Chapter 1 Quiz A(n) ____ is a group of computers and other devices that are connected by some type of transmission media
Choose one answer
a
access server b
network<<<< c
NOS d
NIC Correct Marks for this submission: 1/1
A(n) ____ is usually composed of a group of nodes that use the same communications channel for all their traffic
Choose one answer
a
segment b
connectivity device c
backbone<<<< d
host Incorrect Marks for this submission: 0/1
The physical layout of a computer network is known as its ____
Choose one answer
a
protocol b
topology c
connectivity d
addressing<<<< Incorrect Marks for this submission: 0/1
____ are the distinct units of data that are transmitted from one node on a network to another
Choose one answer
a
Nodes b
Data packets<<<< c
Transmission media d
Protocols Correct Marks for this submission: 1/1
____ is the means through which data is transmitted and received
Choose one answer
a
Spam b
The network adapter c
Transmission media<<<< d
NOS Correct Marks for this submission: 1/1
Another term for a remote access server is ____
Choose one answer
a
client/server b
mail server c
data server d
communications server<<<< Correct Marks for this submission: 1/1
A(n) ____ is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office
Choose one answer
a
LAN<<<< b
WAN c
MAN d
NOS Correct Marks for this submission: 1/1
A personal computer which may or may not be connected to a network is a(n) ____
Choose one answer
a
server b
client c
workstation<<<< d
NIC Correct Marks for this submission: 1/1
The ____ is the main circuit that controls the computer
Choose one answer
a
motherboard<<<< b
mail server c
NOS d
network adapter Correct Marks for this submission: 1/1
Which of the following enables resource sharing by other computers on the same network? Choose one answer
a
Segment b
Node c
Host d
Backbone<<<< Incorrect Marks for this submission: 0/1
A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computerís operating system
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Resource sharing is controlled by a central computer or authority
Choose one answer
a
True<<<< b
False Incorrect Marks for this submission: 0/1
Clients on a client/server network share their resources directly with each other
Choose one answer
a
True<<<< b
False Incorrect Marks for this submission: 0/1
Networks are usually only arranged in a ring, bus, or star formation and hybrid combinations of these patterns are not possible
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another
Choose one answer
a
True b
False<<<< Incorrect Marks for this submission: 0/1
Chapter 2 Quiz Every process that occurs during network communications can be associated with a layer of the OSI Model
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Among the Session layerís functions are establishing and keeping alive the communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Addressing is a system for assigning unique identification numbers to devices on a network
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed
Choose one answer
a
Protocols b
Standards<<<< c
Sessions d
Routers Correct Marks for this submission: 1/1
Protocols in the ____ layercoordinate and maintain communications between two nodes on the network
Choose one answer
a
Application b
Physical c
Data link d
Session<<<< Correct Marks for this submission: 1/1
Transport layer protocols break large data units received from the Session layer into multiple smaller units, called ____
Choose one answer
a
segments<<<< b
checksums c
frames d
sessions Correct Marks for this submission: 1/1
A(n) ____ is a structured package for moving data that includes not only the raw data, or ďpayload,Ē but also the senderís and receiverís network addresses, and error checking and control information
Choose one answer
a
segment b
frame<<<< c
router d
token Correct Marks for this submission: 1/1
____ addresses contain two parts: a Block ID and a Device ID
Choose one answer
a
IP b
MAC<<<< c
Session d
Ethernet Correct Marks for this submission: 1/1
Protocols at the ____ layer accept frames from the Data Link layer and generate voltage so as to transmit signals
Choose one answer
a
Session b
Application c
Network d
Physical<<<< Correct Marks for this submission: 1/1
____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data
Choose one answer
a
Flow control<<<< b
Routing c
Segmentation d
Virtual addressing Correct Marks for this submission: 1/1
____ is a trade organization composed of representatives from electronics manufacturing firms across the United States
Choose one answer
a
EIA<<<< b
CRC c
IEEE d
ISOC Correct Marks for this submission: 1/1
____ is a technical advisory group of researchers and technical professionals interested in overseeing the Internetís design and management
Choose one answer
a
ITU b
IAB<<<< c
MTU d
LLC Correct Marks for this submission: 1/1
Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network
Choose one answer
a
Session b
Application<<<< c
Data link d
Transport Chapter 3 Quiz ____ is a measure of the highest frequency of signal a multimode fiber can support over a specific distance and is measured in MHz-km
Choose one answer
a
Broadband b
Modal bandwidth<<<< c
Latency d
Plenum Correct Marks for this submission: 1/1
A patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed is known as a(n) ____
Choose one answer
a
media converter b
multimode fiber c
conduit d
crossover cable<<<< Correct Marks for this submission: 1/1
An antennaís ____ describes the relative strength over a three dimensional area of all the electromagnetic energy the antenna sends or receives
Choose one answer
a
plenum b
frequency c
radiation pattern<<<< d
ferrule Correct Marks for this submission: 1/1
Which of the following terms refers to a change in signal strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter? Choose one answer
a
Latency b
Reflection c
Attenuation d
Fading<<<< Correct Marks for this submission: 1/1
____ signals are transmitted by frequencies in the 300- GHz to 300,000-GHz range, which is just above the top of the wireless spectrum as it is defined by the FCC
Choose one answer
a
Attenuation b
Braiding c
Infrared<<<< d
Broadcast Correct Marks for this submission: 1/1
The distance between corresponding points on a waveís cycle is called its ____
Choose one answer
a
phase b
amplitude c
amplitude d
wavelength<<<< Correct Marks for this submission: 1/1
____ is the number of times that a waveís amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time
Choose one answer
a
Latency b
Impedance c
Modulation d
Frequency<<<< Correct Marks for this submission: 1/1
A form of transmission that allows multiple signals to travel simultaneously over one medium is known as ____
Choose one answer
a
Webcasting b
scattering c
reflection d
multiplexing<<<< Correct Marks for this submission: 1/1
A device that regenerates a digital signal is called a(n) ____
Choose one answer
a
modulator b
multiplexer c
repeater<<<< d
sheath Correct Marks for this submission: 1/1
____ cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0
4 to 0
8 mm
Choose one answer
a
Coaxial b
Twisted-pair<<<< c
Ethernet d
Fiber-optic Correct Marks for this submission: 1/1
Transmission methods using fiber-optic cables achieve faster throughput than those using copper or wireless connections
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Seven bits form a byte
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
A pulse of positive voltage represents a 0
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
In frequency modulation, the frequency of the carrier signal is modified by the application of the data signal
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
An access point is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Chapter 4 Quiz Question 1 Marks: 1 ____ define the standards for communication between network devices
Choose one answer
a
Dynamic Ports b
Protocols<<<< c
Name servers d
Fully qualified host names Correct Marks for this submission: 1/1
____ Ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an administrator of the system can access
Choose one answer
a
Dynamic b
Well known<<<< c
Private d
Registered Correct Marks for this submission: 1/1
____ are hosts on the Internet that need to look up domain name information
Choose one answer
a
Resolvers<<<< b
Name servers c
Sockets d
Net masks Correct Marks for this submission: 1/1
____ is an Application layer protocol used to send and receive files via TCP/IP
Choose one answer
a
PING b
Telnet c
NNTP d
FTP<<<< Correct Marks for this submission: 1/1
____ is a utility that can verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network
Choose one answer
a
RARP b
UDP c
PING<<<< d
FTP Correct Marks for this submission: 1/1
In the context of TCP/IP, a packet is also known as a(n) ____
Choose one answer
a
cache b
IP datagram<<<< c
host file d
label Correct Marks for this submission: 1/1
____ provides information about how and where data should be delivered, including the dataís source and destination addresses
Choose one answer
a
TCP<<<< b
SPX c
NTP d
IP Correct Marks for this submission: 1/1
____ is a transmission method that allows one node to send data to a defined group of nodes
Choose one answer
a
IGMP b
Subnetting c
Multicasting<<<< d
DHCP Correct Marks for this submission: 1/1
____ are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table
Choose one answer
a
Static ARP tables b
Anycast addresses c
Dynamic Ports d
Dynamic ARP table entries<<<< Correct Marks for this submission: 1/1
____ is an automated means of assigning a unique IP address to every device on a network
Choose one answer
a
ICMP b
DHCP<<<< c
IGMP d
FTP Correct Marks for this submission: 1/1
UDP (User Datagram Protocol) belongs to the Transport layer of the OSI Model
