on the client workstation, called the ___________, intercepts requests to determine whether they should he handled by the client or by the server.
redirector
Chapter 9
In some instances, a piece of software called ___________ is necessary to translate requests and responses between the client and server.
middleware
Chapter 9
In LDAP-compatible directories, a(n) _______ is the set of definitions of the kinds of objects and object-related information that the directory can contain.
schema
Chapter 9
To better organize and manage objects, a network administrator places objects in containers, or ____, which are logically defined receptacles that serve only to assemble similar objects.
OUs (Organizational Units)
Chapter 9
Computers running UNIX or Linux also make use of network file systems, which are analogous to Windows ______.
shares
Chapter 9
What is the disadvantage of classful addressing?
A. Security
B. Poor performance
C. Troubleshooting mechanisms
D. Network traffic separation
D. Network traffic separation
Chapter 10
Which term describes an IP address that cannot be assigned to a network interface on a node or used as subnet mask?
A. Host ID
B. MAC ID
C. Router ID
D. Network ID
D. Network ID
Chapter 10
Which term describes a network that any user may access with little or no restrictions?
A. Open source
B. Public
C. Proprietary
D. Private
B. Public
Chapter 10
Which mail retrieval protocol alows users to store messages on the mail server, rather than always having to download them to the local machine?
A. SMTP (Simple Mail Transfer Protocol)
B. IMAP (Internet Message Access Protocol)
C. POP (Post Office Protocol)
D. MIME
B. IMAP (Internet Message Access Protocol)
Chapter 10
Which Windows command is used to reveal a computer's TCP/IP settings?
A. ifconfig
B. ipconfig
C. nbtstat
D. nslookup
B. ipconfig
Chapter 10
In classful addressing, only Class A and Class B addresses are recognized. (T/F)
False
Chapter 10
Class A, Class B, and Class C networks can all be subnetted. (T/F)
True
Chapter 10
E-mail is one of the most frequently used Internet services an administrator manages. (T/F)
True
Chapter 10
The nbtstat command is useful on networks that run UNIX and Linux operating systems and NetBIOS. (T/F)
False
Chapter 10
The route utility is useful for determining router or subnet connectivity problems. (T/F)
True
Chapter 10
___________ seperates a network into multiple logically defined segments, or subnets.
Subnetting
Chapter 10
_____ is not exclusive of subnetting; it merely provides additional ways of arranging network and host information in an IP address.
CIDR (Classless Interdomain Routing)
Chapter 10
The ____ process occurs when the client's transmission reaches the default gateway; the gateway opens the IP datagram and replaces the client's private IP address with an Internet-recognized IP address.
NAT (Network Address Translation)
Chapter 10
The ____ host is configured to translate requests to and from the internet on behalf of other computers on the network.
ICS (Internet Connection Sharing)
Chapter 10
_____ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
MIME (Multipurpose Internet Mail Extensions)
Chapter 10
Which VoIP phone type allows the exporting of call information to a billing or accounting program on the same workstation?
A. Digital PBX
B. Softphone
C. Traditional telephone
D. IP telephone
B. Softphone
Chapter 11
Which video of IP service is useful in telemedicine applications?
A. Video-on-demand
B. IPTV (IP television)
C. Videoconferencing
D. Streaming video
C. Videoconferencing
Chapter 11
Which H.323 key element provides translation between network devices running H.323 signaling protocols and devices running other types of signaling protocols?
A. H.323 gateway
B. H323 gatekeeper
C. H.323 terminal
D. H323 zone
A. H.323 gateway
Chapter 11
Which signaling protocol ensures that the type of information - whether voice or video - issued to an H.323 terminal is formatted in a way that the H323 terminal can interpret?
A. H232
B. H325
C. H225
D. H245
D. H245
Chapter 11
Which transport protocol applies sequence numbers to indicate the order in which packets should be assembled at their destination?
A. RTCP (Real-time Transport Control Protocol)
B. RTP (Real-time Transport Protocol)
C. RSVP (Resource Reservation Protocol)
D. MGCP (media gateway Control Protocol)
B. RTP (Real-time Transport Protocol)
Chapter 11
All VoIP calls are carried over the Internet. (T/F)
False
Chapter 11
Every video over IP transmission begins with digitizing the audio and visual signals. (T/F)
True
Chapter 11
Because each IP telephone must have a unique IP address, they are stationary devices. (T/F)
False
Chapter 11
The newer MEGACO (Media Gateway Control Protocol) gateway control protocol can operate with H323 or SIP. (T/F)
True
Chapter 11
Although RTP and RTCP can provide information about packet order, loss, and delay, they cannot do anything to correct transmission flaws. (T/F)
True
Chapter 11
_____________ is the use of any network (either public or private) to carry voice signals using the TCP/IP protocol.
IP Telephony
Chapter 11
______ is an ITU (Internation Telecommunication Union) standard that describes an architecture and a group of protocols for establishing and managing multimedia sessions on a packet-switched network.
