Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/25

Click to flip

25 Cards in this Set

  • Front
  • Back
What was the first type of microcomputer network to be implemented?

A. MAN
B. WAN
C. LAN
D. PAN
C. LAN
Using modem connections, how many modems would it take to allow connections from ten individuals computers within the same location?

A. One
B. Five
C. Ten
D. Fifteen
C. Ten
What is the information that is "burned in" to tanetwork interface card?

A. NIC
B. MAC address
C. Hub
D. LAN
B. MAC address
Which topology has all its nodes connected directly to one center point and has no other connections between nodes?

A. Bus
B. Ring
C. Star
D. Mesh
C. Star
What do TIA and EIA stand for?

A. Television INdustry Association, Electronic Industries Association

B. Telecommunications Industry Association, Electronic Industries Alliance

C. Telecommunications Industry Alliance, Electronic Industries Associations

D. Telephonique International Association, Elgraphique Industries Allianca
B. Telecommunications Industry Association, Electronic Industries Alliance
LANs are designed to do which of the following? (Select all that apply.)

A. Operate within a limited geographic area

B. Allow many users to access high-bandwidth media

C. Connect to the Internet

D. Provide full-time connectivity to local services
A. Operate within a limited geographic area

B. Allow many users to access high-bandwidth media

D. Provide full-time connectivity to local services
Which of the following statements best describes a WAN?

A. It connects LANs that are separated by a large geographic area.

B. It connects workstations, terminals, and other devices in a metropolitan area.

C. It connects LANs within a large building.

D. It connects workstations, teminals, and other devices within a building.
A. It connects LANs that are separated by a large geographic area.
Which of the following statements correctly describes a MAN?

A. A MAN is a network that connects workstations, peripherals, teminals, and other devices in a single building.

B. A MAN is a network that serves users across a broad geographic area. It often uses transmission devices provided bu common carriers.

C. A MAN is a network that spans a metropolitan area such as a city or suburban area.

D. A MAN is a network that is interconnected by routers and other devices and that functions as a singles network.
C. A MAN is a network that spans a metropolitan area such as a city or suburban area.
Which of the following is not one of the features of a SAN?

A. SANs enable concurrent access of disk or tape arrays, provifing enhabced system performance.

B. SANs provide a reliable disaster recovery solution.

C. SANs are scalable.

D. SANs minimize system and data availability.
D. SANs minimize system and data availability.
What service offers secure, reliable connectivity over a shared public network infrastructure?

A. Internet
B. Virtual private network
C. Virtual public network
D. WAN
B. Virtual private network
What links enterprise customer headquarters, remote offices, and branch offices to an internal network over a shared infrastructre?

A. Access VPN
B. Intranet VPN
C. Extranet VPN
D. Internet VPN
B. Intranet VPN
What is the name of the part of a company's LAN that is made available to select parties such as employees, customers, and aprtners?

A. The Internet
B. The extranet
C. The intranet
D. The LAN
B. The extranet
What is the movement of data through layers?

A. Wrapping
B. Encapsulation
C. Traveling
D. Transmission
B. Encapsulation
The OSI model has how many laters?

A. Four
B. Five
C. Six
D. Seven
D. Seven
What is the OSI model?

A. A conceptual framework that specifies how information travels through networks.

B. A model that describes how data makes its way from one application program to another throughout a network.

C. A conceptual framework that specifies which network functions occur at each layer.

D. All of the above
D. All of the above

A. A conceptual framework that specifies how information travels through networks.

B. A model that describes how data makes its way from one application program to another throughout a network.

C. A conceptual framework that specifies which network functions occur at each layer.
Which of the following is the correct order of the network layers?

A.
1:Physical
2:Data link
3:Transport
4:Network
5:Presentaion
6:Session
7:Application

B.
1:Physical
2:Data link
3:Network
4:Transport
5:Session
6:Presentaion
7:Application

C.
1:Physical
2:Data link
3:Network
4:Session
5:Transport
6:Application
7:Presentaion

D.
1:Physical
2:Network
3:Session
4:Data link
5:Transport
6:Application
7:Presentaion
B.
1:Physical
2:Data link
3:Network
4:Transport
5:Session
6:Presentaion
7:Application
Which layer of the OSI model handles physical addressing, network topology, network access, and flow control?

A. The physical layer
B. The data link layer
C. The transport layer
D. The network layer
B. The data link layer
Which of the folowing best defines encapsulation?

A. Segmenting data so that it flows uninterrupted through the network

B. Compressing data so that it moves faster

C. Moving data in froups so tha it stays together

D. Wrapping data in a particular protocol header
D. Wrapping data in a particular protocol header
An e-mail message is sent from Host A to Host B on a LAN. Before this message can be sent, the data must be encapsulated. Which of the following best describes what happens after a packet is constructed?

A. The packet is transmitted along the medium.

B. The packet is encapsulated into a frame.

C. The packet is segmented into frames.

D. The packet is converted to binary format.
B. The packet is encapsulated into a frame.
In the TCP/IP model, which layer deals with reliability, flow control, and error correction?

A. Application
B. Transport
C. Internet
D. Network access
B. Transport
Repeaters can provide a simple solution for what problem?

A. Too many types of incompatible equipment on the network

B. Too much traffic on a network

C. Too-slow convergence rates

D. Too much distance between nodes or not enough cable
D. Too much distance between nodes or not enough cable
Which of the following is true of bridge and its forwarding decisions?

A. Bridges operate at OSI Layer 2 and use IP addresses to make decisions.

B. Bridges operate at OSI Layer 3 and use IP addresses to make decisions.

C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.

D. Bridges operate at OSI Layer 3 and use MAC addresses to make decisions.
C. Bridges operate at OSI Layer 2 and use MAC addresses to make decisions.
Which of the following is true of a swithc's function?

A. Swutcges uncrease the size of collision domains.

B. Switches combine the connectivity of a hub with the capability to filter or flood trafic based on the destination MAC address of the frame.

C. Switches combine the connectivity of a hub with the traffic direction of a router.

D. Switches perform Layer 4 path selection.
B. Switches combine the connectivity of a hub with the capability to filter or flood trafic based on the destination MAC address of the frame.
What does a router route?

A. Layer 1 bits
B. Layer 2 frames
C. Layer 3 packets
D. Layer 4 segments
C. Layer 3 packets
What is/are the function(s) of a AAA server? (Select all that apply.)

A. To ensure that only authenticated users can get into the network

B. To ensure that the users are allowed access to only the resources they need

C. To ensure that records are kept of everything the authentic users do after they ar eallowed entey.

D. All of the above.
D. All of the above.

A. To ensure that only authenticated users can get into the network

B. To ensure that the users are allowed access to only the resources they need

C. To ensure that records are kept of everything the authentic users do after they ar eallowed entey.