Chapter 12: Behind the Scenes: Networking and Security
Chapter 12:
Behind the Scenes: Networking and Security
Multiple Choice:
1.Which of the following is NOT an advantage of using networks compared to a stand-alone computer?
- ease of maintenance and administration
- enhanced resource sharing
- increased productivity
- increased communication capabilities
Answer: AReference: Networking AdvantagesDifficulty: Easy
2.______networks may experience significant slowdowns if more than ten (10) users are on the network.
- Wide area
- Peer-to-peer
- Server-based
- Metropolitan area
Answer: BReference: Client/Server NetworksDifficulty: Moderate
3.All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT:
- P2P networks do not require servers.
- security cannot be implemented centrally on P2P networks.
- each computer must be updated individually in P2P networks.
- P2P networks are decentralized and not easily scalable.
Answer: AReference: Client/Server NetworksDifficulty: Easy
4.Individual users must take responsibility for data backups and security on a peer-to-peer network because this kind of network is considered:
- scalable.
- centralized.
- decentralized.
- dedicated.
Answer: CReference: Client/Server NetworksDifficulty: Moderate
5.The ability to easily add additional users means that a network is:
- scalable.
- dedicated.
- decentralized.
- secure.
Answer: AReference: Client/Server NetworksDifficulty: Moderate
6.In a client/server network, all clients are connected to a server that performs tasks for them, such as backup and security; therefore, it is known as a ______network.
- local area
- dedicated
- decentralized
- centralized
Answer: DReference: Client/Server NetworksDifficulty: Easy
7.A(n) ______is a small group of computers and peripherals linked together in a small geographic area.
- LAN
- PAN
- CAN
- MAN
Answer: AReference: Classifications of Client/Server Networks: LANs… Difficulty: Easy
8.The Internet is most accurately categorized as a:
- LAN.
- PAN.
- WAN.
- MAN.
Answer: CReference: Classifications of Client/Server Networks: LANS…Difficulty: Easy
9.PANs are used to connect ______devices (such as Bluetooth-enabled devices) in close proximity to each other.
- peripheral
- wireless
- dedicated
- client
Answer: BReference: Classifications of Client/Server Networks: LANs… Difficulty: Easy
10.A(n) ______is a private corporate network, used exclusively by company employees.
- Internet
- local area network
- peer-to-peer
- intranet
Answer: DReference: Constructing Client/Server NetworksDifficulty: Moderate
11.______is specialized software that runs on a server computer to control network functionality.
- NOS software
- NCP software
- TCP software
- MAC software
Answer: AReference: Constructing Client/Server NetworksDifficulty: Easy
12.The layout and structure of the network is known as the network’s:
- NOS.
- topology.
- components.
- protocol.
Answer: BReference: Constructing Client/Server NetworksDifficulty: Easy
13.Cable and wireless communication technologies are types of:
- network adapters.
- topologies.
- transmission media.
- network operating systems.
Answer: CReference: Constructing Client/Server NetworksDifficulty: Moderate
14.Network navigation devices include all of the following EXCEPT:
- servers.
- routers.
- switches.
- hubs.
Answer: AReference: Constructing Client/Server NetworksDifficulty: Easy
15.______servers store and manage files for network users.
- File
- Web
- Authentication
- Main
Answer: AReference: Constructing Client/Server NetworksDifficulty: Moderate
16.A(n) ______server keeps track of users logging onto the network and the services available to the users.
- file
- authentication
- Web
Answer: BReference: ServersDifficulty: Easy
17.______servers are used to fulfill one specific function, such as handling e-mail.
- Dedicated
- Network
- Protocol
- Peer-to-peer
Answer: AReference: ServersDifficulty: Moderate
18.______servers are used to manage all client-requested printing jobs for all printers.
- Database
- Network
Answer: CReference: Print ServersDifficulty: Easy
19.A(n) ______server, on a network, delivers the software to the clients because the software does not reside on the client computers.
- Web
- application
- communications
- database
Answer: BReference: Application ServersDifficulty: Easy
20.The ______server, on a network, is the single point of contact with the outside world and is often the only device connected to the Internet.
- intranet
- database
- application
- communications
Answer: DReference: Communications ServersDifficulty: Challenging
21.In a(n) ______topology, all computers are connected in sequence, using a single cable.
- bus
- star
- hybrid
- ring
Answer: AReference: Bus TopologyDifficulty: Moderate
22.In a bus topology, a ______, located at each end of the network, absorbs the signal to prevent it from being reflected back onto the cable.
- node
- terminator
- packet
- network device
Answer: BReference: Bus TopologyDifficulty: Easy
23.In a bus topology, the nodes do nothing to move the data along the network, making it a(n) ______topology.
