Ch7 Flashcards

(211 cards)

1
Q

Which of the following best describes the networking infrastructure commonly found in large organizations?
a) They primarily rely on wireless LANs for connectivity with limited use of wired LANs.
b) They exclusively use wired LANs with minimal reliance on wireless connectivity.
c) They utilize a combination of wired LANs and wireless LANs connected by backbone networks.
d) They solely depend on backbone networks, eliminating the need for both wired and wireless LANs.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is one of the primary functions of LANs?
a) Facilitating communication between data centers
b) Enabling user access to the network
c) Providing e-commerce security
d) Managing network infrastructure remotely

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LANs are used for

A

+ Access (by users to connect to network)
–> Most LAN design is performed to enable user access
+Data center
+E-commerce edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How has Ethernet evolved in the realm of LAN technology?
a) It has become obsolete, making room for newer LAN technologies.
b) It has remained stagnant, with no significant advancements.
c) It has emerged as the dominant LAN technology, displacing others over time.
d) It has seen sporadic use, with limited adoption in LAN networks

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which component of a traditional LAN is responsible for initiating requests and accessing resources on the network?
a) Server
b) Network interface card (NIC)
c) Hubs/switches/access points
d) Client computer

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which component of a LAN acts as a centralized repository for data and resources, providing services to client computers?
a) Client computer
b) Network interface card (NIC)
c) Server
d) Network circuits

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which component of a LAN facilitates the connection between the client computers and the network infrastructure?
a) Network interface card (NIC)
b) Server
c) Hubs/switches/access points
d) Network circuits

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What component of a LAN is responsible for the physical connection between devices, enabling data transmission?
a) Server
b) Network interface card (NIC)
c) Hubs/switches/access points
d) Network circuits

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which component of a LAN manages the traffic and ensures efficient data transmission between devices on the network?
a) Client computer
b) Network interface card (NIC)
c) Hubs/switches/access points
d) The network operating system

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a basic LAN component?
a. client
b. PAD
c. server
d. network interface card
e. network operating system

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Network Interface Card (NIC) permits a computer to be physically connected to
a network’s cable

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which statement accurately describes the integration of NICs in modern computers?
a) NICs are obsolete and rarely used in modern computer systems.
b) NICs are primarily external peripherals connected via USB ports.
c) NICs are commonly integrated into motherboard designs.
d) NICs are exclusively utilized in servers and data centers.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What distinguishes a wired NIC from a wireless NIC?
a) Wired NICs use radio frequencies for communication.
b) Wireless NICs are integrated into motherboards.
c) Wired NICs require a physical connection to the network cable.
d) Wireless NICs are solely used in enterprise-level networks.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What function does a wired NIC perform in a computer system?
a) It serves as a radio transceiver.
b) It facilitates wireless communication between devices.
c) It enables connection to a network cable.
d) It provides Bluetooth connectivity.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which statement accurately describes the functionality of a wireless NIC?
a) It requires a physical connection to the network cable.
b) It integrates directly into the motherboard.
c) It sends and receives messages using specific radio frequencies.
d) It exclusively supports wired network connections.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can wireless connectivity be enabled for desktop systems that lack built-in wireless capabilities?
a) By installing a new operating system
b) By plugging in a USB device
c) By replacing the motherboard
d) By upgrading the processor

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following components is specifically responsible for physically connecting a computer to a network?

A) Modem
B) Router
C) Network Interface Card (NIC)
D) Switch

A

C. Network Circuits: Connect a computer (specifically, a computer’s NIC) physically to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the leading type of LAN cable commonly used in wired networks?
a) Shielded twisted pair (STP)
b) Unshielded twisted pair (UTP)
c) Coaxial cable
d) Fiber optic cable

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is unshielded twisted pair (UTP) commonly used in today’s networks?
a) Due to its high speed
b) Due to its resistance to interference
c) Due to its low cost and versatility
d) Due to its long-range connectivity

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which type of LAN cable is the least costly and most commonly used in connecting computers to switches?
a) Coaxial cable
b) Shielded twisted pair (STP)
c) Unshielded twisted pair (UTP)
d) Fiber optic cable

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In which type of environments are Shielded Twisted Pair (STP) cables commonly employed?
a) Residential areas
b) Offices
c) Factories with heavy machinery
d) Schools

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What makes unshielded twisted pair (UTP) cables versatile?
a) Their ability to transmit data at high speeds
b) Their compatibility with various devices
c) Their resistance to damage
d) Their ease of installation and maintenance

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is one of the main advantages of Shielded Twisted Pair (STP) compared to Unshielded Twisted Pair (UTP)?
a) Lower cost
b) Higher data transfer speeds
c) Resistance to electrical interference
d) Greater flexibility