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Routers use DHCP to determine which nodes belong to a certain multicast group and to transmit data to all nodes in that group
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
MAC addresses are assigned to a deviceís NIC at the factory by its manufacturer
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
An IP whose first octet is in the range of 128Ė191 belongs to a Class C network
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Static IP addressing can easily result in the duplication of address assignments
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Chapter 5 Quiz A router with multiple slots that can hold different interface cards or other devices is called a(n) ____
Choose one answer
a
dynamic router b
modular router<<<< c
static router d
interrupt Correct Marks for this submission: 1/1
The term ____ refers to the most efficient route from one node on a network to another
Choose one answer
a
base I/O port b
best path<<<< c
firmware d
firewall Correct Marks for this submission: 1/1
____ is the routing protocol of Internet backbones and is not used to route between nodes on an autonomous LAN - that is, it is used on border and exterior routers
Choose one answer
a
CMOS b
MAU c
BGP<<<< d
EIGRP Correct Marks for this submission: 1/1
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks
Choose one answer
a
Gateways<<<< b
Switches c
Hubs d
Ports Correct Marks for this submission: 1/1
A(n) ____ is a small, removable piece of plastic that contains a metal receptacle, which fits over a pair of pins on a circuit board to complete a circuit between those two pins
Choose one answer
a
runt b
hub c
switch d
jumper<<<< Correct Marks for this submission: 1/1
A computerís ____ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computerís components, including its memory, processor, hard disk, and NIC
Choose one answer
a
bus<<<< b
bridge c
driver d
port Correct Marks for this submission: 1/1
A(n) ____ is a connector that plugs into a port, such as a serial or parallel or an RJ-45 port, and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing
Choose one answer
a
runt b
loopback plug<<<< c
gateway d
bus Correct Marks for this submission: 1/1
The USB 1
1 standard has a maximum data transfer rate of ____Mbps
Choose one answer
a
6 b
8 c
10 d
12<<<< Correct Marks for this submission: 1/1
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware
Choose one answer
a
CMOS b
data port c
DIP switch d
BIOS<<<< Correct Marks for this submission: 1/1
A(n) ____ is a device or connection on a network that,were it to fail, could cause the entire network or portion of the network to stop functioning
Choose one answer
a
single point of failure<<<< b
USB port c
modular router d
PC card Correct Marks for this submission: 1/1
One disadvantage to using wireless NICs is that currently they are somewhat more expensive than wire-bound NICs
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
After a computer is up and running, the BIOS provides an interface between the computerís software and hardware, allowing it to recognize which device is associated with each IRQ
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
A repeater typically contains multiple data portsinto which the patch cables for network nodes are connected
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
If congestion or failures affect the network, a router using dynamic routing can detect the problems and reroute data through a different path
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Hubs operate at the Network layer of the OSI model
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Test # 1 - Chapters 1 - 5 A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address
Choose one answer
a
host Incorrect
b
node<<<< Correct
c
segment Incorrect
d
connectivity device Incorrect
Incorrect Marks for this submission: 0/1
A(n) ____ is usually composed of a group of nodes that use the same communications channel for all their traffic
Choose one answer
a
segment <<<< Correct
b
connectivity device Incorrect
c
backbone Incorrect
d
host Incorrect
Incorrect Marks for this submission: 0/1
____ are standard methods or formats for communication between networked devices
Choose one answer
a
Topologies Incorrect
b
Data packets Incorrect
c
Hosts Incorrect
d
Protocols<<<< Correct
Correct Marks for this submission: 1/1
____ are the distinct units of data that are transmitted from one node on a network to another
Choose one answer
a
Nodes Incorrect
b
Data packets<<<< Correct
c
Transmission media Incorrect
d
Protocols Incorrect
Correct Marks for this submission: 1/1
____ refer to the capability of a server to share data files, applications (such as word-processing or spreadsheet programs), and disk storage space
Choose one answer
a
File services<<<< Correct
b
Print services Incorrect
c
NIC Incorrect
d
P2P Incorrect
Incorrect Marks for this submission: 0/1
In a(n) ____ network, every computer can communicate directly with every other computer
Choose one answer
a
LAN Incorrect
b
client/server Incorrect
c
WAN Incorrect
d
peer-to-peer<<<< Correct
Correct Marks for this submission: 1/1
A(n) ____ is a network of computers and other devices that is confined to a relatively small space, such as one building or even one office
Choose one answer
a
LAN<<<< Correct
b
WAN Incorrect
c
MAN Incorrect
d
NOS Incorrect
Correct Marks for this submission: 1/1
The device inside a computer that connects a computer to the network media and allows it to communicate with other computers is known as a(n) ____
Choose one answer
a
server Incorrect
b
client Incorrect
c
workstation Incorrect
d
NIC<<<< Correct
Correct Marks for this submission: 1/1
The ____ is the main circuit that controls the computer
Choose one answer
a
motherboard Correct
b
mail server Incorrect
c
NOS Incorrect
d
network adapter Incorrect
Correct Marks for this submission: 1/1
Clients on a client/server network share their resources directly with each other
Choose one answer
a
True Incorrect
b
False<<<< Correct
Incorrect Marks for this submission: 0/1
____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service should be designed or performed
Choose one answer
a
Protocols Incorrect
b
Standards<<<< Correct
c
Sessions Incorrect
d
Routers Incorrect
Correct Marks for this submission: 1/1
____ are added to data at the source and verified at the destination
Choose one answer
a
Segments Incorrect
b
Packets Incorrect
c
Checksums<<<< Correct
d
Frames Incorrect
Correct Marks for this submission: 1/1
Transport layer protocols break large data units received from the Session layer into multiple smaller units, called ____
Choose one answer
a
segments<<<< Correct
b
checksums Incorrect
c
frames Incorrect
d
sessions Incorrect
Correct Marks for this submission: 1/1
The primary function of protocols in the ____ layer, is to divide data they receive from the Network layer into distinct frames that can then be transmitted by the Physical layer
Choose one answer
a
Application Incorrect
b
Network Incorrect
c
Transport Incorrect
d
Data Link<<<< Correct
Correct Marks for this submission: 1/1
____ addresses contain two parts: a Block ID and a Device ID
Choose one answer
a
IP Incorrect
b
MAC<<<< Correct
c
Session Incorrect
d
Ethernet Incorrect
Correct Marks for this submission: 1/1
Connectivity devices such as hubs and repeaters operate at the ____ layer
Choose one answer
a
Session Incorrect
b
Physical<<<< Correct
c
Application Incorrect
d
Network Incorrect
Correct Marks for this submission: 1/1
____ is a technical advisory group of researchers and technical professionals interested in overseeing the Internetís design and management
Choose one answer
a
ITU Incorrect
b
IAB <<<< Correct
c
MTU Incorrect
d
LLC Incorrect
Correct Marks for this submission: 1/1
The top, or seventh, layer of the OSI Model is the ____ layer Choose one answer
a
Application<<<< Correct
b
Session Incorrect
c
Transport Incorrect
d
Network Incorrect
Correct Marks for this submission: 1/1
Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network
Choose one answer
a
Session Incorrect
b
Application<<<< Correct
c
Data link Incorrect
d
Transport Incorrect
Incorrect Marks for this submission: 0/1
Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model
Choose one answer
a
True Incorrect
b
False<<<< Correct
Correct Marks for this submission: 1/1
A patch cable in which the termination locations of the transmit and receive wires on one end of the cable are reversed is known as a(n) ____
Choose one answer
a
media converter Incorrect
b
multimode fiber Incorrect
c
conduit Incorrect
d
crossover cable<<<< Correct
Correct Marks for this submission: 1/1
Networks that transmit signals through the atmosphere via infrared or radiofrequency (RF) waves are known as ____
Choose one answer
a
local area networks Incorrect
b
wireless networks<<<< Correct
c
wide area network Incorrect
d
wireless access point Incorrect
Incorrect Marks for this submission: 0/1
Which of the following terms refers to a change in signal strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter? Choose one answer
a
Latency Incorrect
b
Reflection Incorrect
c
Attenuation Incorrect
d
Fading<<<< Correct
Incorrect Marks for this submission: 0/1
When a data transmission involves only one transmitter and one receiver, it is considered a(n) ____transmission
Choose one answer
a
enhanced Incorrect
b
crossover Incorrect
c
full-duplex Incorrect
d
point-to-point<<<< Correct
Correct Marks for this submission: 1/1
____ signals are composed of pulses of precise, positive voltages and zero voltages
Choose one answer
a
Analog Incorrect
b
Digital<<<< Correct
c
Narrowband Incorrect
d
Optical Incorrect
Correct Marks for this submission: 1/1