- client/server
- active
- passive
- terminated
Answer: CReference: Bus TopologyDifficulty: Moderate
24.Active topologies differ from passive topologies in that nodes on the active topology network:
- help pass the data along the network.
- listen for signals on the line before transmitting.
- ultimately send their messages to a terminator.
- actively search for packets intended for themselves.
Answer: AReference: Ring TopologyDifficulty: Challenging
25.When two computers send data at the same time on a bus network it is called a(n):
- access method.
- data collision.
- active topology.
- data termination.
Answer: BReference: Bus TopologyDifficulty: Moderate
26.In a ring topology, the computer in possession of the ______can transmit data.
- packet
- data
- access method
- token
Answer: DReference: Ring TopologyDifficulty: Moderate
27.Because each node on the network is responsible for retransmitting the token and the data to the next node, the ______topology is considered an active topology.
- ring
- bus
- star
- hybrid
Answer: AReference: Ring TopologyDifficulty: Moderate
28.Which of the following statements about ring topology networks is TRUE?
- A ring topology network is plagued with data collisions.
- A ring topology network uses the CSMA/CD access method to transmit data.
- A ring topology network allows only one node to transmit data at a time.
- A ring topology network is considered passive.
Answer: CReference: Ring TopologyDifficulty: Moderate
29.In the star topology, the central point of failure is the:
- client.
- switch.
- terminator.
- access point.
Answer: BReference: Star TopologyDifficulty: Challenging
30.Which of the following statements, concerning star topology networks, is FALSE?
- Star topology networks use the CSMA/CD access method.
- If one computer fails, it does not affect the rest of the network.
- There are no data collisions on a star topology network.
- If the switch fails, the network no longer functions.
Answer: CReference: Star TopologyDifficulty: Challenging
31.When a collision occurs on an Ethernet network, the node that detects the collision sends a(n):
- token.
- packet.
- jam signal.
- warning.
Answer: CReference: Star TopologyDifficulty: Moderate
32.On an Ethernet network, after a collision occurs between two computers and a jam signal is sent, what happens next?
- The signals are encrypted to avoid a second collision.
- A token is resent by the two computers that caused the collision.
- The two computers wait random amounts of time, and then resend their signals.
- The switch notifies the network of the collision.
Answer: CReference: Star TopologyDifficulty: Challenging
33.Which of the following statements is FALSE concerning bandwidth?
- Bandwidth defines the speed at which the data flows on the network.
- Cable is rated by the maximum amount of bandwidth it supports.
- Bandwidth is the amount of data transmitted across the transmission medium in a certain amount of time.
- Bandwidth is measured in bits per second (bps).
Answer: AReference: Transmission MediaDifficulty: Easy
34.______defines whether the transmission media uses electrical impulses or pulses of light to transmit data.
- Bandwidth
- Susceptibility to interference
- Signal transmission method
- Access method
Answer: CReference: Wired Transmission MediaDifficulty: Challenging
35.EMI and RFI are types of:
- signal interference.
- bandwidth measurements.
- twisted pair cable.
- wireless transmission media.
Answer: AReference: Wired Transmission MediaDifficulty: Moderate
36.All of the following statements concerning twisted pair cable are true EXCEPT:
- Twisted pair uses pulses of light to send data.
- The number of twists in twisted pair is significant because it makes the wires less susceptible to interference.
- UTP is not recommended in areas with significant sources of interference.
- The two most common types of UTP in use today are Cat 5e and Cat 6.
Answer: AReference: Twisted Pair CableDifficulty: Moderate
37.UTP and STP are examples of:
- CATV cable.
- thicknet coaxial cable.
- fiber-optic cable.
- twisted pair cable.
Answer: DReference: Twisted Pair CableDifficulty: Easy
38.The core of a coaxial cable is usually made from:
- magnesium oxide.
- copper.
- silicon.
- glass fibers.
Answer: BReference: Coaxial CableDifficulty: Easy
39.All of the following statements regarding fiber-optic cable are true EXCEPT:
- the core of fiber-optic cable is composed of copper.
- fiber-optic cable uses pulses of light to transmit data.
- data passes through fiber-optic cable in one direction only.
- the outer jacket of fiber-optic cables is often made of Kevlar.
Answer: AReference: Fiber-Optic CableDifficulty: Moderate
40.The wired medium least susceptible to signal interference is:
- STP cable.
- coaxial cable.
- fiber-optic cable.
- UTP cable.
Answer: CReference: Fiber-Optic CableDifficulty: Moderate
41.______wireless devices have largely been replaced with faster technology.