H.323
Chapter 11
____ is a VoIP call signaling protocol operating as an application layer signaling and control protocol for multiservice, packet-based networks.
SIP (Session Initiation Protocol)
Chapter 11
An intermediate device, known as a(n) ____, is used to exchange and translate gateway signaling and control information so that voice and video packets are properly routed through the network.
MGC (Media Gateway Controller)
Chapter 11
_____, specified in RFC 2205, is a transport layer protocol that attempts to reserve a specific amount of network resources for transmission before the transmission occurs.
RSVP (Resource Reservation Protocol)
Chapter 11
Which strategy is most commonly used by an intruder to gain access to a network?
A. Using malware
B. Social engineering
C. Man-in the middle attacks
D. Circumventing network hardware and design flaws
B. Social engineering
Chapter 12
What is the type of risk when an administrator accepts the default security options after installing an operating system or application?
A. Risks associated with Inter Access
B. Risks associated with people
C. inherent network hardware and design
D. Risks associated with protocols and software
D. Risks associated with protocols and software
Chapter 12
Which response team member is the person on call who first notices or is alerted to the problem?
A. Dispatcher
B. Technical Support Specialist
C. Manager
D. Public Relations Specialist
A. Dispatcher
Chapter 12
Which authintication protocol encrypts user names and passwords for transmission?
A. CHAP
B. PAP
C. EAP
D. PPP
A. CHAP
Chapter 12
By default, which standard does not offer security?
A. WPA
B. WEP
C. 802.11i
D. 802.11
D. 802.11
Chapter 12
SSL (Secure Socket Layer) is a method of encrypting TCP/IP transmissions-including Web pages and data entered into Web forms-en route between the client and server using public key encryption technology. (T/F)
True
Chapter 12
An IDS can detect, react to, and log suspicious activity. (T/F)
False
Chapter 12
When a firewall can view a data stream, it is known as a stateless firewall (T/F)
False
Chapter 12
Encryption is the last means of defense against data theft. (T/F)
True
Chapter 12
RADIUS and TACACS belong to a category of protocols known as AAA (Authentication, Authorization, and Accounting) (T/F)
True
Chapter 12
A(n) ________ ______ is a thorough examination of each aspect of the network to determine how it might be compromised.
security audit
Chapter 12
A(n) ________ _______ identifies your security goals, risks, level of authority, designated security coordinator and team member, responsibilities for each team member, and responsibilities for each employee.
security policy
Chapter 12
A(n) ______ _______ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
proxy service
Chapter 12
In ______ ___ encryption, data is encrypted using two keys.
public key
Chapter 12
____ is a key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Chapter 12
Which step in the troubleshooting methodology involves the task of identifying the affected areas?
A. Step 1
B. Step 2
C. Step 3
D. Step 4
B. Step 2
Chapter 13
In determining the most probable cause of a problem, which step should be conducted first?
A. Review and analyze recent changes
B. Determine what areas are affected
C. Identify the symptoms
D. Ensure that human error is not the source of the problem
D. Ensure that human error is not the source of the problem
Chapter 13
Which type of personnel are highly skilled in one area of networking?
A. First-level support
B. Second-level support
C. Third-level support
D. Help desk coordinator
C. Third-level support
Chapter 13
Which troubleshooting tool is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly?
A. Tone generator
B. Crossover cable
C. Tone locator
D. Butt Set
B. Crossover cable
Chapter 13
Which data error describes a packet that is smaller than the medim's minimum packet size?
A. Jabber
B. Ghosts
C. Runts
D. Bot
C. Runts
Chapter 13
When attempting to reproduce the symptoms of a problem, you should follow the same steps that the person reporting the symptoms followed. (T/F)
True
Chapter 13
By some estimates, more than half of all network problems occur at the logical layer of the OSI model. (T/F)
False
Chapter 13
Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems. (T/F)
True
Chapter 13
Tone generators and tone locators can be used to determine characteristics about a cable. (T/F)
False
Chapter 13
The difference between continuity testers and performance testers lies in their sophistication and price. (T/F)
True
Chapter 13
A software program known as a(n) ____ ________ system is used in many organizations for documenting problems.
call tracking
Chapter 13
A(n) ___________ is a simple instrument that can measure many characteristics of an electric circuit, including it's resistance and voltage.
multimeter
Chapter 13
A(n) _______ ________ is a software based tool that continually monitors network traffic from a server or workstation attached to the network.
network monitor
Chapter 13
A(n) ________ analyzer (or network analyzer) captures traffic and can analyze frames, typically all the way to Layer 7 of the OSI model.
protocol
Chapter 13
A(n) ________ _________ is a tool that can assess the quality of the wireless signal.
spectrum analyzer
Chapter 13
Which type of malware is a program that claims to do something useful but instead harms the computer or system?
