CMIT 425 Communications and Network Security Domain Network Cabling Topologies Services and Devices Answers PDF

Title CMIT 425 Communications and Network Security Domain Network Cabling Topologies Services and Devices Answers
Author Cynthia Castellon
Course Advanced Information Systems Security
Institution University of Maryland Global Campus
Pages 13
File Size 195.4 KB
File Type PDF
Total Downloads 71
Total Views 161

Summary

Download CMIT 425 Communications and Network Security Domain Network Cabling Topologies Services and Devices Answers PDF


Description

CMIT 425 Communications and Network Security Domain-Network Cabling, Topologies, Services and Devices Questions 1. A private Transmission Control Protocol/Internet Protocol network with resources that are accessible only by internal members of the organization running the network is called a(n): A. B. C. D. E.

extranet Internet intranet All of the above None of the above

2. A private Transmission Control Protocol/Internet Protocol network with resources that are made accessible to both internal members and a select group of outside users is called a(n): A. B. C. D. E.

extranet Internet intranet All of the above None of the above

3. A _____________ is the form that data is reduced to when it travels across a network medium. Some examples are electrical voltages on copper wire, pulses of light on a fiber-optic cable, or infrared or radio waves on a wireless network. A. B. C. D. E.

protocol stack signal MAN LAN WAN

4. A _____________ is a group of computers located within a relatively close proximity and connected by a common medium. A. B. C. D. E.

protocol stack signal MAN LAN WAN

5. A _____________ connection can use telephone lines, radio waves, or one of many other technologies to connect two or more remote networks together and are typically furnished by an outside provider such as a telephone company. A. B. C. D. E.

protocol stack signal MAN LAN WAN

6. A _____________ is a software component that reduces a complex data structure into simpler form so it can be transmitted over a network medium and then converted back into the same data structure on the destination system. A. B. C. D. E.

protocol stack signal MAN LAN WAN

7. Which OSI model layer is the conduit between the computer’s networking hardware and it’s networking software? A. physical B. data link C. network D. session E. presentation F. application 8. Which OSI model layer is responsible for a packet’s complete journey from the system that created it to it’s final destination? A. physical B. data link C. network D. session E. presentation F. application

9. Which OSI model layer is responsible for providing the interface between applications and the protocol stack? A. physical B. data link C. network D. session E. presentation F. application 10. Which OSI model layer defines the nature of the network’s hardware elements, such as the medium, topology, network installation method, and the signals used in transmission? A. physical B. data link C. network D. session E. presentation F. application 11. Which OSI model layer’s sole responsibility is to provide syntax translation between the two layers it is adjacent to? A. physical B. data link C. network D. session E. presentation F. application

12. Which OSI model layer is responsible for dialog control and dialog separation as well as 20 other functions and is considered to be the “toolbox” of the OSI model? A. physical B. data link C. network D. session E. presentation F. application

13. Which networking topology employs a central cabling nexus called a hub or switch to connect each computer with a separate cable and is the most common topology in use today? A. B. C. D. E.

bus star ring mesh None of the above

14. Which networking topology employs computers connected in a single line, with each system cabled to the next system and requires that the first and last computer connect to each other to form an endless loop? A. B. C. D. E.

bus star ring mesh None of the above

15. Which networking topology employs computers connected in a single line, with each system cabled to the next system and requires that both ends be terminated by a resistor pack? A. B. C. D. E.

bus star ring mesh None of the above

16. Which networking topology employs computers that have a direct, dedicated connection to every other computer to provide fault tolerance? A. B. C. D. E.