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Compared to UTP wire, fiber-optic cables are generally:

A) Thicker and heavier.
B) Thinner and lighter.
C) The same weight and thickness.
D) Less reliable.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What property makes fiber-optic cables ideal for space-limited environments? A) They are flexible and can be easily cut. B) They have high capacity and space-saving properties. C) They are available in multiple colors. D) They can transmit electrical signals.
B
26
STP cable is least costly type of cable used in today’s networks and is the most commonly used cable type in connecting computers to switches.
F. UTP
27
Fiber optic cable is thicker and heavier than unshielded twisted pair.
F
28
LANs that run on radio frequencies use a type of wired media.
F. Wireless LAN
29
Fiber optic cable is thinner than unshielded twisted pair cable
T
30
Fiber optic cable is lighter than unshielded twisted pair cable.
T
31
Fiber optic cable is the least expensive cable option.
F. UTP
32
Of the following, which is not true about fiber optic cable? a. It is thinner than unshielded twisted pair cable. b. It is lighter than unshielded twisted pair cable. c. It has a very low capacity. d. It is more expensive than CAT5 unshielded twisted pair cable. e. It is a type of guided media.
C
33
Which of the following type of media is most commonly used in backbone networks because of its high capacity? a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair
A
34
IEEE 802.11ac runs on two different frequency spectrums simultaneously. Which of the following are those two frequencies? a. 2.4GHz and 5GHz b. 24GHz and 5GHz c. 11GHz and 54GHz d. 8GHz and 11GHz e. 2.4GHz and 11GHz
IEEE 802.11ac is wireless networking
35
What do Wireless LANs use to transmit data between a Network Interface Card (NIC) and an Access Point (AP)? A) Infrared signals B) Radio Frequency (RF) transmissions C) Ultraviolet light transmissions D) Wired connections
B
36
In which frequency ranges do Wireless LANs typically operate? A) 1 GHz and 1.5 GHz B) 2.4 GHz and 5 GHz C) 5 GHz and 10 GHz D) 1 GHz and 10 GHz
B
36
When deploying multiple Access Points (APs) in a WLAN, what is important to ensure? A) All APs should be on the same channel. B) APs should use channels that don’t interfere with each other. C) Only one AP should be active at a time. D) All APs must transmit on the highest available frequency.
B
37
What is the ideal condition distance range for a Wireless LAN under typical operating conditions? A) 50-75 meters B) 75-100 meters C) 100-150 meters D) 150-200 meters
C
38
What do NICs do upon connecting to a WLAN? A) Scan for devices connected to the network. B) Automatically update their firmware. C) Scan available channels and select the one with the strongest signal. D) Require manual setting to connect to an AP.
C
39
How are different channels managed among APs in a WLAN? A) Each AP transmits on the same channel within the frequency range. B) Each AP is set to transmit on a different channel within the frequency range. C) APs are randomly assigned channels by the network administrator. D) Channels are assigned based on the physical location of each AP.
B
40
1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable
F. 1000 Base-F Ethernet
41
Category 2 and category 4 cable are old standards no longer in use today
T
42
Category 1 cable is an old standard that is no longer in use.
F. Category 1 is standard voice-grade twisted-pair wires, but it can also be used to support low-speed analog data transmission.
43
Category 2 cable is standard voice-grade twisted-pair wires
F
44
Category 7 cable has less range than the other types of cable
F. Category 6
45
The maximum range of a Category 6 cable is 100 meters.
F. 55 meters
46
Category 8 have a maximum range of 15 meters, which means they are typically used between networking devices that are near each other (e.g., in a rack or data center)
F. Category 7
47
The maximum range of Category 7 cables is 15 meters.
T
48
What basic function do network hubs and switches serve in a computer network? A) They provide encryption for data. B) They provide an easy way to connect network cables. C) They generate power for network devices. D) They filter content on the network.
B
49
What additional role do network hubs and switches often play in a network? A) They serve as primary network storage B) They act as repeaters by reconstructing and strengthening incoming signals C) They reduce the cost of network management D) They filter content on the network
B
50
How many ports do network hubs and switches usually have when sold? A) 1 or 2 B) 4, 8, 16, or 24 C) 30 or 32 D) Always over 50
B
51
What additional capability do some switches have in terms of connectivity? A) They only support coaxial cables B) They enable connection of more than one kind of cabling, such as twisted-pair and fiber-optic C) They exclusively use wireless technology D) They are limited to USB connections
B
52
Many network hubs and switches incorporate repeaters to regenerate signals so that attenuation of the signal does not occur.
T
53
What is a port in the context of network hubs and switches? A) A device that controls network traffic B) A software program that manages data flow C) A connection point for network cables D) A protocol for secure network communication
C
54
What additional functionality do some switches offer regarding cable types? A) They only support single cable type connections. B) They enable different types of cables to be connected and perform the necessary conversions. C) They disable certain types of cable connections. D) They provide wireless connections only.