- 802.11b
- 802.11g
- 802.11n
- 802.11a
Answer: AReference: Wireless Media OptionsDifficulty: Moderate
42.All of the following protocols are proprietary EXCEPT:
- TCP/IP.
- IPX.
- NetBEUI.
- AFP.
Answer: AReference: Network Operating Systems Difficulty: Easy
43.The major network operating systems for installation on the server, in a client/server environment, include all of the following EXCEPT:
- Windows Server 2003.
- UNIX.
- Windows XP.
- NovellNetWare.
Answer: CReference: Network Operating Systems Difficulty: Easy
44.The OSI model is divided into ______processes called layers.
- five
- six
- seven
- eight
Answer: CReference: Dig Deeper: The OSI ModelDifficulty: Easy
45.In the OSI model, the ______layer handles data encryption and compression.
- application
- presentation
- data link
- session
Answer: BReference: Dig Deeper: The OSI Model Difficulty: Challenging
46.In the OSI model, the ______layer is responsible for assembling the data packets into frames.
- session
- transport
- data link
- network
Answer: CReference: Dig Deeper: The OSI Model Difficulty: Challenging
47.The device that acts as an interface to connect with and communicate on a network is known as the:
- network adapter.
- hub.
- repeater.
- switch.
Answer: AReference: Network AdaptersDifficulty: Easy
48.Which of the following statements concerning MAC addresses is TRUE?
- A MAC address is used to externally identify a computer on a network.
- The MAC address and the IP address can be used interchangeably.
- A MAC address must match the IP address.
- The first three numbers in the address identify the manufacturer.
Answer: DReference: MAC AddressesDifficulty: Challenging
49.If a network requires a cable to connect two devices farther apart than the normal maximum run length of the media, the way to prevent signal degradation is to install a(n):
- adapter.
- repeater.
- bridge.
- switch.
Answer: BReference: Repeaters and HubsDifficulty: Moderate
50.Another name for a “smart” hub is a:
- bridge.
- repeater.
- firewall.
- switch.
Answer: DReference: Switches and BridgesDifficulty: Moderate
Fill in the Blank:
51.______are designed to send information between two networks.
Answer: RoutersReference: RoutersDifficulty: Easy
52.The special communications software, installed on a computer to enable the network adapter to communicate with the operating system is called the ______.
Answer: device driverReference: Network AdaptersDifficulty: Moderate
53.Entering a user ID and password is known as ______.
Answer: authenticationReference: AuthenticationDifficulty: Easy
54.The acronym NOS stands for ______.
Answer: Network Operating SystemReference: Network Operating SystemsDifficulty: Easy
55.NetBEUI, AFP, and IPX are known as ______protocols, which means that they do not work with another vendor’s NOS.
Answer: proprietary Reference: Network Operating SystemsDifficulty: Challenging
56.The ______identifies a computer internally on the network.
Answer: MAC addressReference: MAC AddressesDifficulty: Moderate
57.In the OSI model, the ______layer converts the data into signals for transmission over the network.
Answer: physicalReference: Dig Deeper: The OSI ModelDifficulty: Challenging
58.Combining multiple topologies into one network is known as a(n) ______network.
Answer: hybridReference: Comparing TopologiesDifficulty: Easy
59.CSMA/CD is the access method used on ______networks.
Answer: EthernetReference: Star TopologyDifficulty: Challenging
60.The ______passing method is used on a ring topology to avoid collisions.
Answer: tokenReference: Ring TopologyDifficulty: Moderate
61.______is the amount of data that can be transmitted over transmission media in a certain amount of time.
Answer: BandwidthReference: Wired Transmission MediaDifficulty: Challenging
62.A(n) ______is a set of rules for exchanging communication.
Answer: protocolReference: Star TopologyDifficulty: Easy
63.______cable is composed of a glass or plastic fiber (or bundle of fibers) as its core.
Answer: Fiber-opticReference: Fiber-Optic CableDifficulty: Easy
64.______networks do not need specialized network operating system software.
Answer: Peer-to-peerReference: Network Operating SystemsDifficulty: Moderate
65.The 802.11 wireless standard is also known as ______.
Answer: Wi-FiReference: Wireless Media OptionsDifficulty: Easy
66.In wireless networks, wireless NICs connect to ______, which provide wireless devices with a sending and receiving connection to the network.
Answer: wireless access pointsReference: Network AdaptersDifficulty: Moderate
67.______are containers that hold multiple data packets.
Answer: Frames Reference: MAC AddressesDifficulty: Challenging
68.The acronym MAC, as in MAC address, stands for ______.
Answer: Media Access ControlReference: MAC AddressesDifficulty: Moderate
69.A(n) ______sends data only to the intended recipient as opposed to a hub, which sends the data to all devices connected to it.
