Advertisement Upgrade to remove ads

____ are combinations of networking hardware and software that connect two dissimilar kinds of networks.

Correct Answer: Gateways

____ are the distinct units of data that are exchanged between nodes on a network.

Correct Answer: Data packets

____ ARP table entries are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table.

Correct Answer: Dynamic

____ describes a popular serial data transmission method.

Correct Answer: EIA/TIA RS-232 (Recommended Standard 232)

____ describes wiring that connects workstations to the closest telecommunications closet.

Correct Answer: Horizontal wiring

____ hubs possess internal processing capabilities.

Correct Answer: Intelligent

____ is a command-line function for viewing and setting wireless interface parameters and it is common to nearly all versions of Linux and UNIX.

Correct Answer: iwconfig

____ is a method of encrypting TCP/IP transmissions.

Correct Answer: SSL

____ is a most significant problem for wireless communications because the atmosphere is saturated with electromagnetic waves.

Correct Answer: Interference

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.

Correct Answer: PGP

____ is a set of data or instructions that has been saved to a ROM (read-only memory) chip (which is on the NIC).

Correct Answer: Firmware

____ is a simple Application layer protocol used to synchronize the clocks of computers on a network.

Correct Answer: NTP

____ is a technology used with fiber-optic cable, which enables one fiber-optic connection to carry multiple light signals simultaneously.

Correct Answer: WDM (wavelength division multiplexing)

____ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.

Correct Answer: Telnet

____ is a type of microchip that requires very little energy to operate.

Correct Answer: CMOS

____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.

Correct Answer: PING

____ is an 802.11n feature that allows two adjacent 20-MHz channels to be combined to make a 40-MHz channel.

Correct Answer: Channel bonding

____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.

Correct Answer: Frame aggregation

____ is more efficient than TCP for carrying messages that fit within one data packet.

Correct Answer: UDP

____ is one of the most important functions an NOS provides.

Correct Answer: Client support

____ is the preferred communications protocol for remote access communications.

Correct Answer: PPP

____ is the process of reconstructing segmented data.

Correct Answer: Reassembly

____ is the standard for connecting home computers to an ISP via DSL or broadband cable.

Correct Answer: PPPoE

____ memory may be logically carved out of space on the hard drive for temporary use.

Correct Answer: Virtual

____ networks are the most popular type of network for medium- and large-scale organizations.

Correct Answer: Client/server

____ operates at the Network layer and manages multicasting.

Correct Answer: IGMP

____ oversees the IAB (Internet Architecture Board).

Correct Answer: ISOC

____ routing is a technique in which a network administrator programs a router to use specific paths between nodes.

Correct Answer: Static

____ services allow remote users to connect to the network.

Correct Answer: Access

____ services refer to the capability of a server to share data files, applications, and disk storage space.

Correct Answer: File

____ software searches a node for open ports.

Correct Answer: Port scanner

____ virtual computing allows a user on one computer, called the client, to control another computer, called the host or server, across a network connection.

Correct Answer: Remote

1000Base-SX has a maximum throughput of ____.

Correct Answer: 1 Gbps

1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable.

Correct Answer: 10

A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO.

Correct Answer: DSLAM

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.

Correct Answer: brute force

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.

Correct Answer: dictionary

A ____ attack occurs when an Internet chat user sends commands to a victim's machine that cause the screen to fill with garbage characters and requires the victim to terminate their chat sessions.

Correct Answer: flashing

A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.

Correct Answer: terminal adapter

A ____ facilitates communication and resource sharing between other computers on the network.

Correct Answer: server

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

Correct Answer: packet-filtering

A ____ is a multiport connectivity device that directs data between nodes on a network.

Correct Answer: router

A ____ is a repeater with more than one output port.

Correct Answer: hub

A ____ is a specialized device that allows multiple networks or multiple parts of one network to connect and exchange data.

Correct Answer: connectivity device

A ____ is simply a linked series of devices.

Correct Answer: daisy-chain

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.

Correct Answer: router's

A ____ network connects clients and servers from multiple buildings.

Correct Answer: MAN

A ____ network is confined to a relatively small space.

Correct Answer: LAN

A ____ occurs when two transmissions interfere with each other.

Correct Answer: collision

A class ____ network class is reserved for special purposes.

Correct Answer: D

A common way of sharing resources on a peer-to-peer network is by modifying the ____ controls using the computer's operating system.

Correct Answer: file-sharing

A complex combination of pure topologies is known as a ____ topology.