B. TP and fiber
55
What is the maximum rated distance for twisted-pair cable usage in a network according to common standards? A) 50 meters B) 100 meters C) 200 meters D) 500 meters
B
56
For what distance ranges are fiber-optic cables typically rated in LAN environments? A) 50 to 100 meters B) 100 to 300 meters C) 400 meters to several kilometers D) Several kilometers to several tens of kilometers
C
57
An access point plays the same role in a wireless network as a router does in a wired Ethernet network.
F. AP is a radio transceiver that plays the same role as a hub or switch in wired Ethernet network
58
What role does a wireless access point (AP) play in a wireless LAN (WLAN)? A) It only receives signals from client computers. B) It serves as a hub or switch, facilitating communication among devices. C) It restricts access to the internet. D) It monitors network traffic for security purposes. Answer: B) It serves as a hub or switch, facilitating communication among devices.
B
59
What types of connections can a wireless access point (AP) typically manage? A) It connects only to wireless networks. B) It can connect devices to both wireless and wired LANs. C) It connects to Bluetooth devices only. D) It functions exclusively with mobile networks.
B
60
How is data transmitted between wireless computers through an AP? A) The data is sent directly from one computer to another without going through the AP. B) Data is transmitted once directly to the destination. C) Data is transmitted twice; first to the AP, then from the AP to the destination. D) Data is stored in the AP before being sent to the destination at a scheduled time.
C
61
7. An access point (AP) is required to connect a WLAN to a wired network
T
62
An access point ensures that all computers within range of the access point can communicate with each other,
T
63
hy should a server not be placed on a WLAN according to the description? A) Because it increases the cost of network infrastructure. B) Because it can directly communicate with client computers without an AP. C) Because client computers must communicate via an AP, making direct access impossible. D) Because servers are incompatible with wireless networks.
C
64
What is a recommended network placement for servers in relation to WLANs and why? A) On the WLAN, because it is easier to connect B) Directly connected to APs for faster communication C) On the wired portion of the LAN to ensure optimal connectivity D) Outside the network for security reasons
C
65
What is a significant advantage of using Power Over Ethernet (POE) with an AP in large enterprise environments? A) It allows the AP to transmit data at higher speeds. B) It reduces the need for external power supplies. C) It enhances the security of data transmission. D) It connects more devices than non-POE systems.
B
66
How does Power over Ethernet (PoE) supply power to Access Points? A) Through dedicated power lines within the network infrastructure B) By using a separate inverter device that converts AC to DC power C) Power is supplied through the Ethernet cable using unused wires D) Power is wirelessly transmitted from the main server
C. Cat 5/5e
67
What type of cable is required for deploying PoE APs? a) Cat 3 cable b) Cat 5/5e cable c) Fiber optic cable d) Coaxial cable
B
68
Where can PoE APs be deployed due to their advantage? a) Only in locations with power outlets nearby b) Only in locations with existing network infrastructure c) Anywhere Cat 5/5e cable can be run d) Only in locations with fiber optic connectivity
C
69
What type of environment is typically associated with a Small Office/Home Office (SOHO) Access Point (AP)? a) Corporate office b) Industrial facility c) Residential or small business setting d) Data center
C
70
How is a SOHO Access Point (AP) typically connected to the local area network (LAN)? a) Via a wireless connection b) Through a fiber optic cable c) Using a wired Ethernet connection d) By satellite link
C
71
How is power supplied to a SOHO Access Point (AP)? a) Through Power over Ethernet (PoE) b) Via a separate power supply connected to a regular electrical outlet c) Solar power d) Battery power
B
72
What type of antennas might a SOHO Access Point (AP) feature? a) Directional antennas b) Satellite dish antennas c) Omnidirectional antennas d) Parabolic antennas
C
73
In a SOHO environment, where would you typically find the antennas of an Access Point (AP)? a) Hidden within the device casing b) Mounted on the walls c) Sticking up above the AP d) Attached to the LAN cable
C
74
. __________ antennas transmit the signal in all directions. a. directional b. microware c. omnidirectional d. radio e. vertical
C
75
Which type of antenna is commonly used by most Access Points (APs)? a) Directional antennas b) Parabolic antennas c) Omnidirectional antennas d) Yagi antennas
C
76
5. __________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. a. directional b. microware c. omnidirectional d. radio e. vertical
A
77
What is the purpose of pointing directional antennas inward towards a building? a) To reduce interference from other devices b) To increase signal strength outside the building c) To keep the signal inside the building and increase range d) To minimize power consumption
C
78
. Directional antennas signals are much stronger than omnidirectional antennas.
T
79
Directional antennas produce a stronger signal over longer distances than omnidirectional antennas.
T
80
Most access points (AP) deployed in wireless LANs use directional antennas
F
81
How does the placement of directional antennas on the inside of an exterior wall contribute to reducing security issues? a) By increasing the number of access points b) By encrypting the transmitted data c) By focusing the signal inside the building d) By broadcasting the signal in all directions