A form of transmission that allows multiple signals to travel simultaneously over one medium is known as ____
Choose one answer
a
Webcasting Incorrect
b
scattering Incorrect
c
reflection Incorrect
d
multiplexing<<<< Correct
Correct Marks for this submission: 1/1
The loss of a signalís strength as it travels away from its source is known as ____
Choose one answer
a
impedance Incorrect
b
attenuation<<<< Correct
c
regeneration Incorrect
d
diffraction Incorrect
Correct Marks for this submission: 1/1
____ cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0
4 to 0
8 mm
Choose one answer
a
Coaxial Incorrect
b
Twisted-pair<<<< Correct
c
Ethernet Incorrect
d
Fiber-optic Incorrect
Correct Marks for this submission: 1/1
____ cable consists of twisted wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil
Choose one answer
a
Fiber-optic Incorrect
b
Ethernet Incorrect
c
Shielded twisted-pair<<<< Correct
d
Coaxial Incorrect
Correct Marks for this submission: 1/1
Transmission methods using fiber-optic cables achieve faster throughput than those using copper or wireless connections
Choose one answer
a
True<<<< Correct
b
False Incorrect
Correct Marks for this submission: 1/1
____ Ports are in the range of 0 to 1023 and are assigned to processes that only the operating system or an administrator of the system can access
Choose one answer
a
Dynamic Incorrect
b
Well known<<<< Correct
c
Private Incorrect
d
Registered Incorrect
Correct Marks for this submission: 1/1
____ is an Application layer protocol used to send and receive files via TCP/IP
Choose one answer
a
PING Incorrect
b
Telnet Incorrect
c
NNTP Incorrect
d
FTP<<<< Correct
Correct Marks for this submission: 1/1
____ facilitates the exchange of newsgroup messages between multiple servers and users
Choose one answer
a
FTP Incorrect
b
NNTP<<<< Correct
c
Telnet Incorrect
d
PING Incorrect
Correct Marks for this submission: 1/1
____ is the protocol suite originally designed to interconnect Macintosh computers
Choose one answer
a
NetBIOS Incorrect
b
IGMP Incorrect
c
WINS Incorrect
d
AppleTalk<<<< Correct
Correct Marks for this submission: 1/1
____ is the process of assigning one network component to work with another
Choose one answer
a
Multicasting Incorrect
b
Subnetting Incorrect
c
IP addressing Incorrect
d
Binding<<<< Correct
Incorrect Marks for this submission: 0/1
____ provides information about how and where data should be delivered, including the dataís source and destination addresses
Choose one answer
a
TCP This is not the best answer
IP is the best answer
However, you will receive full credit for this answer
b
SPX Incorrect
c
NTP Incorrect
d
IP<<<< Correct
Correct Marks for this submission: 1/1
____ is a Network layer protocol that reports on the success or failure of data delivery
Choose one answer
a
TCP Incorrect
b
IGMP Incorrect
c
ICMP<<<< Correct
d
FTP Incorrect
Correct Marks for this submission: 1/1
____ are created when a client makes an ARP request that cannot be satisfied by data already in the ARP table
Choose one answer
a
Static ARP tables Incorrect
b
Anycast addresses Incorrect
c
Dynamic Ports Incorrect
d
Dynamic ARP table entries<<<< Correct
Incorrect Marks for this submission: 0/1
The IP address 127
0
0
1 is called a(n) ____
Choose one answer
a
loopback address <<<< Correct
b
dynamic address Incorrect
c
host name Incorrect
d
static address Incorrect
Correct Marks for this submission: 1/1
An IP whose first octet is in the range of 128Ė191 belongs to a Class C network
Choose one answer
a
True Incorrect
b
False<<<< Correct
Correct Marks for this submission: 1/1
A router with multiple slots that can hold different interface cards or other devices is called a(n) ____
Choose one answer
a
dynamic router Incorrect
b
modular router <<<< Correct
c
static router Incorrect
d
interrupt Incorrect
Correct Marks for this submission: 1/1
To determine the best path, routers communicate with each other through ____
Choose one answer
a
interrupts Incorrect
b
gateways Incorrect
c
jumpers Incorrect
d
routing protocols<<<< Correct
Correct Marks for this submission: 1/1
____ are combinations of networking hardware and software that connect two dissimilar kinds of networks
Choose one answer
a
Gateways<<<< Correct
b
Switches Incorrect
c
Hubs Incorrect
d
Ports Incorrect
Correct Marks for this submission: 1/1
A computerís ____ is the circuit, or signaling pathway, used by the motherboard to transmit data to the computerís components, including its memory, processor, hard disk, and NIC
Choose one answer
a
bus <<<< Correct
b
bridge Incorrect
c
driver Incorrect
d
port Incorrect
Correct Marks for this submission: 1/1
A(n) ____ is a connector that plugs into a port, such as a serial or parallel or an RJ-45 port, and crosses over the transmit line to the receive line so that outgoing signals can be redirected into the computer for testing
Choose one answer
a
runt Incorrect
b
loopback plug<<<< Correct
c
gateway Incorrect
d
bus Incorrect
Correct Marks for this submission: 1/1
____ allows many different external devices to connect to portable computers through a 26-pin interface, and offers data transfer rates of 250 MBps in each direction (for a total of 500 MBps)
Choose one answer
a
EEPROM Incorrect
b
RIP Incorrect
c
ExpressCard <<<< Correct
d
VLAN Incorrect
Correct Marks for this submission: 1/1
The ____ is a simple set of instructions that enables a computer to initially recognize its hardware
Choose one answer
a
CMOS Incorrect
b
data port Incorrect
c
DIP switch Incorrect
d
BIOS<<<< Correct
Correct Marks for this submission: 1/1
The ____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU use for exchanging, or buffering, data
Choose one answer
a
memory range<<<< Correct
b
on-board NIC Incorrect
c
runt Incorrect
d
uplink port Incorrect
Correct Marks for this submission: 1/1
____ are devices that connect two network segments by analyzing incoming frames and making decisions about where to direct them based on each frameís MAC address
Choose one answer
a
Multistation Access Units Incorrect
b
PC cards Incorrect
c
Hubs Incorrect
d
Bridges<<<< Correct
Incorrect Marks for this submission: 0/1
A repeater typically contains multiple data portsinto which the patch cables for network nodes are connected
Choose one answer
a
True Incorrect
b
False<<<< Correct
Incorrect Marks for this submission: 0/1
Chapter 6 Quiz A(n) ____ is the layout, or pattern, of the nodes on a network
Choose one answer
a
serial backbone b
physical topology<<<< c
enterprise d
distributed backbone Correct Marks for this submission: 1/1
As long as a station is on and has its wireless protocols running, it periodically surveys its surroundings for evidence of an access point, a task known as ____
Choose one answer
a
switching b
probing c
scanning<<<< d
reassociation Correct Marks for this submission: 1/1
Multiple Bluetooth piconets can be combined to form a(n) ____
Choose one answer
a
packet b
scatternet<<<< c
serial backbone d
Ethernet Correct Marks for this submission: 1/1
____ occurs when two nodes simultaneously check a channel, determine that it is free, and begin to transmit
Choose one answer
a
Jamming b
Collision<<<< c
Circuit switching d
Association Correct Marks for this submission: 1/1
Which of the following standards specifies a method for supplying electrical power over Ethernet connections? Choose one answer
a
Ethernet_SNAP b
Ethernet_II c
PoE d
802
3af<<<< Correct Marks for this submission: 1/1
____ uses a double ring of multimode or single-mode fiber to transmit data at speeds of 100 Mbps
Choose one answer
a
ATM b
SPX c
FDDI<<<< d
IPX Correct Marks for this submission: 1/1
In a(n) ____ topology, each node is connected to the two nearest nodes so that the entire network forms a circle
Choose one answer
a
ring<<<< b
bus c
star d
star-wired Correct Marks for this submission: 1/1
A(n) ____ consists of a number of connectivity devices connected to a series of central connectivity devices, such as hubs, switches, or routers, in a hierarchy
Choose one answer
a
collapsed backbone b
serial backbone c
distributed backbone<<<< d
parallel backbone Correct Marks for this submission: 1/1
A(n) ____ is the length of time data takes to travel fromone point on the segment to another point
Choose one answer
a
access method b
data propagation delay<<<< c
probe d
beacon frame Correct Marks for this submission: 1/1
In ____, a 3-byte packet is transmitted from one node to another in a circular fashion around the ring
Choose one answer
a
packet switching b
token passing<<<< c
reassociation d
circuit switching Correct Marks for this submission: 1/1
Most bus networks use coaxial cable as their physical medium
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Bus networks are difficult to troubleshoot because it is a challenge to identify fault locations
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
The ring topology forms the basis for modern Ethernet and Fast Ethernet networks
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
A collapsed backbone provides network administrators with the ability to segregate workgroups and, therefore, manage them more easily
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
FDDI can connect LANs located in multiple buildings, such as those on college campuses
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Chapter 7 Quiz A WAN in which each site is directly connected to no more than two other sites in a serial fashion is known as a(n) ____
Choose one answer
a
ring topology WAN b
mesh topology WAN c
bus topology WAN<<<< d
star topology WAN Correct Marks for this submission: 1/1
____ is Microsoftís remote access software available with the Windows Server 2003 network operating system and the Windows XP client operating systems
Choose one answer
a
RRAS<<<< b
DHS c
SVC d
