A subnetted or hierarchical backbone can also be called

Assignment Help Computer Networking
Reference no: EM131325489

Q1. A subnetted or hierarchical backbone can also be called:
a. Bridged backbone
b. Virtual LAN
c. Hubbed backbone
d. Collapsed backbone
e. Routed backbone

Q2. A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone.
a. true
b. false

Q3. A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware.
a. Bridged backbone
b. Virtual LAN
c. Hubbed backbone
d. Collapsed backbone
e. Routed backbone

Q4. Which of the following would be least effective in improving backbone performance?
a. improving the computers in the network
b. changing the demand placed on the network
c. adding new keyboards to the client computers
d. upgrading the circuits between computers
e. improving devices in the network
Answer: C

Q5. Associated with a switched backbone, MDF is an acronym for:
a. multi-station device foundation
b. main distribution facility
c. manual data frequency
d. multiplexer downstream flow
e. maximum data facility

Q6. A _____connects all networks within a company, regardless of whether it crosses state, national, or international boundaries.
a. LAN
b. MAN
c. enterprise network
d. campus network
e. core network

Q7. Which of the following is a way that a router is similar to a switch?
a. routers can connect two or more networks that use the same data link protocol
b. routers only process messages that are specifically addressed to it
c. routers operate at the network layer
d. routers perform more processing on each message than switch
e. routers can choose the "best" route between networks for forwarding a packet

Q8. Devices in a rack are connected together using ___________.
a. patch cables
b. string
c. servers
d. modules
e. chassis switches

Q9. Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.
a. true
b. false

Q10. In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
a. full mesh design
b. ring design
c. star design
d. bus design
e. partial mesh design

Q11. Dynamic routing:
a. imposes an overhead cost by increasing network traffic
b. decreases performance in networks which have many possible routes
c. decreases performance in networks with "bursty" traffic
d. should be used in 80 to 90 percent of total networks' capacity
e. is another term for static routing in WANs

Q12. Special rate services that allow dialed circuit calls for both voice communications and data transmission to be purchased in large quantities are known as __________.
a. DSL
b. RBOC
c. ATM
d. WATS
e. X.25

Q13. T carrier circuits can only be used to transmit voice.
a. true
b. false

Q14. A disadvantage of a star architecture is that the failure of one circuit will disrupt the entire network.
a. true
b. false


Q15. A ____________ identifies each device connected to an ISDN network terminator.
a. NIC
b. MAC address
c. SPID
d. PRI
e. BRI

Q16. When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
a. dedicated circuit
b. dialed circuit
c. ISDN circuit
d. VPN circuit
e. T-1 carrier circuit

Q17. One type of Broadband ISDN service is intended to be used for digital broadcast television:
a. analog service
b. asymmetrical service with two simplex channels
c. one simplex upstream channel operating at 155.52 Mbps, one downstream at 622.08 Mbps
d. packet-switched service
e. one full duplex channel operating at 622.08 Mbps

Q18. A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side.
a. CA*net 3
b. RFC
c. WAP proxy
d. fixed wireless connection
e. optical-electrical converter


Q19. Internet 2 is the common name for the Abilene network.
a. true
b. false

Q20. Which of the following statements is true?
a. On a circuit, the shorter the distance, the higher the speed.
b. On a circuit, the longer the distance, the higher the speed.
c. On a circuit, the longer the distance, less attenuation occurs.
d. On a circuit, the shorter the distance, more attenuation occurs.
e. When more attenuation occurs, higher frequency signals can be used effectively.

Q21. Another term for cable networks that use both fiber-optic and coaxial cable is __________.
a. fixed wireless
b. mobile wireless
c. distribution hub
d. hybrid fiber coax
e. fibrax

Q22. A distribution hub includes a combiner and a Cable modem termination system.
a. true
b. false

Q23. The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet.
a. Internet Society
b. Internet Engineering Task Force
c. Internet Engineering Steering Committee
d. Internet Architecture Board
e. Internet Research Task Force


Q24. Some of the new applications being developed for a high-speed Internet include:
a. Tele-immersion
b. Tele-conferencing
c. QoS
d. Broadband
e. Tele-phoning

Q25. The _________ is the connection from a home or business to the telephone company end office.
a. distribution hub
b. RFC
c. UCAID
d. local loop
e. CA*net 3

Q26. A patch is a software solution to correct a security hole.
a. true
b. false

Q27. A brute-force attack is a method of trying to guess the correct password by trying every possible key.
a. true
b. false

Q28. IP spoofing means to:
a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation
c. illegally tape or listen in on telephone conversations
d. detect and prevent denial-of-service attacks
e. act as an intermediate host computer between the Internet and the rest of the organization's networks

Q29. Which of the following is a mode that is used by IPSec?
a. exchange
b. sniffer
c. tunnel
d. creeper
e. firefighter

Q30. With ANI security control, the network manager:
a. uses the Authorization Notation Investigation protocol to trace only authorized user passwords
b. allows the Asynchronous NetWare Interface to act as a firewall
c. can define several remote telephone numbers authorized to access each account
d. assigns selected Access Network Invitations to users cleared for various levels of network access
e. can only define one remote telephone number authorized to access each account
Answer: C

Q31. A Trojan horse allows a user to access a computer from a remote location.
a. true
b. false

Q32. __________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
a. Translation
b. Conversion
c. Network address translation
d. Proxy translation
e. IP conversion.