bus star ring mesh None of the above

17. Which cabling type is used with 10Base2 ThinNet networks? A. B. C. D. E.

UTP Fiber RG58 coax RG8 coax None of the above

18. Which cabling type is used with 10Base5 Thicknet networks? A. B. C. D. E.

UTP Fiber RG58 coax RG8 coax None of the above

19. Which cabling type is used with 10BaseT networks? A. B. C. D. E.

UTP Fiber RG58 coax RG8 coax None of the above

20. Which cabling type is used with FDDI networks? A. B. C. D. E.

UTP Fiber RG58 coax RG8 coax None of the above

21. What is the maximum distance a signal can travel over 10Base5 cable without a repeater? A. B. C. D. E.

100 meters 185 meters 500 meters 1000 meters None of the above

22. What is the maximum distance a signal can travel over 10BaseT cable without a repeater? A. B. C. D. E.

100 meters 185 meters 500 meters 1000 meters None of the above

23. What is the maximum distance a signal can travel over 10Base2 cable without a repeater? A. B. C. D. E.

100 meters 185 meters 500 meters 1000 meters None of the above

24. True or false. Fiber is extremely susceptible to Electro Magnetic Interference (EMI). 25. A device that operates in promiscuous mode and connects networks at the data-link layer of the OSI model to provide packet filtering by propagating only the packets that are destined for systems on the other network is a called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point 26. A device that operates at the physical layer of the OSI model to connect all computers on a star or ring network and amplifies the signal in order to counteract the effects of attenuation is a called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point

27. A device that operates at the network layer of the OSI model that connects networks and relays traffic between them as needed while blocking broadcast traffic is a called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point 28. A device that enables two computers to communicate, even though they are running different protocols at some layer of the OSI model is a called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point 29. A data-link layer device, that looks like a hub, that forwards incoming packets only to the computer for which they are destined is called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point 30. A data-link layer device that contains both a transceiver for wireless communication and a jack for connection to a LAN is called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point

31. A ___________is a device that enables you to connect one type of a network cable to another so that you can connect equipment of one type of network to another is called a: A. repeater or concentrator B. bridge C. router D. gateway E. switch F. media converter G. wireless access point 32. _____________ is a MAC mechanism that works by circulating a special packet around the network whose purpose is to designate which system on the network is allowed to transmit it’s data. A. B. C. D. E.

Carrier Sense Multiple Access/Collision Detection Carrier Sense Multiple Access/Collision Avoidance Token Passing All of the above None of the above

33. _____________ is a MAC mechanism that substitutes a system of verifications and acknowledgements for the collision detection mechanism and is used in 802.11. A. B. C. D. E.

Carrier Sense Multiple Access/Collision Detection Carrier Sense Multiple Access/Collision Avoidance Token Passing All of the above None of the above

34. _____________ is a MAC mechanism used by Ethernet networks to regulate access to the network by listening to the network to determine if its in use before transmitting data and retransmitting the data in the event of a signal quality error or collision. A. B. C. D. E.

Carrier Sense Multiple Access/Collision Detection Carrier Sense Multiple Access/Collision Avoidance Token Passing All of the above None of the above

35. In wireless networking, a radio transmission method in which the transmitter continuously performs rapid frequency shifts according to a preset algorithm that is duplicated by the receiver performing the same shifts to read the incoming signals is called: A. B. C. D. E.

Ad hoc topology Infrastructure topology Direct sequence spread spectrum signaling Frequency hopping spread spectrum signaling Infrared communication signaling

36. In wireless networking, two or more wireless devices communicating directly with each other is called a(n): A. B. C. D. E.

Ad hoc topology Infrastructure topology Direct sequence spread spectrum signaling Frequency hopping spread spectrum signaling Infrared communication signaling

37. In wireless networking, a radio transmission method in which the outgoing signals are modulated with a digital code (called a chipping code) that uses a redundant bit pattern to enable the signal to be spread out over a wider frequency band is called a (n): A. B. C. D. E.

Ad hoc topology Infrastructure topology Direct sequence spread spectrum signaling Frequency hopping spread spectrum signaling Infrared communication signaling

38. In wireless networking, _______________ use high frequencies, just below the visible light spectrum to create simple links between computers and peripherals such as printers and handheld devices. It is rarely used for LAN communications because it is strictly a “line of sight” technology. A. B. C. D. E.

