Chapter 1 Flashcards

(36 cards)

1
Q

Which form of communication is a real-time, text-based communication type used between two or more people who use mostly text to communicate?

A. Weblogs
B. Wikis
C. Instant Messaging
D. Podcasting

A

C. Instant messaging is the only answer that is both text based and real time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?

A. Intranet
B. Extranet
C. Internetwork
D. Internet

A

B. An extranet provides as-needed access for external vendors and customers to a secure corporate network. An intranet is for internal users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___________ are collaborativve web pages created and edited by users

A

Wikis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What prioritizes traffic and its characteristics to manage data?

A. Network administration
B. Network traffic
C. QoS strategy
D. Network evaluation

A

C. Considering the importance of traffic flow when managing data is a function of a quality of service (QoS) strategy. Network administrators would evaluate the network traffic to determine a QoS strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Rules that govern the process of network communication are called _________

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What network traffic processes must be in place for quality of service strategies to
work correctly? (Choose two.)

A. Traffic is classified based on quality of service requirements.
B. Priorities are assigned to each classification of application data.
C. Web traffic is always assigned to a high-priority queue for processing.
D. Digital movies are always assigned to the high-priority queue for processing.
E. E-mail traffic is always assigned to the low-priority queue.

A

A, B. A quality of service strategy first classifies traffic based on requirements and then assigns priorities to the classifications as needed by the owners of the network. The network administrator can give different priorities to e-mail, web traffic, and movies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Copper cables and fiber-optic cables are two types of network ___________________

A

media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two components of network architecture? (Choose two.)

A. People that comprise the human network
B. Built-in growth potential
C. Data transfer across the network
D. Redundant technologies
E. Corporations that operate and maintain the data network

A

B, D. Two components of a network’s architecture are scalability, which is planning for
growth, and fault tolerance, which includes redundant links. The other answers describe
either users of the network or the product of it (data transfer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symbols that graphically represent network devices and media are called ___________.

A

icons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

For which three reasons were circuit-switched, connection-oriented technologies
rejected when the Internet was being developed? (Choose three.)

A. Circuit-switched technologies required that a single message be broken up into multiple message blocks that contain addressing information.
B. Early circuit-switched networks did not automatically establish alternative circuits in
the event of circuit failure.
C. Circuit-switched technologies required that an open circuit between network endpoints
be established even if data was not being actively transferred between locations.
D. The quality and consistency of messages transmitted across a connection-oriented,
circuit-switched network cannot be guaranteed.
E. The establishment of simultaneous open circuits for fault tolerance is costly.

A

B, C, and E. Circuit-switched networks did not automatically establish alternative circuits in the event of circuit failure and required that an open circuit between network endpoints be established, even if data was not being actively transferred between locations. Also, the establishment of simultaneous open circuits for fault tolerance is costly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For which three reasons was a packet-switched, connectionless data communications
technology used when developing the Internet? (Choose three.)

A. It can rapidly adapt to the loss of data transmission facilities.
B. It efficiently utilizes the network infrastructure to transfer data.
C. Data packets can travel multiple paths through the network simultaneously.
D. It allows billing of network use by the amount of time a connection is established.
E. It requires that a data circuit between the source and destination be established
before data can be transferred.

A

A, B, C. Packet-switched, connectionless data communications technology can rapidly adapt to the loss of data transmission facilities and efficiently utilizes the network infrastructure to transfer data, and data packets can travel multiple paths through the network simultaneously. D and E refer to connections being established, which is not the nature of connectionless data communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A _____________ is a device that helps direct messages between networks

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of QoS in a converged network?

A. Ensures that all traffic above available bandwidth levels is dropped
B. Establishes delivery priorities for different types of communication in a network
C. Determines precise priorities for all types of network communication
D. Allows unused bandwidth to be shared by other organizations within the network

A

B. QoS establishes priorities for different communications. It is not required to rate all network communication, just to give priority to what is deemed important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term describes a common platform for diverse communication types?

A. Scalability
B. Convergence
C. Fault tolerance
D. Quality of service

A

B. Convergence is combining different technologies, such as telephone, video, and text, on one network platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Connectionless messages are broken into __________.

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following pertains to network infrastructure security?

A. A competitor accesses sensitive information through an unsecured wireless network.
B. Builders accidentally cut a network cable while digging.
C. A disgruntled employee alters information in a customer database.
D. A secretary sends confidential information in a reply to an e-mail that falsely
appears to come from her boss.

A

B. Only the cut cable pertains to infrastructure security. The others refer to content security. The unsecured wireless network might be allowed in network plans, but care must be taken to keep sensitive information beyond its reach.

17
Q

Elements of a network

A
  • Rules/Agreements
  • Messages
  • Medium
  • Devices
18
Q

A device that helps direct messages between networks

19
Q

A symbol used to summarize a group of networking devices out of local management control, often the Internet itself

20
Q

Coming together of technologies onto a digital platform

21
Q

refers to the conceptual plans on which a physical network is built

A

Network Architecture

22
Q

means that the Internet will continue to function normally even when some of the components of the network fail

A

Fault tolerance

23
Q

the network’s ability to grow and react to future changes

24
Q

performance level of services offered through the network

A

quality of srevice

25
all messages are broken into smaller pieces that can be easily transported together across a medium
Segmentation
26
when the segments of two or more messages can shuffle into each other and share the medium
Multiplexing
27
a piece of equipment that is either the source or the destination of a message on a network
end device
28
group of end devices and users under the control of a common administration
LAN
29
network that is used to connect LANs that are located geographically far apart
WAN
30
s a collection of two or more LANs connected by WANs
internetwork
31
private web of networks closed to the public but open for employees to browse
intranet
32
s the transport protocol that manages the individual conversations between web servers and web clients
Transmission Control Protocol
33
responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning the appropriate addresses, and selecting the best path to the destination host.
Internet Protocol
34
Layers of the TCP/IP Model
* Application * Transport * Internet * Network access
35
process of adding control information as it passes through the layered model
Encapsulation
36
process of removing the extra information and sending only the original application data up to the destination application layer
Decapsulation