Correct Answer: hybrid

A digital signal composed of a pulse of positive voltage represents a ____.

Correct Answer: 1

A directional antenna issues wireless signals along a(n) ____ direction.

Correct Answer: single

A directional antenna issues wireless signals along a(n) ____ direction.

Correct Answer: single

A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have ____ names.

Correct Answer: duplicate

A NIC's transmission characteristics are held in the adapter's ____.

Correct Answer: firmware

A physical topology ____.

Correct Answer: depicts a network in broad scope

A piece of software called ____ translates requests and responses between a client and a server.

Correct Answer: middleware

A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista, Server 2003, and Server 2008.

Correct Answer: pathping

A PSTN offers ____ security.

Correct Answer: marginal

A router that is not configured to drop packets that match certain suspicious characteristics is an example of a risk associated with ____.

Correct Answer: transmission and hardware

A UDP header contains ____ fields.

Correct Answer: four

A unique characteristic of the 802.11 data frame is its ____ field.

Correct Answer: Sequence Control

A(n) ____ is a list that organizes resources and associates them with their characteristics.

Correct Answer: directory

A(n) ____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

Correct Answer: digital certificate

A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs, enables administrators to manage files, users, groups, security, printers, and so on.

Correct Answer: GUI

A(n) ____ is a routine of sequential instructions that runs until it has achieved its goal.

Correct Answer: process

A(n) ____ is a self-contained, well-defined task within a process.

Correct Answer: thread

A(n) ____ is the circuit board wire over which a device issues voltage to signal this request.

Correct Answer: interrupt

A(n) ____ is the record of a user that contains all of his properties, including rights to resources, password, name, and so on.

Correct Answer: account

Active Directory organizes multiple domains hierarchically in a domain ____.

Correct Answer: tree

All Ethernet networks, independent of their speed or frame type, use an access method called ____.

Correct Answer: CSMA/CD

An 802.11g antenna has a geographic range of ____ meters.

Correct Answer: 100

An 802.11g antenna has a geographic range of ____ meters.

Correct Answer: 100

An administrator can discover the host name assigned to a client by using the ____ utility.

Correct Answer: hostname

An example of a popular client email software is ____.

Correct Answer: Microsoft Outlook

An example of a popular mail server is ____.

Correct Answer: Microsoft Exchange Server

An NOS that contains a "back door"is an example of a risk associated with ____.

Correct Answer: protocols and software

At the customer's demarcation point, either inside or outside the building, T-carrier wire pairs terminate with a ____.

Correct Answer: smart jack

Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.

Correct Answer: reserved

Because WAN connections require routers or other Layer 3 devices to connect locations, their links are not capable of carrying ____ protocols.

Correct Answer: nonroutable

Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.

Correct Answer: security

Collectively, MPLS labels are sometimes called a ____.

Correct Answer: shim

Dependability is a characteristic of ____.

Correct Answer: soft skills

Dial return satellite Internet access is a(n) ____ technology.

Correct Answer: asymmetrical

Each network node has ____ types of addresses.

Correct Answer: two

Each time a computer starts up, the device drivers for all its connected peripherals are loaded into ____.

Correct Answer: RAM

Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.

Correct Answer: man

Given their long-distance capabilities, 10GBase-ER and 10GBase-EW are best suited for use on ____.

Correct Answer: WANs

Hardware diagnosis and failure alert are handled by ____.

Correct Answer: management services

If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.

Correct Answer: interference

If intermittent and difficult-to-diagnose wireless communication errors occur, ____ might be the culprit.

Correct Answer: interference

If the standard port number for the Telnet service is 23, a host whose IPv4 address is 10.43.3.87 has a socket address for Telnet of ____.

Correct Answer: 10.43.3.87:23

In ____ , a hacker forges name server records to falsify his host's identity.

Correct Answer: DNS spoofing

In ____ addressing, only Class A, Class B, and Class C addresses are recognized.

Correct Answer: classful

In ____ scanning, the station transmits a special frame, known as a probe, on all available channels within its frequency range.

Correct Answer: active

In ____ wireless systems, the result is a point-to-point link.

Correct Answer: fixed

In ____, a wireless signal splits into secondary waves when it encounters an obstruction.

Correct Answer: diffraction

In ____, both computers verify the credentials of the other.

Correct Answer: mutual authentication

In a ____ attack, a person redirects or captures secure transmissions as they occur.

Correct Answer: man-in-the-middle

In a ____ cable, the usual wire positions are exactly reversed in one of the two RJ-45 terminations.