Ad hoc topology Infrastructure topology Direct sequence spread spectrum signaling Frequency hopping spread spectrum signaling Infrared communication signaling

39. In wireless networking, an ______________________ uses a wireless access point as a bridge between wireless devices and a standard cabled network. A. B. C. D. E.

Ad hoc topology Infrastructure topology Direct sequence spread spectrum signaling Frequency hopping spread spectrum signaling Infrared communication signaling

40. Which MAC mechanism uses a specified period of time, called a backoff period, before transmitting again after a collision? A. B. C. D. E.

CSMA/CA CSMA/CD Token Passing All of the above None of the above

41. The type of data link protocol that uses a physical double-ring topology consisting of two independent rings, a primary and a secondary, to provide fault-tolerance in the event of a cable break is: A. B. C. D. E.

Ethernet FDDI Token Ring All of the above None of the above

42. True or false. Attenuation is the tendency of a signal to weaken as it travels over a cable. 43. The type of connector used by 10Base2 cables is called a _______________ connector. A. B. C. D. E.

AUI BNC RJ45 SC (Subscriber Connector) USB

44. The type of connector used by 10BaseT cables is called a _______________ connector. A. B. C. D. E.

AUI BNC RJ45 SC (Subscriber Connector) USB

45. The type of connector used by 10Base5 cables is called a _______________ connector. A. B. C. D. E.

AUI BNC RJ45 SC (Subscriber Connector) USB

46. The type of connector used by fiber optic cables is called a _______________ connector. A. B. C. D. E.

AUI BNC RJ45 SC (Subscriber Connector) USB

47. ________________ are the combination of an IP address and the port number, such as 192.168.1.200:80. A. B. C. D. E.

flow control positive acknowledgement with retransmission selective acknowledgement sequenced packet exchange (SPX) sockets

48. ___________is the router on the local area network used by a TCP/IP client computer to transmit messages to computers on other networks. A. B. C. D. E.

ARP Default Gateway ICMP IGMP Subnet Mask

49. __________________ is a physical layer standard that defines a method for building a synchronous telecommunications network based on fiber-optic cables and provides connections at various optical carrier (OC) levels running at different speeds. A. Cable Television (CATV) Networks B. Point-to-Point Protocol (PPP) C. Serial Line Internet Protocol (SLIP) D. SONET E. X.25 50. A type of IP address allocation that is used on home and small business networks that don’t have a server based IP-allocation solution and assign addresses from the private 169.254.0.0/16 subnet is called: A. B. C. D. E.

DHCP APIPA DNS WINS None of the above

51. A distributed hierarchical namespace hosted on one or more servers that was designed to provide TCP/IP networks such as the Internet with central resolution services of fully qualified domain names or hostnames to IP addresses is called: A. B. C. D. E.

DHCP APIPA DNS WINS None of the above

52. A network service that automatically configures the TCP/IP client computers on a network by assigning them unique IP addresses and other configuration parameters from a fixed pool of addresses is called: A. B. C. D. E.

DHCP APIPA DNS WINS None of the above

53. A(n) __________________ is an application running on server computers that maintain information about the domain tree structure and contain authoritative information about specific areas of that structure. A. B. C. D. E.

Host file Iterative query Name server Recursive query Resolver

54. A(n) __________________ is a name resolution request where the DNS server receiving the request immediately responds to the requestor with the best information it has. A. B. C. D. E.

Host file Iterative query Name server Recursive query Resolver

55 A(n) __________________ is a local table residing on any TCP/IP operating system that provides local host name resolution of fully qualified domain names or host names to IP addresses. It was the original name- resolution method for what later became the Internet until the number of computers on the network became too large to manage using this technique. A. B. C. D. E.

Host file Iterative query Name server Recursive query Resolver...


Similar Free PDFs