Answer: switchReference: Switches and BridgesDifficulty: Moderate
70.______are devices used to send data between different segments (collision domains) on a network.
Answer: BridgesReference: Switches and BridgesDifficulty: Easy
71.______amplify a signal and retransmit it to extend cable runs beyond the maximum run length.
Answer: RepeatersReference: Repeaters and HubsDifficulty: Moderate
72.______is the open protocol used by the Internet.
Answer: TCP/IPReference: Network Operating SystemsDifficulty: Challenging
73.EMI and RFI are types of ______.
Answer: interferenceReference: Wired Transmission MediaDifficulty: Easy
74.The term packet screening refers to the examination of incoming data packets by the ______to ensure that they originate or are authorized by valid users on the internal network.
Answer: firewallReference: FirewallsDifficulty: Moderate
75.______use IP addresses to send information between two networks.
Answer: RoutersReference: RoutersDifficulty: Moderate
True and False:
76.In a ring topology, if one computer fails it can bring the entire network to a halt.
Answer: TrueReference: Ring TopologyDifficulty: Easy
77.An application server acts as a go-between for computers on an internal network and the external network (Internet).
Answer: False (proxy)Reference: FirewallsDifficulty: Moderate
78.The hub is responsible for breaking down data into packets and preparing the packets for transmission across the network.
Answer: False (network adapter or NIC)Reference: Network AdaptersDifficulty: Easy
79.In the OSI model, the session layer sets up and manages the virtual (not physical) connection between the sending and receiving devices.
Answer: TrueReference: Dig Deeper: The OSI ModelDifficulty: Challenging
80.Twisted pair cable has the lowest susceptibility to interference.
Answer: False (highest)Reference: Figure 12.14: Comparison of Characteristics…Difficulty: Moderate
81.Throughput is another name for bandwidth.
Answer: TrueReference: Wired Transmission MediaDifficulty: Easy
82.Crosstalk interference is the tendency of signals on one twisted pair wire to interfere with signals on a wire next to it.
Answer: TrueReference: Twisted Pair CableDifficulty: Easy
83.The ring topology is the most widely deployed client/server topology in businesses today.
Answer: False (star)Reference: Star TopologyDifficulty: Moderate
84.Token passing and CSMA/CD are methods of avoiding data collisions.
Answer: TrueReference: Network TopologiesDifficulty: Easy
85.A bus topology provides a fairer allocation of resources than a ring topology by giving all the nodes on the network an equal opportunity to send data.
Answer: FalseReference: Ring TopologyDifficulty: Challenging
86.MAC addresses enable computers on one network to communicate with computers on another network.
Answer: False (IP addresses)Reference: MAC AddressesDifficulty: Moderate
87.Bridges are relatively simple devices whose sole purpose is to amplify a signal and retransmit it.
Answer: False (Repeaters)Reference: Repeaters and HubsDifficulty: Challenging
88.In a star network, the failure of one computer affects the other computers on the network.
Answer: FalseReference: Figure 12.10: Advantages and Disadvantages of Bus,…Difficulty: Easy
89.Hubs receive a signal from a device, reconstruct it, and transmit it to all the ports on the hub.
Answer: TrueReference: Repeaters and HubsDifficulty: Challenging
90.Authentication can be achieved through passwords, biometric access devices, and possessed objects.
Answer: True Reference: AuthenticationDifficulty: Easy
Matching:
91.Match the following acronyms to their descriptions:
I.MACA. type of interference
II.CSMA/CDB. device address
III.OSIC. Ethernet access method
IV.EMID. type of cable
V.UTPE. protocol standard
Answer: B, C, E, A, DReference: Multiple locations in chapterDifficulty: Moderate
92.Match the following terms to their meanings:
I.frameA. packet granting transmission rights
II.bastionB. assemblage of packets
III.tokenC. a Novell protocol
IV.IPXD. host configured as proxy server
V.jamE. signal indicating data collisions
Answer: B, D, A, C, EReference: Multiple locations in chapterDifficulty: Moderate
93.Match the following devices to their functions:
I.repeaterA. sends data to a specific device, not to all devices
II.hubB. transmits data between two different networks
III.switchC. device used for signal amplification and retransmission
IV.bridgeD. multiport device used for signal amplification and broadcast
V.routerE. connects collision domains of a network
Answer: C, D, A, E, BReference: Multiple locations in chapterDifficulty: Challenging
94.Match the following terms to their meanings:
I.topologyA. communication rules
II.proxyB. large size coaxial cable
III.intranetC. server controlling Internet access of network
IV.protocolD. private Web-based network
V.ThickNetE. layout of a network