Q33. Disk mirroring writes duplicate copies of all data on at least two different disks.
a. true
b. false

Q34. A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.
a. true
b. false

Q35. To establish circuit loading, the designer usually starts with the:
a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
b. individual user training
c. bus diameter, disk cache that is used at the server station
d. channel bandwidth and baud rate used at each client
e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node

Q36. Today, many organizations design networks using the building-block approach.
a. true
b. false

Q37. Today, all network traffic is due to traffic from internal application systems.
a. true
b. false

Q38. Nowadays, most organizations use a simpler approach to network design called the ___________ approach.
a. building-block
b. frame definition
c. prototype
d. systems development life cycle
e. guided network


Q39. Needs analysis is the final step in the building block approach to network design.
a. true
b. false

Q40. ________ is used to model the behavior of the planned communication network once the proposed network map is complete.
a. Implementation
b. Post-implementation review
c. Documentation
d. Simulation
e. Training users

Q41. The traditional network design approach does not work well for _________ networks.
a. slowly evolving
b. rapidly growing
c. static
d. modestly growing
e. not growing

Q42. Storing other people's Web data closer to your users is referred to as:

a. SNMP
b. web storing
c. content caching
d. load balancing
e. traffic analysis


Q43. ___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept.
a. Service level agreements
b. Trouble tickets
c. Smart hub lists
d. Bursty router printouts
e. Wish list documentation

Q44. Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total computer processing power now resides on microcomputer-based LANs.
a. 40
b. 50
c. 60
d. 80
e. 90

Q45. Network management software is used by most large organization to monitor and control their networks.
a. true
b. false

Q46. When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution.
a. firefought
b. spun
c. escalated
d. burst
e. delimited

Q47. Performance management means ensuring the network is operating as efficiently as possible.
a. true
b. false

Q48. When users receive training about fundamentals of network use, they become confident about what they need to do when working on a network.
a. true
b. false

Q49. _____________ are used by many large and small organizations to monitor and control their networks today.
a. Network management software packages
b. Firefighter packages
c. Fault creating packages
d. Fault toleraters
e. NICs

Q50. ____________ are reports produced by numerous network software packages for recording fault information.
a. Wish list documentation
b. Trouble tickets
c. Smart hub lists
d. Bursty router printouts
e. Roger systems checks

Reference no: EM131325489

Questions Cloud

Why would firm decide to implement approach to organizing : Let's explore the virtual organizational form. Why would a firm decide to implement this approach to organizing?  What are the benefits
Identify the two most valuable lessons : Identify the two (2) most valuable lessons you learned about communication principles from this course. Provide at least two (2) examples to support your rationale.
What is the epigenome : Please provide an answer and your supporting explanation/reasoning for one of the following questions: 1. What is the epigenome?
Describe how indexing fields could be beneficial : The current TAL Distributors database only has a few customers; however, in reality, such a database would likely have records for thousands or hundreds of thousands of customers and their order information. Describe how indexing fields could be b..
A subnetted or hierarchical backbone can also be called : A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.
Ingestion and digestion of a ham and cheese sandwich : Track the ingestion and digestion of a ham and cheese sandwich on whole wheat bread with lettuce, green pepper, and tomatoes. Describe the fate of this sandwich from the time you eat it.
How you have been personally impacted by court decision : Your journal response must be a minimum one page, double-spaced. Justify your conclusions with facts and persuasive reasoning. Fully respond to all parts of the question and write your response in your own words.
Describe how human activities impact globalwarming : Write a 500-750 word essay about globalwarming that addresses the following points: 1. What is global warming? 2. Describe how human activities impact globalwarming
Generate a 16-dimensional codebook of size 64 : Comment on the differences in the mean squared errors and the quality of the reconstructed images. You can use the program trvqsp_img to obtain the codebooks.

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the network design executive powerpoint presentation

the Network Design Executive PowerPoint Presentation- You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approa..

  Design the network and draw the network diagram

Please design the network and draw the network diagram. You have the freedom to assume the internal network structure.

  Create a shared mental model between different technologists

It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram.

  The network design executive powerpoint presentation

In this assignment you are to submit the Network Design Executive PowerPoint Presentation for the term paper.

  Write three tcp and udp connections from netstat

Write three TCP and three UDP connections from netstat -a output, and corresponding translated port numbers from netstat -an output.

  Data Network Identification Code

Discuss the christian concept of trinity and messiah How many digits of the DNIC (Data Network Identification Code) identify the country?  A station in a network forwards incoming packets by placing them on its shortest output queue. What routing al..

  Osi model-switching systemsnetwork-channel processors

A switch is a Data Link layer device, which means it's able to look into the packets that pass through it to examine a critical piece of Data Link layer information: the MAC address. With this information in hand, a switch can keep track of which ..

  Explain the network''s fundamental characteristics

Review the assignment instructions in the University of Phoenix Material: Integrative Network Design Project. Write a 2- to 4-page paper that includes the following based on your chosen Virtual Organization: Explain the network's fundamental characte..

  What type of network model and topology would you recommend

What type of network architecture/model and topology would you recommend, and why? The charity is expected to receive a substantial donation in the near future. This donation will enable it to double the size of its network to 14 PCs.

  Factors for moving wireless nics into more dominant role

Explain whether this is still true today, and write down factors are moving wireless NICs into more dominant role, if any.

  Discuss differences in various network types

Discuss differences in various network types (i.e. peer-to-peer, client-server, etc.). Be creative and come up with an analogy to explain network communication to your friends/family who do not understand basic networking.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd