Quiz 6 - Chapter 12 - IT Fundamentals

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

A jam signal is used in an Ethernet network to ...

a) prevent intrusions by ignoring all incoming messages.

b) alert computers of an incoming message to be sent to all computers.

c) inform all computers on the network of a collision.

d) cause the network to reboot.

e) determine if a message is colliding with another.

c) inform all computers on the network of a collision.

2
New cards

Which mathematical operation is used to obtain the checksum once the sum of the bits is computed?

a) a combination of division and multiplication

b) modulo

c) multiplication

d) division

e) shift

b) modulo

3
New cards

SSL, the secure sockets layer, is an implementation of which level of the OSI model?

a) Network

b) Transport

c) Application

d) Presentation

e) Session

d) Presentation

4
New cards

Which of the following network topologies is generally considered the cheapest?

a) bus

b) star

c) full mesh

d) tree

e) ring

a) bus

5
New cards

If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?

a) ring

b) start

c) full mesh

d) All of the above would be equally impacted

e) bus

a) ring

6
New cards

TCP/IP introduced which of the following communication ideas?

a) All of the above

b) three-way network handshake

c) packet switching

d) checksum for error detection

e) collision detection

b) three-way network handshake

7
New cards

Which of the following services is used to map IP aliases to IP addresses?

a) dns

b) ftp

c) http

d) firewall

e) ssh

a) dns

8
New cards

In order to determine if another computer is available and accessible over your network, you might use which program to test it?

a) ftp

b) https

c) http

d) ping

e) sendmail

d) ping

9
New cards

The ability of a network to carry multiple messages at the same time is known as ...

a) multiprocessing

b) multiplexing

c) multitasking

d) none of the above: this is not possible

e) modulating

b) multiplexing

10
New cards

The number of computers on the original ARPAnet was ...

a) 2

b) about 1 million

c) about 1,000

d) 4

e) 13

d) 4

11
New cards

In a circuit switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.

a) True

b) False

a) True

12
New cards

IPv4 offers approximately how many unique IP addresses?

a) 4 million

b) 100 billion

c) 4 billion

d) 100 million

e) 1 million

c) 4 billion

13
New cards

Twisted wire pair is most commonly used in which of the following?

a) In the public telephone network in the US

b) For wireless home networks

c) For cable tv

d) For wired home networks

e) For cell phone networks

a) In the public telephone network in the US

14
New cards

TCP/IP's link layer is roughly equivalent to the OSI model's ...

a) physical and data link layers

b) data link layer

c) network layer

d) physical layer

d) physical, data link and network layers combined

a) physical and data link layers

15
New cards

Last mile technology is used to express the idea that ...

a) repeaters are needed in local area networks that extend beyond 1 mile

b) most cell phones still use 3G networks, limiting bandwidth

c) local area networks cannot extend beyond 1 mile in size

d) some households still use low bandwidth telephone lines to access the Internet

e) third-world countries do not have access to the Internet

d) some households still use low bandwidth telephone lines to access the Internet

16
New cards

Long distance communication (dozens, hundreds or thousands of miles) generally does not use which of the following?

a) All of the above are used

b) satellite communication

c) fiber optic cable

d) microwave communication

e) cell towers

c) fiber optic cable

17
New cards

In which protocol can you use UDP type packets?

a) Neither TCP nor IP

b) IP

c) TCP

c) TCP

18
New cards

A network port ...

a) is the address of the connection (in the back of the computer) between the network card and the computer network

b) is part of the IP address

c) indicates the message's intended application software

d) is the address of a network broadcast device

e) is a number used to determine if a message should make it through a firewall

c) indicates the message's intended application software

19
New cards

Which of the following terms is used to denote a computer you wish to access over a network?

a) Server

b) Remote computer

c) Hub

d) Gateway

e) Local computer

b) Remote computer

20
New cards

Which of the following technologies differentiates a normal extranet from a virtual private network?

a) multiplexing

b) encryption

c) use of fiber optic cable

d) use of routers instead of switches

e) use of TCP/IP

b) encryption

21
New cards

In streaming audio and video, which of TCP and UDP would be preferred as it would trade off speed for assurance of arrival?

a) UDP

b) TCP

b) TCP

22
New cards

Which of the following devices deals with IP addresses?

a) MODEM

b) router

c) fiber optic cable

d) switch

e) hub

b) router

23
New cards

We view computer networks at a logical level while the operating system views the network at a physical level.

a) True

b) False

b) False

24
New cards

Which level of the OSI model takes care of reliability?

a) Presentation

b) Session

c) Application

d) Data link

e) Transport

e) Transport

25
New cards

Mapping an external IP address into an internal IP address is known as ...

a) network address translation

b) demodulation

c) IP spoofing

d) multiplexing

e) modulation

a) network address translation

26
New cards

A checksum is used in network communication for which purpose?

a) Encryption

b) Network handshake

c) Collision detection

d) Addressing

e) Error checking

e) Error checking

27
New cards

Each layer of the OSI model adds header information onto the message except for the ...

a) Application layer

b) Physical layer

c) Network layer

d) Transport layer

e) Session layer

b) Physical layer

28
New cards

The Internet uses packet switching while local area networks use circuit switching

a) True

b) False

b) False

29
New cards

Which of the following devices would transmit any message received on to all computers in its local area network?

a) switch

b) repeater

c) gateway

d) router

e) hub

b) repeater

30
New cards

In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors

a) 4

b) 3

c) 2

d) 1

e) all computers in the network

b) 3

31
New cards

Of the following network types (sizes or classifications), which is generally considered the smallest?

a) PAN

b) CAN

c) LAN

d) MAN

e) WAN

a) PAN

32
New cards

Which level of the OSI model performs routing?

a) Transport

b) Physical

c) Session

d) Network

e) Data link

d) Network

33
New cards

IPv4 addresses are _____ bits long.

a) 32

b) 8

c) 64

d) 128

e) 16

a) 32

34
New cards

We can think of the Internet and the World Wide Web interchangeably.

a) True

b) False

b) False

35
New cards

At which level of the OSI model are data units decomposed into packets?

a) Transport

b) Application

c) Data link

d) Network

e) Physical

d) Network

36
New cards

A network with a file server which services the local computers would be considered a(n) ...

a) extranet

b) peer-to-peer network

c) personal area network

d) intranet

e) client-server network

e) client-server network

37
New cards

An intranet LAN has which of the following properties?

a) All communication is encrypted

b) The network uses one-to-many network address translation

c) The LAN uses IP to easily extend the network to the Internet

d) The network uses no routers

e) All resources use wireless communication

c) The LAN uses IP to easily extend the network to the Internet

38
New cards

In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.

a) True

b) False

a) True

39
New cards

The term used to describe the amount of data that can be transferred over a network over a unit of time, such as bits per second, is known as ...

a) switching

b) routing

c) bandwith

d) modulation

e) multilexing

c) bandwidth

40
New cards

A Class C network has how many IP addresses available for the network?

a) 256

b) 16,777,216

c) 1024

d) 65,536

e) 16

a) 256

41
New cards

Switches use which of the following addresses to send a message to the proper device?

a) None of the above: a switch sends a copy of the message to every device connected to it.

b) IPv6 addresses

c) telephone numbers

d) MAC addresses

e) IP addresses

d) MAC addresses

42
New cards

The first message broadcast on the Internet, in its earliest incarnation, was in which year?

a) 1973

b) 1983

c) 1946

d) 1969

e) 1996

d) 1969

43
New cards

In a Linux system, the address(es) of your DNS servers will be stored in which file?

a) /etc/hosts.allow

b) /etc/hosts.equiv

c) /etc/hosts

d) /etc/dns

e) /etc/hosts.conf

e) /etc/hosts.conf

44
New cards

Which of the following network programs sends information in clear text and so is not secure?

a) ssh

b) ftp

c) rlogin

d) All of the above except ssh

e) telnet

d) All of the above except ssh

45
New cards

To use the telephone network for computer communication, one must ...

a) compress the information

b) group packets together into bundles to be sent using multiplexing

c) convert the analog information stored in the computer into a digital form

d) convert the digital information stored in the computer into an analog form

e) None of the above: it is not possible to use the telephone network for computer communication

c) convert the analog information stored in the computer into a digital form

46
New cards

Morris' Internet worm was an attempt to ...

a) join the group Anonymous

b) demonstrate weaknesses in Unix security.

c) damage the Internet so that he could avoid an assignment

d) weaken US defense by attacking the Internet

e) demonstrate his knowledge in an attempt to get hired by a security company

b) demonstrate weaknesses in Unix security.

47
New cards

What noteworthy event happened to the APRANet in 1973?

a) TCP/IP was implemented for the ARPAnet

b) Email was implemented

c) The first international computer was added to the network

d) Electronic bulletin boards were added

e) This is the year it was first started

c) The first international computer was added to the network

48
New cards

The full mesh network is seldom used because ...

a) it requires a dedicated central server.

b) it costs the most.

c) it has the worst performance of all network topologies.

d) it requires a great deal of additional supporting hardware such as routers.

e) it a computer were to go down, it would disconnect portions of the network.

b) it costs the most.

49
New cards

As a network gets larger (has more computers connected to it), which of the following network topologies performance is most affected?

a) All are equally affected.

b) ring

c) star

d) full mesh

e) tree

b) ring

50
New cards

"T" connectors are used to join computers together in which type of network topology?

a) star

b) bus

c) ring

d) tree

e) full mesh

b) bus