C
82
What role does a wireless router play in Small Office/Home Office (SOHO) environments? a) Providing only wired connectivity b) Serving as a wireless Access Point (AP) only c) Combining the functions of a wireless AP and a router d) Acting solely as a switch
C
83
Which component is commonly included in wireless routers for SOHO environments? a) 10Base-T switch b) 1000Base-T switch c) Fiber optic transceiver d) Coaxial cable connector
B
84
What functions does a wireless router typically combine? a) Router and firewall b) Router, switch, and modem c) Router, Access Point (AP), and switch d) Router and Access Point (AP)
C
85
What is the primary responsibility of a wireless Access Point (AP)? a) Providing wired connectivity b) Providing wireless connectivity within a network c) Managing network traffic d) Acting as a firewall
B
86
What is the primary role of a Network Operating System (NOS)? A) To manage individual computer hardware B) To control and manage a Local Area Network (LAN) C) To provide security to web applications D) To enhance graphic performance
B. it is a software
87
Which type of software runs on network servers under a Network Operating System? A) Client NOS B) Server NOS C) Desktop OS D) Mobile OS
B
88
What functions does the Server NOS perform? A) Data link, network, and application layer functions B) Presentation and session layer functions C) Only application layer functions D) Only physical layer functions
A
89
Where does Client NOS software typically run? A) On network servers B) On network clients C) On mobile devices exclusively D) On external storage devices
B
90
What is a primary feature of Client NOS? A) It manages the hardware of the server. B) It performs functions associated with data link and network layers. C) It replaces the computer's own operating system. D) It serves web pages to external networks.
B
91
What compatibility feature is most NOS known for? A) They allow all types of computers to connect to the internet. B) They enable different types of computers to function on the same network. C) They restrict the network to only one type of computer. D) They provide faster processing power for all computers.
B
92
In many cases, what is included with the operating system itself? A) Client NOS software B) Server NOS software C) Proprietary security solutions D) Dedicated graphics drivers
A
93
The NOS software for the server computer provides the physical, data link, and network layer functions
F. Data Link, Network and Application
94
9. _____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System
A
95
The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer. b. provide the software that performs the functions associated with the data link layer. c. provide the software that performs the functions associated with the application layer. d. provide the software that performs the functions associated with the network layer. e. usually provide the software that performs the functions associated with the computer’s own operating system.
A
96
What does the client version of the NOS interact with? a) Only the network hardware b) Application software and the computer's own operating system c) Only the application software d) Only the server version of the NOS
B
97
Which component is typically included in the server version of the NOS? a) Application software b) Network hardware c) The computer's own operating system d) Only the client version of the NOS
C
98
What is the primary function of NOS server software? A) To replace client operating systems B) To enable operations such as file,database and print services on a server C) To increase the storage capacity of networked computers D) To provide personal firewall and antivirus solutions
B
99
What does NOS server software replace in a server setup? A) The hardware interface B) The network cables C) The normal operating system D) The application software on clients
C
100
Why does NOS server software generally offer better performance and faster response times? A) Because it handles more functions than a normal operating system B) Because it is optimized for a limited range of operations C) Because it supports more users than traditional operating systems D) Because it has a larger storage capacity
B
101
Which of the following tasks can NOS server software execute according to the description? A) Sending emails to clients B) Executing a database request and sending the result to the client C) Enhancing the graphical interface of the server D) Installing software applications on client computers
B
102
Which of the following functions does NOS Server Software NOT perform? a) Network functions b) Operating system functions c) Application development d) Responding to client requests
C
103
Which of the following are commonly used Network Operating Systems (NOS) server software? A) Android and iOS B) Windows Server and Linux C) MacOS and Chrome OS D) Ubuntu and Fedora
B
104
What is the primary function of NOS client software? a) Interacts with network servers b) Handles all network functions c) Manages client's operating system d) Facilitates communication between client applications
B
105
Which of the following is NOT a role of NOS client software? a) Interacting with client's own OS b) Handling network functions c) Managing server resources d) Interacts with many application software installed on client e) Access Network resources
C
106
Which operating system commonly includes built-in NOS client software? a) macOS b) Linux c) Windows d) Android
C
107
What does NOS client software enable clients to do? a) Operate network servers b) Access network resources c) Manage network security d) Develop network protocols
B
108
One of the most important functions of Network Operating System (NOS) is a directory service
T
109
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services
B
110
Which company developed Active Directory Service (ADS)? a) Apple b) Microsoft c) Google d) IBM
B
111
The term “domain controller” is a name commonly used to refer to a Microsoft directory services server
T. aka active directory service ( ADS)
112
What is the role of an ADS server ( domain controllers) in a network? a) Hosting websites b) Managing domain names c) Resolving address information and managing authorization d) Providing email services
C. works like DNS service in tcp/ip
113
"A _________ is a group of centrally organized, related resources. a. workgroup b. domain c. server d. client e. sharepoint
B
114
How are network resources typically organized within ADS? a) Alphabetically b) In a hierarchical tree structure c) Based on IP addresses d) Randomly
B
115
What does a domain represent in the ADS hierarchical structure? a) A group of unrelated resources b) A single network device c) A group of related resources d) A network protocol
C
116
A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a/n ___________. a. ADS b. domain c. forest d. tree e. NDS
C
117
What protocol does a client computer typically use to communicate with the ADS domain controller to view available resources? a) FTP b) SMTP c) LDAP d) HTTP
C
118
LDAP is an industry standard directory protocol.
T
119
What is the primary function of the ADS domain controller when it receives an LDAP request? a) Encrypting network traffic b) Resolving textual names to network addresses c) Managing DNS settings d) Configuring network protocols
B
120
What information does the ADS domain controller provide to the client computer upon successful authorization? a) Contact information for the resource b) Encryption keys for secure communication c) Instructions on accessing the resource physically d) Access to additional network resources
A
121
A hardware device that is not included in a network profile cannot be accessed by another computer on the network
T
122
Network profile refers to what resources on each server are available on the network for use by other computers and which devices or people are allowed access on the network.
T
123
4. A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network. a. user profile b. user access log c. network profile d. network operating system e. server allocation list
C
124
When is a network profile typically configured? a) Whenever a new device is added to the network b) When the network is established c) On a daily basis d) When a network issue occurs
B
125
What happens if a device is not included in the network profile? a) It automatically gets added to the network b) It cannot be used by other computers on the network c) Its performance is optimized d) It becomes accessible to all computers on the network
B
126
What is a common requirement for granting network access to resources? a) Encryption of network traffic b) Authentication using biometrics c) Password authentication d) MAC address filtering
C
127
What happens if a user logs in with an incorrect access code on a LAN? a) They are granted access to all resources b) Their access code gets reset automatically c) They are denied access to the network d) They are prompted to enter another access code
C
128
What additional security measure is mentioned in the passage? a) Network encryption b) User authentication c) Firewall configuration d) Network bandwidth management
B
129
What purpose do audit files serve in LANs? a) Tracking network usage and resource access b) Storing backup copies of network profiles c) Configuring network protocols d) Monitoring network bandwidth usage
a
130
Which entities were involved in the original development of Wired Ethernet? a) Microsoft, Apple, and IBM b) Google, Facebook, and Amazon c) DEC, Xerox, and Intel d) Cisco, Juniper, and HP
C
131
What standardization body standardized Wired Ethernet? a) IEEE b) IETF c) ISO d) ANSI
A
132
At which layer of the OSI model does Wired Ethernet operate? a) Layer 1 b) Layer 2 c) Layer 3 d) Layer 4
B
133
What does topology refer to in the context of networking? a) The speed of data transmission b) The physical location of network devices c) The geometric layout of the network d) The type of network cables used
C
134
What does logical topology describe? a) The physical installation of the network b) How the network works conceptually c) The speed of network devices d) The physical location of network devices
B
135
What does physical topology define? a) How the network works conceptually b) The logical flow of data in the network c) How the network is physically installed d) The logical organization of network devices
C
136
Hub-based Ethernet is seldom used by companies today.
T
137
The type of logical topology that hub-based Ethernet uses is a: a. ring b. bus c. star d. mesh e. interconnected
B
138
How are computers interconnected in hub-based Ethernet? a) Each computer connects directly to all other computers b) All computers are connected to a central hub c) Computers form a closed loop d) Computers connect in a random pattern
B
139
What does the Ethernet software on each computer do before processing incoming frames in hub-based Ethernet? a) Checks the IP address b) Checks the physical layer address c) Checks the MAC address d) Checks the subnet mask
C
140
What is the physical topology of an Ethernet LAN when using a hub? a) Bus topology b) Star topology c) Mesh topology d) Ring topology
B
141
How are all computers connected in hub-based Ethernet? a) Through separate circuits b) Through a single half-duplex circuit known as the bus c) Through a full-duplex circuit d) Through a mesh network
B
142
How does a computer in hub-based Ethernet determine if a frame is intended for it? a) By checking the IP address b) By checking the physical layer address c) By checking the subnet mask d) By checking the MAC address
D
143
What is the term used to describe the shared multipoint circuit in hub-based Ethernet? a) Collision domain b) Broadcast domain c) Switching domain d) Routing domain
A
144
A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.
T
145
What action must other computers take when one computer transmits data in hub-based Ethernet? a) They must continue transmitting b) They must immediately stop transmitting c) They must switch to a different channel d) They must increase their transmission power
B
146
Why is security a problem in hub-based Ethernet? a) Because of the complexity of the network b) Because any frame can be read by any computer in the same collision domain c) Because of the limited bandwidth d) Because of the high cost of implementatio
B
147
Wireless Ethernet functions similarly to hub-based Ethernet.
T
148
What is the predominant device used in most corporate Ethernet installations today? a) Hubs b) Routers c) Switches d) Repeaters
C
149
What is the logical and physical topology of Ethernet when utilizing switches? a) Bus b) Star c) Ring d) Mesh
B
150
How do switches differ from hubs in terms of circuit management? a) Switches manage shared circuits b) Switches manage dedicated point-to-point circuits c) Switches do not manage circuits d) Switches manage circular circuits
B
151
What type of circuits do switches support? a) Half-duplex circuits b) Circular circuits c) Shared circuits d) Full-duplex circuits
D
152
What is the primary advantage of full-duplex circuits supported by switches? a) They support multiple devices on the same circuit b) They enable simultaneous sending and receiving c) They reduce network latency d) They eliminate the need for collision detection
B
153
A forwarding table tells a switch which port it should send out a packet to get to the destination computer.
T
154
What is the purpose of a forwarding table in a switch?A) To list the IP addresses of connected devices B) To list the Ethernet addresses of connected devices C) To manage routing between different networks D) To prioritize network traffic
B
155
How does a switch determine where to forward a received frame? A) By analyzing the Layer 3 network address B) By searching the ARP table C) By matching the Layer 2 destination address with entries in the forwarding table D) By consulting the routing table
C
156
What does a switch do when it receives a frame? A) It broadcasts the frame to all connected devices B) It discards the frame if the destination address is not found C) It reads the Layer 2 destination address and forwards the frame to the corresponding port based on the forwarding table D) It analyzes the Layer 3 destination address and forwards the frame accordingly
C
157
How does a switch help in network management? A) By providing access control lists B) By facilitating communication between different VLANs C) By maintaining a forwarding table for efficient packet delivery D) By configuring IP addresses for connected devices
C
158
What is the role of a switch in relation to the collision domain? A) It extends the collision domain to encompass multiple networks B) It creates a separate collision domain for each connected device C) It breaks up the collision domain by forwarding frames only to the intended recipient's port D) It consolidates collision domains to improve network efficiency
C
159
When a switch receives an Ethernet frame with a destination address that is not in its forwarding table, the switch will broadcast the frame out all of its other ports.
T
160
How does a switch learn about connected computers' addresses? A) By querying the ARP table B) By broadcasting frames to all ports C) By reading the source data link layer address of incoming frames D) By consulting the routing table
C
161
What action does a switch take if it encounters a destination address not in its forwarding table? A) It drops the frame B) It forwards the frame to all ports C) It consults the routing table for further instructions D) It broadcasts the frame to all ports
D
162
What triggers the update of the forwarding table in a switch? A) Receiving an ACK or NAK from the addressed computer B) Rebooting the switch C) Connecting a new device to the network D) Sending a broadcast frame to all ports
A
163
What happens to entries for inactive computers in the forwarding table? A) They are immediately removed B) They are retained indefinitely C) They are removed after a period of inactivity D) They are prioritized over active connections
C
164
What behavior does a switch exhibit as its forwarding table becomes more complete? A) It drops incoming frames B) It broadcasts frames to all ports C) It forwards frames only to the appropriate port D) It reverts to hub-like functionality
C. Acting like more switch which the foward the frame
165
How long does it typically take for a switch to learn most addresses and match them to port numbers? A) Hours B) Days C) Minutes D) Seconds
C
166
What is the typical timeframe for removing entries of inactive computers from the forwarding table? A) 60 seconds B) 120 seconds C) 300 seconds D) 600 seconds
C
167
Why are active connections prioritized in a switch's forwarding table? A) To conserve memory space B) To improve network security C) To enhance switch performance D) To reduce broadcast traffic