A. Bot
B. Worm
C. Boot sector virus
D. Trojan horse
D. Trojan horse
Chapter 14
Which factor is the most important decision to consider when implementing antimalware software on a network?
A. Where to install the software
B. Ease of use for end-users
C. Portability
D. Disk space usage
A. Where to install the software
Chapter 14
Which type of power flaw is caused by a momentary decrease in voltage?
A. Brownout
B. Blackout
C. Surge
D. Noise
A. Brownout
Chapter 14
Which type of RAID allows you to replace a failed disk with a good one with little interuption of service?
A. RAID level 5
B. RAID level 3
C. RAID level 1
D. RAID level 0
B. RAID level 3
Chapter 14
Which type of backup does not uncheck the archive bits for files it backs up?
A. Full
B. Incremental
C. Partial
D. Differential
C. Partial
Chapter 14
Macro viruses were the first type of virus to infect data files rather than executable files. (T/F)
True
Chapter 14
On a LAN, a star topology and a parallel backbone provide the greatest fault tolerance. (T/F)
False
Chapter 14
Clustering is a fault-tolerance technique that links multiple servers to act as a single server. (T/F)
True
Chapter 14
SAN's (storage area Networks) are distinct networks of storage devices that communicate directly with each other and with other networks. (T/F)
False
Chapter 14
A hot site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, with some appropriately configured, updated, or connected. (T/F)
True
Chapter 14
The term _________ refers to the soundness of a network's programs, data, services, devices, and connections.
integrity
Chapter 14
The term ____________ refers to how consistently and reliably a file or system can be accessed by authorized personnel.
availability
Chapter 14
___________ viruses change their characteristics (such as the arrangement of their bytes, size, and internal instructions) every time they are transferred to a new system, making them harder to identify.
Polymorphic
Chapter 14
A(n) ____________ ______ provides rules for using anti-malware software, as well as policies for installing programs, sharing files, and using external disks such as flash drives.
anti-malware policy
Chapter 14
A(n) _______ UPS provides continuous voltage to a device by switching virtually instantaneously to the battery when it detects a loss of power from the wall outlet.
standby
Chapter 14
Which document is a graphical representation of a network's devices and connections?
A. Wiring schematic
B. Network diagram
C. Traffic shaping report
D. Configuration management documentation
B. Network diagram
Chapter 15
Which category of network management tools is used to know for certain whether a pattern of usage has changed?
A. Performance management
B. Configuration management
C. Policies, procedures, and regulations
D. Baseline measurements
D. Baseline measurements
Chapter 15
Which category of network management tools does resource sharing and naming conventions fall under?
A. Performance management
B. Asset management
C. Policies, procedures, and regulations
D. Baseline reporting
C. Policies, procedures, and regulations
Chapter 15
Which device is the least disruptive type of equipment to add or upgrade?
A. Network printer
B. Hub or Access point
C. Networked workstation
D. Switch
C. Networked workstation
Chapter 15
On modern networks, most agents use ____ to communicate information about managed devices.
A. TCP
B. SNMP
C. MIB
D. MRTG
B. SNMP
Chapter 15
The scope of network management techniques may differ between organization. (T/F)
True
Chapter 15
On Windows-based computers, device monitor results are sent to a log known as a system log. (T/F)
False
Chapter 15
To an ISP, caching is simply a convenience. (T/F)
False
Chapter 15
Good planning is necessary to manage change while maintaining a network's efficency and availability. (T/F)
True
Chapter 15
The most comprehensive and complex upgrade involving network hardware is a backbone upgrade. (T/F)
True
Chapter 15
_______ management involves assessing, monitoring, and maintaining network devices and connections.
Network
Chapter 15
_______ _______ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
Traffic shaping
Chapter 15
_______ is the local storage of frequently needed files that would otherwise be obtained from an external source.
Caching
Chapter 15
A(n) _____ differs from a revision or software upgrade in that it changes only part of an application, leaving most of the code untouched.
patch
Chapter 15
The process of reverting to a previous version of software after attempting to upgrade it is known as ____________.
backleveling
Chapter 15