Chapter 1 Flashcards
(36 cards)
Which form of communication is a real-time, text-based communication type used between two or more people who use mostly text to communicate?
A. Weblogs
B. Wikis
C. Instant Messaging
D. Podcasting
C. Instant messaging is the only answer that is both text based and real time
Which type of network provides customers with limited access to corporate data such as inventory, parts lists, and orders?
A. Intranet
B. Extranet
C. Internetwork
D. Internet
B. An extranet provides as-needed access for external vendors and customers to a secure corporate network. An intranet is for internal users.
___________ are collaborativve web pages created and edited by users
Wikis
What prioritizes traffic and its characteristics to manage data?
A. Network administration
B. Network traffic
C. QoS strategy
D. Network evaluation
C. Considering the importance of traffic flow when managing data is a function of a quality of service (QoS) strategy. Network administrators would evaluate the network traffic to determine a QoS strategy.
Rules that govern the process of network communication are called _________
protocols
What network traffic processes must be in place for quality of service strategies to
work correctly? (Choose two.)
A. Traffic is classified based on quality of service requirements.
B. Priorities are assigned to each classification of application data.
C. Web traffic is always assigned to a high-priority queue for processing.
D. Digital movies are always assigned to the high-priority queue for processing.
E. E-mail traffic is always assigned to the low-priority queue.
A, B. A quality of service strategy first classifies traffic based on requirements and then assigns priorities to the classifications as needed by the owners of the network. The network administrator can give different priorities to e-mail, web traffic, and movies
Copper cables and fiber-optic cables are two types of network ___________________
media
What are two components of network architecture? (Choose two.)
A. People that comprise the human network
B. Built-in growth potential
C. Data transfer across the network
D. Redundant technologies
E. Corporations that operate and maintain the data network
B, D. Two components of a network’s architecture are scalability, which is planning for
growth, and fault tolerance, which includes redundant links. The other answers describe
either users of the network or the product of it (data transfer).
Symbols that graphically represent network devices and media are called ___________.
icons
For which three reasons were circuit-switched, connection-oriented technologies
rejected when the Internet was being developed? (Choose three.)
A. Circuit-switched technologies required that a single message be broken up into multiple message blocks that contain addressing information.
B. Early circuit-switched networks did not automatically establish alternative circuits in
the event of circuit failure.
C. Circuit-switched technologies required that an open circuit between network endpoints
be established even if data was not being actively transferred between locations.
D. The quality and consistency of messages transmitted across a connection-oriented,
circuit-switched network cannot be guaranteed.
E. The establishment of simultaneous open circuits for fault tolerance is costly.
B, C, and E. Circuit-switched networks did not automatically establish alternative circuits in the event of circuit failure and required that an open circuit between network endpoints be established, even if data was not being actively transferred between locations. Also, the establishment of simultaneous open circuits for fault tolerance is costly
For which three reasons was a packet-switched, connectionless data communications
technology used when developing the Internet? (Choose three.)
A. It can rapidly adapt to the loss of data transmission facilities.
B. It efficiently utilizes the network infrastructure to transfer data.
C. Data packets can travel multiple paths through the network simultaneously.
D. It allows billing of network use by the amount of time a connection is established.
E. It requires that a data circuit between the source and destination be established
before data can be transferred.
A, B, C. Packet-switched, connectionless data communications technology can rapidly adapt to the loss of data transmission facilities and efficiently utilizes the network infrastructure to transfer data, and data packets can travel multiple paths through the network simultaneously. D and E refer to connections being established, which is not the nature of connectionless data communications.
A _____________ is a device that helps direct messages between networks
router
What is the role of QoS in a converged network?
A. Ensures that all traffic above available bandwidth levels is dropped
B. Establishes delivery priorities for different types of communication in a network
C. Determines precise priorities for all types of network communication
D. Allows unused bandwidth to be shared by other organizations within the network
B. QoS establishes priorities for different communications. It is not required to rate all network communication, just to give priority to what is deemed important.
Which term describes a common platform for diverse communication types?
A. Scalability
B. Convergence
C. Fault tolerance
D. Quality of service
B. Convergence is combining different technologies, such as telephone, video, and text, on one network platform
Connectionless messages are broken into __________.
packets
Which of the following pertains to network infrastructure security?
A. A competitor accesses sensitive information through an unsecured wireless network.
B. Builders accidentally cut a network cable while digging.
C. A disgruntled employee alters information in a customer database.
D. A secretary sends confidential information in a reply to an e-mail that falsely
appears to come from her boss.
B. Only the cut cable pertains to infrastructure security. The others refer to content security. The unsecured wireless network might be allowed in network plans, but care must be taken to keep sensitive information beyond its reach.
Elements of a network
- Rules/Agreements
- Messages
- Medium
- Devices
A device that helps direct messages between networks
Router
A symbol used to summarize a group of networking devices out of local management control, often the Internet itself
Cloud
Coming together of technologies onto a digital platform
Convergence
refers to the conceptual plans on which a physical network is built
Network Architecture
means that the Internet will continue to function normally even when some of the components of the network fail
Fault tolerance
the network’s ability to grow and react to future changes
Scalability
performance level of services offered through the network
quality of srevice