C
168
With layer-2 switched Ethernet, the switch uses a forwarding table to switch the frame to the correct circuit/computer.
T
169
With switched Ethernet, it has forwarding tables in which entries are learned over time
T
170
A switch uses a _____________ that is very similar to a routing table used in a router. a. cable plan b. forwarding table c. network server d. reversing table e. switching mullion
B
171
. Which of the following is not true about layer-2 switched Ethernet? a. A switch replaces the hub. b. The physical topology is the same as the physical topology of shared Ethernet: a ring. c. The logical topology is a star. d. The switch uses a forwarding table to switch the frame to the correct circuit/computer. e. The switch chooses which frame to transmit first if it receives more than one frame destined for the same computer at the same time, and stores the other frame(s) temporarily.
B
172
Cut-through switching has fewer errors than store and forward switching.
F
173
What is a characteristic of cut-through switching? A) It waits for the entire frame to be received before transmission. B) It checks the frame's integrity before transmission. C) It introduces high latency in network performance. D) It starts transmitting after reading the destination address, without waiting for the entire frame
D
174
What is the primary advantage of cut-through switching? A) Reduced waste capacity B) Increased reliability C) Lower latency D) Enhanced error checking
C
175
What is a potential drawback of cut-through switching? A) Reduced network performance B) Increased risk of transmitting erroneous frames C) Improved frame integrity D) Lower data rates on outgoing circuits
B. waste capacity
176
When is cut-through switching most suitable? A) When there is a need for rigorous error checking. B) When there is a requirement for varying data rates between incoming and outgoing circuits. C) When low latency and fast network performance are prioritized. D) When the incoming circuit must have the same data rate as the outgoing circuit.
D
177
Store and forward switching may only be used when the incoming and outgoing data circuit have the same data rate
F
178
What is a characteristic of store-and-forward switching? A) It starts transmitting after reading the destination address. B) It discards frames immediately upon detection of errors. C) It performs error control after transmitting the frame. D) It waits until the whole frame is received before transmission.
D
179
How does store-and-forward switching affect network latency? A) It significantly reduces network latency. B) It increases network latency but improves reliability. C) It has no effect on network latency. D) It introduces network latency but reduces errors
B
180
What happens if errors are found in a frame during store-and-forward switching? A) The switch discards the frame. B) The switch attempts to correct the errors before forwarding the frame. C) The frame is forwarded without error correction. D) The switch broadcasts the frame to all ports.
A
181
What is a primary advantage of store-and-forward switching? A) Lower latency B) Reduced risk of transmitting erroneous frames C) Increased waste capacity D) Faster network performance
B
182
In what scenario is store-and-forward switching most suitable? A) When there's a need for low latency and fast network performance B) When there's a requirement for varying data rates between incoming and outgoing circuits C) When error control is prioritized over latency D) When the incoming circuits may have different data rates than the outgoing circuit
D
183
How does store-and-forward switching handle frames with different data rates between incoming and outgoing circuits? A) It discards frames with different data rates. B) It converts the data rates before forwarding the frames. C) It buffers frames until they can be transmitted at the outgoing circuit's rate. D) It forwards frames immediately without considering data rates.
C
184
What is the primary reason for store-and-forward switching to wait until the whole frame is received before transmission? A) To reduce network latency B) To perform error control C) To prioritize high-speed data transmission D) To minimize the waste of network capacity
B
185
What is a characteristic of fragment-free switching? A) It reads the entire frame before transmission. B) It discards frames with errors in the header. C) It transmits frames only after the entire frame has been received. D) It reads the first 64 Bytes of the frame before transmission.
D
186
How does fragment-free switching mitigate errors in frames? A) By discarding frames with any errors B) By transmitting frames immediately after the header is verified C) By performing error correction on the entire frame D) By buffering frames until errors are corrected
B
187
Which of the following is a mode in which a switch reads in the first 64 bytes of the Ethernet frame and then begins forwarding out the frame on an outgoing port? a. fast learning switching b. routing switching c. fragment-free switching d. store switching e. cut switching
C
188
Which of the following is not true about CSMA/CD? a. The acronym refers to Carrier Sense Multiple Access with Collision Detection b. It is used in token ring protocol LANs c. It is a contention-based media access control technique d. When a collision has occurred, the computers that wish to transmit wait a random amount of time after a colliding message before attempting to retransmit e. Computers on the circuit ‘listen’ before transmitting
B
189