Correct Answer: rollover

In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective throughput of 128 Kbps.

Correct Answer: bonding

In a ring network, each workstation acts as a(n) ____ for the transmission.

Correct Answer: repeater

In classful addressing, Class C IPv4 address host information is located in the ____.

Correct Answer: last 8 bits

In classful addressing, the Class B IPv4 address network ID is located in the ____.

Correct Answer: first 16 bits

In dotted decimal notation, a(n) ____ separates each decimal.

Correct Answer: period

In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.

Correct Answer: B

In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ____ network.

Correct Answer: C

In IPv4 addressing, each IP address is a unique ____ number.

Correct Answer: 32-bit

In IPv4 addressing, eight bits have 256 possible combinations.Only the numbers 1 through 254 can be used to identify networks and hosts in an IP address. Explain what the number 0 and the number 255 are used for in IPv4 addressing.

Correct Answer: The number 0 is reserved to act as a placeholder when referring to an entire group of computers on a network - for example, 10.0.0.0 represents all of the devices whose first octet is 10. The number 255 is reserved for broadcast transmissions. For example, sending a message to the address 255.255.255.255 sends a message to all devices connected to your network segment.

In modulation, a simple wave called a ____ wave, is combined with another analog signal to produce a unique signal that gets transmitted from one node to another.

Correct Answer: carrier

In most cases, BOOTP has been surpassed by the more sophisticated IP addressing utility, ____.

Correct Answer: DHCP

In packet switching, when packets reach their destination node, the node ____ them based on their control information.

Correct Answer: reassembles

In the domain name www.google.com, ____ is the top-level domain (TLD).

Correct Answer: com

In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.

Correct Answer: IP

In which OSI model layer do hubs operate?

Correct Answer: Physical

In which OSI model layer does IP operate?

Correct Answer: Network

In which OSI model layer does TCP operate?

Correct Answer: Transport

In which OSI model layer(s) do NICs operate?

Correct Answer: Physical and Data Link

In wireless communication, to exchange information, two antennas must be tuned to the same ____.

Correct Answer: frequency

ISDN PRI uses ____ B channels and one 64-Kbps D channel.

Correct Answer: 23

LEO satellites orbit the Earth with an altitude as low as ____ miles.

Correct Answer: 100

Many network problems can be traced to poor cable ____ techniques.

Correct Answer: installation

Modern LANs use ____ or higher wiring.

Correct Answer: Cat 5

Naming (or addressing) conventions in Active Directory are based on the ____ naming conventions.

Correct Answer: LDAP

Nearly all NICs contain a(n) ____, the device that transmits and receives data signals.

Correct Answer: data transceiver

Often, separate LANs are interconnected and rely on several ____ running many different applications and managing resources other than data.

Correct Answer: servers

On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

Correct Answer: collision domain

On most modern WANs, a ring topology relies on ____ rings to carry data.

Correct Answer: redundant

One of the most common transmission flaws affecting data signals is ____.

Correct Answer: noise

POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.

Correct Answer: 110

RADIUS and TACACS belong to a category of protocols known as AAA (____).

Correct Answer: authentication, authorization, and accounting

Satellite Internet access providers typically use frequencies in the C- or ____ bands.

Correct Answer: Ku-

Serial refers to a style of data transmission in which the pulses that represent bits follow one another along a ____ transmission line.

Correct Answer: single

SMTP operates from port ____.

Correct Answer: 25

Solaris employs the file system called ____ for its native file system type.

Correct Answer: UFS

SONET's extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.

Correct Answer: fault tolerance

Standards define the ____ performance of a product or service.

Correct Answer: minimum acceptable

Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.

Correct Answer: content

TCP is a(n) ____ subprotocol.

Correct Answer: connection-oriented

The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.

Correct Answer: default

The ____ is a simple set of instructions that enables a computer to initially recognize its hardware.

Correct Answer: BIOS

The ____ is a specialized United Nations agency that provides developing countries with technical expertise and equipment to advance those nations' technological bases.

Correct Answer: ITU

The ____ setting specifies, in hexadecimal notation, which area of memory will act as a channel for moving data between the NIC and the CPU.

Correct Answer: base I/O port

The ____ utility allows you to view a host's routing table.

Correct Answer: route

The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.

Correct Answer: twisted pair

The 10-gigabit fiber optic standard with the shortest segment length is ____.

Correct Answer: 10GBase-SR

The average geographic range for an 802.11a antenna is ____ meters.

Correct Answer: 20

See More

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set