Why does Ethernet require Media Access Control (MAC)? A) To manage routing between different networks B) To prevent collisions and manage access to the network medium C) To prioritize network traffic based on destination addresses D) To encrypt data transmissions over the network
B. Ethernet needs MAC because Ethernet still must operate on a multipoint circuit
190
What happens if two computers on an Ethernet network transmit at the same time? A) Their transmissions are merged into a single frame. B) Their transmissions collide and become garbled. C) The network switches to a different media access method. D) The network automatically prioritizes one transmission over the other.
B
191
What does a computer do before transmitting a frame in a CSMA/CD-based Ethernet network? A) It immediately transmits the frame without checking the network status. B) It waits for a random amount of time before transmitting. C) It checks if no other devices are transmitting before starting its transmission. D) It sends a signal to request permission for transmission from the network administrator.
C
192
How does CSMA/CD work to prevent collisions in Ethernet networks? A) It assigns fixed time slots to each device for transmission. B) It prioritizes certain devices over others based on MAC addresses. C) It allows devices to sense the network before transmitting and detects collisions if they occur. D) It encrypts all data transmissions to prevent unauthorized access.
C
193
How do computers respond after a collision has occurred in a CSMA/CD-based Ethernet network? A) They continue transmitting regardless of the collision. B) They stop transmitting and wait for a predetermined time before reattempting transmission. C) They increase their transmission power to overpower other devices on the network. D) They switch to a different media access method to avoid future collisions. What is the primary goal of CSMA/CD in Ethernet networks?
B
194
What is the primary goal of CSMA/CD in Ethernet networks? A) To prioritize certain devices over others based on their MAC addresses. B) To minimize the occurrence and impact of collisions during data transmission. C) To encrypt all data transmissions to ensure network security. D) To allocate fixed time slots to each device for transmission, ensuring fair access to the network medium.
B
195
What is the primary function of Carrier Sense (CS) in computer networks? a) To ensure data encryption b) To listen to the bus for transmissions c) To manage network addresses d) To prioritize data packets
B
196
When does a computer employing Carrier Sense (CS) decide to transmit data? a) When another computer is transmitting b) When no one else is transmitting c) Randomly d) Only when it has the highest priority
B
197
What is the purpose of Carrier Sense (CS) in network communication? a) To prevent data loss b) To detect and avoid collisions c) To increase data transfer speed d) To identify network congestion
D
198
What is the potential drawback of relying solely on Carrier Sense (CS) for network communication? a) Slower data transmission b) Increased chances of data corruption c) Higher network congestion d) Possibility of collision even with collision detection
D. when 2 computers transmit as the same time
199
What is the primary characteristic of Multiple Access (MA) in network communication? a) It restricts access to a single computer at a time. b) It allows access to the network medium by multiple computers simutaneously c) It limits network access to a specific time interval. d) It prioritizes access based on computer hierarchy.
B
200
What is the primary function of Collision Detection (CD) in network communication? a) To encrypt data packets b) To detect and resolve collisions during transmission c) To prioritize data packets based on their destination d) To manage network addresses
B
201
How does a computer employing Collision Detection (CD) react when it detects a signal other than its own while transmitting? a) It continues transmitting without any action. b) It sends a jamming signal to stop other computers from transmitting. c) It encrypts its data packets. d) It waits for acknowledgment from the recipient before continuing transmission.
B
202
What action does a computer take after sending a jamming signal in Collision Detection (CD)? a) It resumes transmission immediately. b) It waits for a random amount of time before retransmitting. c) It switches to a different network medium. d) It shuts down to avoid further collisions.
B
203
How does Collision Detection (CD) decrease the probability of a second collision? a) By increasing the transmission speed b) By decreasing the number of computers on the network c) By sending a jamming signal to stop other transmissions d) By introducing a random backoff time before retransmission
D
204
The three latest versions of Ethernet run at speeds of 1Gbps, 10Gbps, and 50 Gbps.
F. 10Mbps, 100Mbps,1Gbps
205
1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable.
F. is a version of 1000Base-F
206
. _________ is not a type of Ethernet specification. a. 100Base-T b. 10GbE c. 1000Base-T (1GbE) d. 10Base-T e. Securenet
E
207
. ________ is a hybrid version of Ethernet that uses either 10Base-T, 100Base-T, or 1000Base-T. a. Mullion Ethernet b. Base-T Ethernet c. 10/100/1000 Ethernet d. Token ring Ethernet e. FDDI Ethernet
C
208
. 100 Base-T: a. can run at either full- or half-duplex b. is one of the oldest forms of Ethernet c. is one of the slowest forms of Ethernet d. can only be used over coaxial cables e. has only one version, 100Base-SLCX
A
209
100Base-T: a. supports 100 Mbps data rate b. is inexpensive c. runs on twisted pair d. is more dominant than token ring e. all of the answers are correct
E
210