SONET Correct Marks for this submission: 1/1
____ refers to a communications method in which nodes do not have to conform to any predetermined schemes that specify the timing of data transmissions
Choose one answer
a
Symmetrical b
Synchronous c
Asynchronous<<<< d
Asymmetrical Correct Marks for this submission: 1/1
To make sure a VPN can carry all types of data in a private manner over any kind of connection, special VPN protocols encapsulate higher-layer protocols in a process known as ____
Choose one answer
a
bonding b
routing c
low earth orbiting d
tunneling<<<< Correct Marks for this submission: 1/1
A(n) ____ topology WAN incorporates many directly interconnected sites
Choose one answer
a
star b
mesh<<<< c
tiered d
ring Correct Marks for this submission: 1/1
____ are connections that are established when parties need to transmit, then terminated after the transmission is complete
Choose one answer
a
Hot spots b
SVCs c
Frame Relays d
CSUs<<<< Incorrect Marks for this submission: 0/1
____ is an analog, packet-switched technology designed for long-distance data transmission and standardized by the ITU in the mid-1970s
Choose one answer
a
X
25<<<< b
T-Carrier c
E1 d
802
16 Correct Marks for this submission: 1/1
A(n) ____ lease allows organizations to use only some of the channels on a T1 line and be charged according to the number of channels they use
Choose one answer
a
partial T1 b
frame relay c
fractional T1<<<< d
basic T1 Correct Marks for this submission: 1/1
A(n) DSL ____ is a device that modulates outgoing signals and demodulates incoming DSL signals
Choose one answer
a
modem<<<< b
adapter c
connector d
PSTN Correct Marks for this submission: 1/1
____ means that satellites orbit the earth at the same rate as the earth turns
Choose one answer
a
Satellite return b
DSLAM c
Geosynchronous orbit<<<< d
NSP orbit Correct Marks for this submission: 1/1
A bus topology WAN is often the best option for organizations with only a few sites and the capability to use dedicated circuits
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
When computers connect via the PSTN, modems are necessary at both the source and destination because not all of the PSTN is capable of handling digital transmission
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
PVCs are dedicated, individual links
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
T-Carriers belong to the Network layer of the OSI Model
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Broadband cable is a symmetrical technology
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Chapter 8 Quiz The purpose of the ____ is to gather multiple administrative tools into a convenient console for your network environment
Choose one answer
a
relative distinguished name b
Server Message Block c
Universal Disk Format d
Microsoft Management Console<<<< Correct Marks for this submission: 1/1
A ____ is a group of users, servers, and other resources that share a centralized database of account and security information
Choose one answer
a
domain<<<< b
forest c
namespace d
leaf object Correct Marks for this submission: 1/1
Windows Server 2003 computers that do not store directory information are known as ____
Choose one answer
a
redirectors b
member servers<<<< c
snap-ins d
root domains Correct Marks for this submission: 1/1
In Internet terminology, the term ____ refers to the complete database of hierarchical names used to map IP addresses to their hostsí names
Choose one answer
a
namespace<<<< b
object c
schema d
workgroup Correct Marks for this submission: 1/1
The ____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls (if it is a domain controller)
Choose one answer
a
Guest b
local c
Administrator<<<< d
domain Correct Marks for this submission: 1/1
____ is secure, reliable, and makes it possible to compress files so they take up less space
Choose one answer
a
NTFS<<<< b
FAT 16 c
FAT 32 d
CDFS Correct Marks for this submission: 1/1
____ identify what type of objects can be specified in a directory
Choose one answer
a
Partitions b
Classes<<<< c
Threads d
Domains Correct Marks for this submission: 1/1
The term ____ refers to the RAM chips that are installed on the computerís system board and whose sole function is to provide memory to that machine
Choose one answer
a
middleware b
physical memory<<<< c
virtual memory d
namespace Correct Marks for this submission: 1/1
____ is the ability of a processor to perform many different operations in a very brief period of time
Choose one answer
a
Multiprocessing b
File allocation c
Multitasking<<<< d
Paging Correct Marks for this submission: 1/1
The ____ lists all computer components proven to be compatible with Windows Server 2003
Choose one answer
a
UPN b
UDF c
HCL<<<< d
SMB Correct Marks for this submission: 1/1
A redirector belongs to the Presentation layer of the OSI Model
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
For a fixed price, a site license allows an unlimited number of users to legally access an application
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Multitasking means performing more than one operation simultaneously
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
A collection of one or more domain trees is known as a forest
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Multitasking is often used on servers as a technique to improve response time
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Chapter 9 Question 1 Marks: 1 Versions of UNIX that come from Bell Labs are known as ____
Choose one answer
a
Samba b
System V<<<< c
BSD d
Solaris Correct Marks for this submission: 1/1
On a UNIX-type of system, the ____ directory contains the kernel and other system initialization files
Choose one answer
a
/var b
/boot<<<< c
/home d
/Users Correct Marks for this submission: 1/1
A(n) ____ translates your typed commands into machine instructions that a UNIX-type of system can understand
Choose one answer
a
kernel b
i-node c
command interpreter<<<< d
NFS Correct Marks for this submission: 1/1
____ is the version of Linux packaged and distributed by Red Hat, Inc., on a PC
Choose one answer
a
Solaris b
Fedora Core<<<< c
SPARC d
Samba Correct Marks for this submission: 1/1
UNIX-type systems enable you to restrict access to resources by assigning user and group ____ to files and directories
Choose one answer
a
pipelines b
permissions<<<< c
shells d
nodes Correct Marks for this submission: 1/1
When installed on a UNIX-type of system, ____ provides all the networking services necessary to make your UNIX-type of system a fully featured Windows file- and printer-sharing server
Choose one answer
a
Xserve b
Samba<<<< c
XNU d
SPARC Correct Marks for this submission: 1/1
UNIX-type systems that are not owned by any one company are known as ____
Choose one answer
a
AIX b
open source software<<<< c
kernel modules d
BSD Correct Marks for this submission: 1/1
A(n) ____ represents an instance of a program running in memory (RAM)
Choose one answer
a
pipeline b
kernel c
shell d
process<<<< Correct Marks for this submission: 1/1
Most current UNIX-type of systems use a(n) ____ addressing scheme that enables programs to access 4 GB of memory
Choose one answer
a
8-bit b
16-bit c
32-bit<<<< d
64-bit Correct Marks for this submission: 1/1
The Mac OS X Server kernel is derived from an operating system called ____, which was developed at Carnegie Mellon University in the 1990s
Choose one answer
a
Mach<<<< b
XNU c
Solaris d
Linux Correct Marks for this submission: 1/1
UNIX-type systems support non-IP protocols, such as Novellís IPX/SPX and AppleTalk
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
/Users/jones is the login (or home) directory for the user Jones on a UNIX system
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Every file and directory on a UNIX-type of system is owned by exactly one user and is a member of exactly one group
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Apple and IBM use the same central processing unit, the PowerPC, in their computers
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
The Solaris kernel is the software Linus Torvalds wrote and released to the public in 1991
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Chapter 10 Quiz ___ consist of client tools for accessing eDirectory and development tools for integrating Linux servers with DirXML
Choose one answer
a
X Server b
NSS c
Nterprise Linux Services<<<< d
NLM Correct Marks for this submission: 1/1
The amount of resources consumed by each NLM depends on the NLMís ____
Choose one answer
a
console b
context c
size and complexity<<<< d
directory structure Correct Marks for this submission: 1/1
The serverís ____ is also its interface, which enables the network administrator to manage disks and volumes and modify server parameters, such as protocols, bindings, system resources, and loaded modules
Choose one answer
a
context b
console<<<< c
schema d
monitor Correct Marks for this submission: 1/1
In Novell terminology, the eDirectory tree root is called the ____, and it bears the name of the tree
Choose one answer
a
tree object<<<< b
pool c
X Server d
schema Correct Marks for this submission: 1/1
Using ____ allows users to log on to the network once and gain access to objects from both Active Directory and eDirectory
Choose one answer
a
DirXML<<<< b
BorderManager c
eDirectory d
NetDrive Correct Marks for this submission: 1/1
Because Linux operating systems run TCP/IP by default, Linux clients can easily connect to NetWare servers through ____
Choose one answer
a
NetStorage b
eDirectory c
NetDrive<<<< d
Remote Manager Incorrect Marks for this submission: 0/1
A network administrator can load or unload NLMs through the serverís ____
Choose one answer
a
console<<<< b
context c
NLM d
home directory Correct Marks for this submission: 1/1
Which of the following is automatically created during installation? Choose one answer
a
DATA b
SYS<<<< c
APPS d
CD Correct Marks for this submission: 1/1
The ____ notation is a relatively lengthy way of expressing context that includes identifiers for the organization and OUs
Choose one answer
a
typeless b
typeful<<<< c
GroupWise d
console Correct Marks for this submission: 1/1
Users can navigate directories and manage their files on a server through Novellís ____ tool
Choose one answer
a
iManager b
Remote Manager c
NetStorage<<<< d
eDirectory Correct Marks for this submission: 1/1
IntraNetWare was the first version of NetWare to supply Internet-related services, such as Web server software, IP address management, and FTP hosting
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
ConsoleOne can be used either at the server or from another computer connected to the same network
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
NSS is selected by default during NetWare 6
5 installation
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
A user is a leaf object because it contains and manages objects other than the network user it represents
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
NetWare allows you to delete objects that contain leaf objects
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Test # 2 - Chapters 6 - 10 A(n) ____ is the layout, or pattern, of the nodes on a network
Choose one answer
a
serial backbone b
physical topology<<<< c
enterprise d
distributed backbone Correct Marks for this submission: 1/1
As long as a station is on and has its wireless protocols running, it periodically surveys its surroundings for evidence of an access point, a task known as ____
Choose one answer
a
switching b
probing c
scanning<<<< d
reassociation Correct Marks for this submission: 1/1
Multiple Bluetooth piconets can be combined to form a(n) ____
Choose one answer
a
packet b
scatternet<<<< c
serial backbone d
Ethernet Correct Marks for this submission: 1/1
Which of the following maintains the timing for ring passing, monitors token and frame transmission, detects lost tokens, and corrects errors when a timing error or other disruption occurs on a Token Ring network? Choose one answer
a
Terminator<<<< b
Active monitor c
Bluetooth d
Connector Incorrect Marks for this submission: 0/1
In networking, the term ____ refers to an entire organization, including its local and remote offices, a mixture of computer systems, and a number of departments
Choose one answer
a
enterprise<<<< b
company c
industry d
business Correct Marks for this submission: 1/1
In a(n) ____ topology, each node is connected to the two nearest nodes so that the entire network forms a circle
Choose one answer
a
ring<<<< b
bus c
star d
star-wired Correct Marks for this submission: 1/1
A(n) ____ consists of a number of connectivity devices connected to a series of central connectivity devices, such as hubs, switches, or routers, in a hierarchy
Choose one answer
a
collapsed backbone b
serial backbone c
distributed backbone<<<< d
parallel backbone Correct Marks for this submission: 1/1
____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments
Choose one answer
a
ATM b
LAN Emulation c
QoS d
Switched Ethernet<<<< Correct Marks for this submission: 1/1
In ____, a 3-byte packet is transmitted from one node to another in a circular fashion around the ring
Choose one answer
a
packet switching b
token passing<<<< c
reassociation d
circuit switching Correct Marks for this submission: 1/1
The ring topology forms the basis for modern Ethernet and Fast Ethernet networks
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
____ is Microsoftís remote access software available with the Windows Server 2003 network operating system and the Windows XP client operating systems
Choose one answer
a
RRAS<<<< b
DHS c
SVC d
SONET Correct Marks for this submission: 1/1
____ refers to a communications method in which nodes do not have to conform to any predetermined schemes that specify the timing of data transmissions
Choose one answer
a
Symmetrical b
Synchronous c
Asynchronous<<<< d
Asymmetrical Correct Marks for this submission: 1/1
____ are wide area networks logically defined over public transmission systems
Choose one answer
a
VPNs<<<< b
Hot spots c
Transponders d
Web portals Correct Marks for this submission: 1/1
A(n) ____ topology WAN incorporates many directly interconnected sites
Choose one answer
a
star b
mesh<<<< c
tiered d
ring Correct Marks for this submission: 1/1
A(n) ____ circuit can carry the equivalent of 672 voice or data channels, giving a maximum data throughput of 44
736 Mbps
Choose one answer
a
T1 b
T2 c
T3<<<< d
T4 Correct Marks for this submission: 1/1
HDSL, SDSL, and SHDSL are examples of ____
Choose one answer
a
symmetrical DSL<<<< b
L2TP c
PSTN d
asymmetrical DSL Correct Marks for this submission: 1/1
____ is an analog, packet-switched technology designed for long-distance data transmission and standardized by the ITU in the mid-1970s
Choose one answer
a
X
25<<<< b
T-Carrier c
E1 d
802
16 Correct Marks for this submission: 1/1
A(n) ____ lease allows organizations to use only some of the channels on a T1 line and be charged according to the number of channels they use
Choose one answer
a
partial T1 b
frame relay c
fractional T1<<<< d
basic T1 Correct Marks for this submission: 1/1
Places where wireless Internet access is available to the public are called ____
Choose one answer
a
hubs b
access points<<<< c
local loops d
hot spots Incorrect Marks for this submission: 0/1
A bus topology WAN is often the best option for organizations with only a few sites and the capability to use dedicated circuits
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
According to the LDAP standard, a thing or person associated with the network is represented by a(n) ____
Choose one answer
a
object<<<< b
attribute c
domain d
class Correct Marks for this submission: 1/1
The purpose of the ____ is to gather multiple administrative tools into a convenient console for your network environment
Choose one answer
a
relative distinguished name b
Server Message Block c
Universal Disk Format d
Microsoft Management Console<<<< Correct Marks for this submission: 1/1
A ____ is a group of users, servers, and other resources that share a centralized database of account and security information
Choose one answer
a
domain<<<< b
forest c
namespace d
leaf object Correct Marks for this submission: 1/1
The relationship between two domains in which one domain allows another domain to authenticate its users is known as ____
Choose one answer
a
object relationship b
time sharing c
file relationship d
trust relationship<<<< Correct Marks for this submission: 1/1
The ____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls (if it is a domain controller)
Choose one answer
a
Guest b
local c
Administrator<<<< d
domain Correct Marks for this submission: 1/1
____ identify what type of objects can be specified in a directory
Choose one answer
a
Partitions b
Classes<<<< c
Threads d
Domains Correct Marks for this submission: 1/1
The term ____ refers to the RAM chips that are installed on the computerís system board and whose sole function is to provide memory to that machine
Choose one answer
a
middleware b
physical memory<<<< c
virtual memory d
namespace Correct Marks for this submission: 1/1
____ is stored on the hard disk as a page file, the use of which is managed by the operating system
Choose one answer
a
Virtual memory<<<< b
Middleware c
Namespace d
Physical memory Correct Marks for this submission: 1/1
The ____ lists all computer components proven to be compatible with Windows Server 2003
Choose one answer
a
UPN b
UDF c
HCL<<<< d
SMB Correct Marks for this submission: 1/1
Multitasking is often used on servers as a technique to improve response time
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
____ is the version of Linux packaged and distributed by Red Hat, Inc., on a PC
Choose one answer
a
Solaris b
Fedora Core<<<< c
SPARC d
Samba Correct Marks for this submission: 1/1
UNIX-type systems enable you to restrict access to resources by assigning user and group ____ to files and directories
Choose one answer
a
pipelines b
permissions<<<< c
shells d
nodes Correct Marks for this submission: 1/1
When installed on a UNIX-type of system, ____ provides all the networking services necessary to make your UNIX-type of system a fully featured Windows file- and printer-sharing server
Choose one answer
a
Xserve b
Samba<<<< c
XNU d
SPARC Correct Marks for this submission: 1/1
An implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from The SCO Group is known as ____
Choose one answer
a
open source software b
BSD c
proprietary UNIX<<<< d
GNU Correct Marks for this submission: 1/1
The native file system type on Linux is called____
Choose one answer
a
BSD b
HFS+ c
Fedora Core d
ext3<<<< Correct Marks for this submission: 1/1
UNIX-type systems that are not owned by any one company are known as ____
Choose one answer
a
AIX b
open source software<<<< c
kernel modules d
BSD Correct Marks for this submission: 1/1
A(n) ____ represents an instance of a program running in memory (RAM)
Choose one answer
a
pipeline b
kernel c
shell d
process<<<< Correct Marks for this submission: 1/1
____ in a UNIX server can take the form of a disk partition, or it can be in a file
Choose one answer
a
Kernel modules<<<< b
Virtual memory c
i-nodes d
Command interpreters Incorrect Marks for this submission: 0/1
The Mac OS X Server kernel is derived from an operating system called ____, which was developed at Carnegie Mellon University in the 1990s
Choose one answer
a
Mach<<<< b
XNU c
Solaris d
Linux Correct Marks for this submission: 1/1
Every file and directory on a UNIX-type of system is owned by exactly one user and is a member of exactly one group
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
____ is Novellís tool for integrating eDirectory and Windows Active Directory or Windows NT domain data
Choose one answer
a
BorderManager b
DirXML c
NetDrive <<<< d
ConsoleOne Incorrect Marks for this submission: 0/1
NetWareís ____ is started by the program server
exe, which runs from a serverís DOS partition (over the DOS operating system) when a server boots up
Choose one answer
a
kernel <<<< b
partition c
base schema d
context Correct Marks for this submission: 1/1
The serverís ____ is also its interface, which enables the network administrator to manage disks and volumes and modify server parameters, such as protocols, bindings, system resources, and loaded modules
Choose one answer
a
context b
console<<<< c
schema d
monitor Correct Marks for this submission: 1/1
In Novell terminology, the eDirectory tree root is called the ____, and it bears the name of the tree
Choose one answer
a
tree object<<<< b
pool c
X Server d
schema Correct Marks for this submission: 1/1
Using ____ allows users to log on to the network once and gain access to objects from both Active Directory and eDirectory
Choose one answer
a
DirXML <<<< b
BorderManager c
eDirectory d
NetDrive Correct Marks for this submission: 1/1
NetWare is capable of providing clients with direct access to NSS using the clientsí ____
Choose one answer
a
NDS b
tree objects c
boot partitions <<<< d
native file access protocols Incorrect Marks for this submission: 0/1
The text-based menu that allows a network administrator to view and modify server parameters through console commands is called ____
Choose one answer
a
Partition b
Tree object c
Monitor d
Pattern <<<< Incorrect Marks for this submission: 0/1
The ____ notation is a relatively lengthy way of expressing context that includes identifiers for the organization and OUs
Choose one answer
a
typeless b
typeful <<<< c
GroupWise d
console Correct Marks for this submission: 1/1
Users can navigate directories and manage their files on a server through Novellís ____ tool
Choose one answer
a
iManager b
Remote Manager c
NetStorage <<<< d
eDirectory Correct Marks for this submission: 1/1
IntraNetWare was the first version of NetWare to supply Internet-related services, such as Web server software, IP address management, and FTP hosting
Choose one answer
a
True <<<< b
False Correct Marks for this submission: 1/1
Chapter 11 Quiz Leasing an entire Class C network of addresses gives you ____ usable IP addresses
Choose one answer
a
200 b
254<<<< c
357 d
500 Correct Marks for this submission: 1/1
____ is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3
Choose one answer
a
SMTP b
MIME c
ICS d
IMAP<<<< Correct Marks for this submission: 1/1
On networks that run NetBIOS over TCP/IP, the ____ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses
Choose one answer
a
netstat b
nbtstat <<<< c
tracert d
nslookup Correct Marks for this submission: 1/1
The utility that allows you to query the DNS registration database and obtain information about a domain is called ____
Choose one answer
a
whois <<<< b
netstat c
ifconfig d
dig Correct Marks for this submission: 1/1
____ is a command-line utility that provides information about a network adapterís IP address, subnet mask, and default gateway
Choose one answer
a
winipcfg b
Ipconfig<<<< c
dig d
ifconfig Correct Marks for this submission: 1/1
____ is the TCP/IP configuration and management utility used on UNIX-type of systems
Choose one answer
a
winipcfg b
Ifconfig<<<< c
nbstat d
dig Correct Marks for this submission: 1/1
When working on a UNIX-type of system, you can limit the maximum number of router hops the traceroute command allows by typing the ____ switch
Choose one answer
a
-m<<<< b
-a c
-e d
-r Correct Marks for this submission: 1/1
The formula for determining how to modify a default subnet mask is ____
Choose one answer
a
2n - 2 = Y<<<< b
2n - 4 = Y c
2n - 1 = Y d
4n - 2 = Y Correct Marks for this submission: 1/1
A subnet created by moving the subnet boundary to the left is known as a(n) ____
Choose one answer
a
toll bypass b
supernet mask c
softphone d
supernet<<<< Correct Marks for this submission: 1/1
A network that uses Internet-like services and protocols to exchange information within an organization and with certain, authorized users outside of that organization is known as a(n) ____
Choose one answer
a
intranet b
supernet c
extranet<<<< d
PBX Correct Marks for this submission: 1/1
____ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message
Choose one answer
a
IMAP b
MIME<<<< c
POP d
SMTP Correct Marks for this submission: 1/1
The ď0Ē bits in a subnet mask indicate that corresponding bits in an IP address contain network information
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
CIDR is not exclusive of subnetting; it merely provides additional ways of arranging network and host information in an IP address
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Routers that rely on older routing protocols, such as RIP, are capable of interpreting classless IP addresses
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
When a router is used as a gateway, it must maintain routing tables as well
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Chapter 12 Quiz Question 1 Marks: 1 A(n) ____ is a process or program that provides support personnel with a centralized means of documenting changes to the network
Choose one answer
a
cable checker b
change management system<<<< c
jabber d
network monitor Correct Marks for this submission: 1/1
____ is the resistance that contributes to controlling the signal
Choose one answer
a
Voltage b
Impedance<<<< c
NETMON d
Baseline Correct Marks for this submission: 1/1
If you need to know more than whether a cable is simply carrying current, you can use a(n) ____
Choose one answer
a
cable performance tester<<<< b
tone generator c
tone locator d
time domain reflectometer Correct Marks for this submission: 1/1
A(n) ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network
Choose one answer
a
network monitor<<<< b
spectrum analyzer c
runt d
network analyzer Correct Marks for this submission: 1/1
Which of the following tools can assess the quality of a wireless signal? Choose one answer
a
ohmmeter b
spectrum analyzer<<<< c
voltmeter d
tone generator Correct Marks for this submission: 1/1
Impedance is measured in ____
Choose one answer
a
watts b
ohms<<<< c
volts d
amps Correct Marks for this submission: 1/1
A(n) ____ accomplishes the same continuity and fault tests as a continuity tester
Choose one answer
a
jabber b
performance tester<<<< c
fox and hound d
call tracking system Correct Marks for this submission: 1/1
A(n) ____ is a device that emits a tone when it detects electrical activity on a wire pair
Choose one answer
a
tone locator<<<< b
tone generator c
runt d
network analyzer Incorrect Marks for this submission: 0/1
A(n) ____ is a simple instrument that can measure many characteristics of an electric circuit, including its resistance and voltage
Choose one answer
a
ghost b
ohmmeter c
network analyzer d
multimeter<<<< Correct Marks for this submission: 1/1
____ is used to create signals over a network wire
Choose one answer
a
Voltage<<<< b
NETMON c
Runt d
OTDR Correct Marks for this submission: 1/1
Resistance is measured in ____
Choose one answer
a
ohms<<<< b
watts c
volts d
amps Correct Marks for this submission: 1/1
By placing the tone generator at one end of a wire and attaching a tone locator to the other end, you can verify the location of the wireís termination
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Tone generators and tone locators can be used to determine the characteristics of a cable, such as whether it has defects or whether its length exceeds IEEE standards for a certain type of network
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
You can use a continuity tester on a live network cable
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Network monitors typically can interpret up to Layer 3 of the OSI Model
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Chapter 13 Quiz ____ refers to the soundness of a networkís programs, data, services, devices, and connections
Choose one answer
a
Disk duplexing b
Disk mirroring c
Integrity<<<< d
Availability Correct Marks for this submission: 1/1
The term ____ refers to the mechanism used to verify the integrity of data by making the number of bits in a byte sum to either an odd or even number
Choose one answer
a
surge b
sag c
parity<<<< d
fail-over Correct Marks for this submission: 1/1
A(n) ____ is a copy of data or program files created for archiving or safekeeping
Choose one answer
a
parity b
backup<<<< c
array d
bot Correct Marks for this submission: 1/1
A(n) ____ can hold up to 4
7 GB on one single-layered side, and both sides of the disc can be used
Choose one answer
a
CD-R b
archive c
recordable DVD<<<< d
CD-RW Correct Marks for this submission: 1/1
____ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users
Choose one answer
a
Load balancing b
Disaster recovery<<<< c
Disk duplexing d
Clustering Correct Marks for this submission: 1/1
____ viruses change their characteristics (such as the arrangement of their bytes, size, and internal instructions) every time they are transferred to a new system, making them harder to identify
Choose one answer
a
Polymorphic<<<< b
Time-dependent c
Network d
Macro Correct Marks for this submission: 1/1
An automatic distribution of traffic over multiple links or processors to optimize response is called ____
Choose one answer
a
load balancing<<<< b
integrity checking c
signature scanning d
replication Correct Marks for this submission: 1/1
In networking, the term ____ means a program that runs automatically, without requiring a person to start or stop it
Choose one answer
a
bot <<<< b
array c
macro d
hot spare Correct Marks for this submission: 1/1
A(n) ____ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet),which prevents undesired features of the wall outletís A/C power from harming the device or interrupting its services
Choose one answer
a
NAS b
UPS <<<< c
IRC d
RAID Correct Marks for this submission: 1/1
____ is a fault-tolerance technique in which one device or component duplicates the activities of another
Choose one answer
a
Integrity checking b
Differential backup c
Disk striping d
Mirroring <<<< Correct Marks for this submission: 1/1
____ is a collection of disks that provide fault tolerance for shared data and applications
Choose one answer
a
UPS b
RAID<<<< c
NAS d
SAN Correct Marks for this submission: 1/1
In RAID Level 3 a parity bit is assigned to each data byte when it is transmitted or written to a disk
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Viruses do not alter other programs in the same way that other threats do, but they may carry worms
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Polymorphic viruses are programmed to activate on a particular date
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
If your antivirus software resides on the server and checks every file and transaction, you will protect important files and increase your network performance considerably
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Chapter 14 Quiz ____ occurs when a device scans an individualís unique physical characteristics, such as the color patterns in her iris or the geometry of her hand, to verify her identity
Choose one answer
a
Brute force attack b
Denial-of-service attack c
AES d
Bio-recognition access<<<< Correct Marks for this submission: 1/1
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission Choose one answer
a
TGT b
TLS c
SSL d
PGP<<<< Correct Marks for this submission: 1/1
An SSL ____ allows the client and server to continue to exchange data securely as long as the client is still connected to the server
Choose one answer
a
key b
challenge c
session<<<< d
ticket Correct Marks for this submission: 1/1
Before you can establish a secure SSH connection, you must first generate a public key and a private key on your client workstation by running the ____ command Choose one answer
a
netstat b
scp c
ssh keygen<<<< d
slogin Correct Marks for this submission: 1/1
____ refers to the way in which two nodes agree on common parameters for the keys they will use
Choose one answer
a
Key management<<<< b
EAP c
AES d
CHAP Correct Marks for this submission: 1/1
____ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system
Choose one answer
a
MS-CHAP b
PGP c
Kerberos<<<< d
IPSec Correct Marks for this submission: 1/1
For some measure of security, 802
11 allows for optional encryption using the ____ standard
Choose one answer
a
MS_CHAP b
Kerberos c
IPSec d
Wired Equivalent Privacy<<<< Correct Marks for this submission: 1/1
Trying numerous possible character combinations to find the key that will decrypt encrypted data is known as a(n) ____
Choose one answer
a
brute force attack<<<< b
denial-of-service attack c
dictionary attack d
challenge Correct Marks for this submission: 1/1
The most popular private, or symmetric, key encryption is based on ____
Choose one answer
a
AES b
AH c
DES<<<< d
CHAP Correct Marks for this submission: 1/1
A(n) ____ is a publicly accessible host (such as a server on the Internet) that freely provides a list of usersí public keys, much as a telephone book provides a list of peoplesí phone numbers
Choose one answer
a
IKE b
public key server<<<< c
IPSec d
Diffie-Hellman Correct Marks for this submission: 1/1
____ is a key encryption technique that weaves a key with data multiple times, as a computer issues the stream of data
Choose one answer
a
RC1 b
RC4<<<< c
RC5 d
RC6 Correct Marks for this submission: 1/1
In general, information is confidential if it could be used by other parties to impair an organizationís functioning, decrease customersí confidence, cause a financial loss, damage an organizationís status, or give a significant advantage to a competitor
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Packet-filtering firewalls operate at the Application layer of the OSI Model
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
A RADIUS server does not replace functions performed by the remote access server, but communicates with the access server to manage user logons
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
The password authentication protocol is a simple authentication protocol that is very secure
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Chapter 15 Quiz ____ is the practice of managing staff, budget, timelines, and other resources and variables to achieve a specific goal within given bounds
Choose one answer
a
Performance management b
Project planning c
MIB d
Project management<<<< Correct Marks for this submission: 1/1
The definition of managed devices and their data are collected in a(n) ____
Choose one answer
a
MIB<<<< b
MRTG c
SNMP d
SMTP Correct Marks for this submission: 1/1
A(n) ____ is a correction, improvement, or enhancement to a particular piece of a software application
Choose one answer
a
patch<<<< b
session c
milestone d
pilot Correct Marks for this submission: 1/1
A software ____ is a major change to a software packageís existing code
Choose one answer
a
pack b
upgrade<<<< c
session d
pilot Correct Marks for this submission: 1/1
A(n) ____ is any person who is affected by the project
Choose one answer
a
user b
stakeholder<<<< c
sponsor d
project manager Correct Marks for this submission: 1/1
____ simplifies maintaining and upgrading the network chiefly because you know what the system includes
Choose one answer
a
Project management b
Asset management<<<< c
Fault management d
Performance management Correct Marks for this submission: 1/1
____ is freely distributed software originally written by Tobias Oetiker, a networking professional who in the early 1990s saw a need for a tool to regularly measure the status of his organizationís WAN link
Choose one answer
a
SMTP b
SNMP c
MIB d
MRTG<<<< Correct Marks for this submission: 1/1
A(n) ____ outlines the costs and benefits of the project and attempts to predict whether it will result in a favorable outcome
Choose one answer
a
feasibility study<<<< b
project plan c
project upgrade d
patch Correct Marks for this submission: 1/1
A(n) ____ organizes the details (for example, the timeline and the significant tasks) of a managed project
Choose one answer
a
poll b
project plan<<<< c
patch d
MIB Correct Marks for this submission: 1/1
____ is the process of identifying steps that minimize the risk of unforeseen events that could affect the quality or timeliness of the projectís goals
Choose one answer
a
Contingency planning<<<< b
Project planning c
Network planning d
Backleveling Correct Marks for this submission: 1/1
The detection and signaling of device, link, or component faults is called ____
Choose one answer
a
user management b
fault management<<<< c
performance management d
network management Correct Marks for this submission: 1/1
The feasibility study should help determine whether you can achieve the project goals within the given time, budgetary, and staffing constraints
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Application upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software
Choose one answer
a
True<<<< b
False Correct Marks for this submission: 1/1
Adding a new processor to a server, a new NIC to a router, or more memory to a printer never affects your service or warranty agreement with the manufacturer
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
A feasibility study involves interviewing users and comparing perceptions to factual data
Choose one answer
a
True b
False<<<< Correct Marks for this submission: 1/1
Test # 3 - Chapters 11 - 15 ____ is a mail retrieval protocol that was developed as a more sophisticated alternative to POP3
Choose one answer
a
SMTP Incorrect
b
MIME Incorrect
c
ICS Incorrect
d
IMAP<<<< Correct
Correct On networks that run NetBIOS over TCP/IP, the ____ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses
Choose one answer
a
netstat Incorrect
b
nbtstat<<<< Correct
c
tracert Incorrect
d
nslookup Incorrect
Correct The utility that allows you to query the DNS registration database and obtain information about a domain is called ____
Choose one answer
a
whois <<<< Correct
b
netstat Incorrect
c
ifconfig Incorrect
d
dig Incorrect
Correct ____ is a command-line utility that provides information about a network adapterís IP address, subnet mask, and default gateway
Choose one answer
a
winipcfg Incorrect
b
Ipconfig <<<< Correct
c
dig Incorrect
d
ifconfig Incorrect
Correct ____ is the TCP/IP configuration and management utility used on UNIX-type of systems
Choose one answer
a
winipcfg Incorrect
b
Ifconfig <<<< Correct
c
nbstat Incorrect
d
dig Incorrect
Correct When working on a UNIX-type of system, you can limit the maximum number of router hops the traceroute command allows by typing the ____ switch
Choose one answer
a
-m <<<< Correct
b
-a Incorrect
c
-e Incorrect
d
-r Incorrect
Correct A subnet created by moving the subnet boundary to the left is known as a(n) ____
Choose one answer
a
toll bypass Incorrect
b
supernet mask Incorrect
c
softphone Incorrect
d
supernet <<<< Correct
Correct ____ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message
Choose one answer
a
IMAP Incorrect
b
MIME <<<< Correct
c
POP Incorrect
d
SMTP Incorrect
Correct A(n) ____ is a process or program that provides support personnel with a centralized means of documenting changes to the network
Choose one answer
a
cable checker Incorrect
b
change management system <<<< Correct
c
jabber Incorrect
d
network monitor Incorrect
Correct If you need to know more than whether a cable is simply carrying current, you can use a(n) ____
Choose one answer
a
cable performance tester <<<< Correct
b
tone generator Incorrect
c
tone locator Incorrect
d
time domain reflectometer Incorrect
Correct A(n) ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network
Choose one answer
a
network monitor<<<< Correct
b
spectrum analyzer Incorrect
c
runt Incorrect
d
network analyzer Incorrect
Correct A(n) ____ accomplishes the same continuity and fault tests as a continuity tester
Choose one answer
a
jabber Incorrect
b
performance tester<<<< Correct
c
fox and hound Incorrect
d
call tracking system Incorrect
Correct A(n) ____ is a device that emits a tone when it detects electrical activity on a wire pair
Choose one answer
a
tone locator<<<< Correct
b
tone generator Incorrect
c
runt Incorrect
d
network analyzer Incorrect
Correct A(n) ____ is a simple instrument that can measure many characteristics of an electric circuit, including its resistance and voltage
Choose one answer
a
ghost Incorrect
b
ohmmeter Incorrect
c
network analyzer Incorrect
d
multimeter <<<< Correct
Correct ____ is used to create signals over a network wire
Choose one answer
a
Voltage<<<< Correct
b
NETMON Incorrect
c
Runt Incorrect
d
OTDR Incorrect
Correct Marks for this submission: 1/1
Resistance is measured in ____
Choose one answer
a
ohms <<<< Correct
b
watts Incorrect
c
volts Incorrect
d
amps Incorrect
Correct Marks for this submission: 1/1
____ refers to the soundness of a networkís programs, data, services, devices, and connections
Choose one answer
a
Disk duplexing Incorrect
b
Disk mirroring Incorrect
c
Integrity <<<< Correct
d
Availability Incorrect
Correct Marks for this submission: 1/1
The term ____ refers to the mechanism used to verify the integrity of data by making the number of bits in a byte sum to either an odd or even number
Choose one answer
a
surge Incorrect
b
sag Incorrect
c
parity <<<< Correct
d
fail-over Incorrect
Correct Marks for this submission: 1/1
A(n) ____ can hold up to 4
7 GB on one single-layered side, and both sides of the disc can be used
Choose one answer
a
CD-R Incorrect
b
archive Incorrect
c
recordable DVD <<<< Correct
d
CD-RW Incorrect
Correct Marks for this submission: 1/1
____ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users
Choose one answer
a
Load balancing Incorrect
b
Disaster recovery<<<< Correct
c
Disk duplexing Incorrect
d
Clustering Incorrect
Correct Marks for this submission: 1/1
An automatic distribution of traffic over multiple links or processors to optimize response is called ____
Choose one answer
a
load balancing<<<< Correct
b
integrity checking Incorrect
c
signature scanning Incorrect
d
replication Incorrect
Correct Marks for this submission: 1/1
In networking, the term ____ means a program that runs automatically, without requiring a person to start or stop it
Choose one answer
a
bot <<<< Correct
b
array Incorrect
c
macro Incorrect
d
hot spare Incorrect
Correct Marks for this submission: 1/1
A(n) ____ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet),which prevents undesired features of the wall outletís A/C power from harming the device or interrupting its services
Choose one answer
a
NAS Incorrect
b
UPS<<<< Correct
c
IRC Incorrect
d
RAID Incorrect
Correct Marks for this submission: 1/1
____ is a collection of disks that provide fault tolerance for shared data and applications
Choose one answer
a
UPS Incorrect
b
RAID<<<< Correct
c
NAS Incorrect
d
SAN Incorrect
Correct Marks for this submission: 1/1
____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission Choose one answer
a
TGT Incorrect
b
TLS Incorrect
c
SSL Incorrect
d
PGP<<<< Correct
Correct Marks for this submission: 1/1
An SSL ____ allows the client and server to continue to exchange data securely as long as the client is still connected to the server
Choose one answer
a
key Incorrect
b
challenge Incorrect
c
session<<<< Correct
d
ticket Incorrect
Correct Marks for this submission: 1/1
Before you can establish a secure SSH connection, you must first generate a public key and a private key on your client workstation by running the ____ command Choose one answer
a
netstat Incorrect
b
scp Incorrect
c
ssh keygen <<<< Correct
d
slogin Incorrect
Correct Marks for this submission: 1/1
____ refers to the way in which two nodes agree on common parameters for the keys they will use
Choose one answer
a
Key management <<<< Correct
b
EAP Incorrect
c
AES Incorrect
d
CHAP Incorrect
Correct Marks for this submission: 1/1
____ is a cross-platform authentication protocol that uses key encryption to verify the identity of clients and to securely exchange information after a client logs on to a system
Choose one answer
a
MS-CHAP Incorrect
b
PGP Incorrect
c
Kerberos <<<< Correct
d
IPSec Incorrect
Correct Marks for this submission: 1/1
For some measure of security, 802
11 allows for optional encryption using the ____ standard
Choose one answer
a
MS_CHAP Incorrect
b
Kerberos Incorrect
c
IPSec Incorrect
d
Wired Equivalent Privacy<<<< Correct
Correct Marks for this submission: 1/1
Trying numerous possible character combinations to find the key that will decrypt encrypted data is known as a(n) ____
Choose one answer
a
brute force attack <<<< Correct
b
denial-of-service attack Incorrect
c
dictionary attack Incorrect
d
challenge Incorrect
Correct Marks for this submission: 1/1
The most popular private, or symmetric, key encryption is based on ____
Choose one answer
a
AES Incorrect
b
AH Incorrect
c
DES<<<< Correct
d
CHAP Incorrect
Correct Marks for this submission: 1/1
A(n) ____ is a publicly accessible host (such as a server on the Internet) that freely provides a list of usersí public keys, much as a telephone book provides a list of peoplesí phone numbers
Choose one answer
a
IKE Incorrect
b
public key server<<<< Correct
c
IPSec Incorrect
d
Diffie-Hellman Incorrect
Correct Marks for this submission: 1/1
The definition of managed devices and their data are collected in a(n) ____
Choose one answer
a
MIB<<<< Correct
b
MRTG Incorrect
c
SNMP Incorrect
d
SMTP Incorrect
Correct Marks for this submission: 1/1
A software ____ is a major change to a software packageís existing code
Choose one answer
a
pack Incorrect
b
upgrade<<<< Correct
c
session Incorrect
d
pilot Incorrect
Correct Marks for this submission: 1/1
A(n) ____ is any person who is affected by the project
Choose one answer
a
user Incorrect
b
stakeholder <<<< Correct
c
sponsor Incorrect
d
project manager Incorrect
Correct Marks for this submission: 1/1
____ simplifies maintaining and upgrading the network chiefly because you know what the system includes
Choose one answer
a
Project management Incorrect
b
Asset management <<<< Correct
c
Fault management Incorrect
d
Performance management Incorrect
Correct Marks for this submission: 1/1
A(n) ____ outlines the costs and benefits of the project and attempts to predict whether it will result in a favorable outcome
Choose one answer
a
feasibility study<<<< Correct
b
project plan Incorrect
c
project upgrade Incorrect
d
patch Incorrect
Correct Marks for this submission: 1/1
A(n) ____ organizes the details (for example, the timeline and the significant tasks) of a managed project
Choose one answer
a
poll Incorrect
b
project plan<<<< Correct
c
patch Incorrect
d
MIB Incorrect
Correct Marks for this submission: 1/1
The detection and signaling of device, link, or component faults is called ____
Choose one answer
a
user management Incorrect
b
fault management <<<< Correct
c
performance management Incorrect
d
network management Incorrect
Correct Marks for this submission: 1/1
A(n) ____ indicates where network information is located in an IP address
Choose one answer
a
CIDR Incorrect
b
gateway Incorrect
c
subnet mask <<<< Correct
d
ICS host Incorrect
Correct Marks for this submission: 1/1
____ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks
Choose one answer
a
MIME Incorrect
b
SMTP <<<< Correct
c
VoIP Incorrect
d
PBX Incorrect
Correct Marks for this submission: 1/1
When used on a copper-based cable, a(n) ____ applies a small amount of voltage to each conductor at one end of the cable, and then checks whether that voltage is detectable at the other end
Choose one answer
a
jabber Incorrect
b
continuity tester <<<< Correct
c
voltmeter Incorrect
d
network monitor Incorrect
Incorrect Marks for this submission: 0/1
The combination of a tone generator and a tone locator is called a(n) ____
Choose one answer
a
fox and hound<<<< Correct
b
continuity tester Incorrect
c
jabber Incorrect
d
network monitor Incorrect
Incorrect Marks for this submission: 0/1
In ____, data is continually copied from one disk to another when it is saved, just as in disk mirroring
Choose one answer
a
disk duplexing <<<< Correct
b
parity error checking Incorrect
c
server mirroring Incorrect
d
signature scanning Incorrect
Correct Marks for this submission: 1/1
In a critical component such as a router or switch, the utmost fault tolerance necessitates the use of redundant NICs, power supplies, cooling fans, interfaces, and I/O modules, all of which should ideally be able to immediately assume the duties of an identical component, a capability known as automatic ____
Choose one answer
a
mirroring Incorrect
b
fail-over <<<< Correct
c
disk striping Incorrect
d
redundancy Incorrect
Correct Marks for this submission: 1/1
A(n) ____ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic
Choose one answer
a
session Incorrect
b
proxy service<<<< Correct
c
principal Incorrect
d
network key Incorrect
Correct Marks for this submission: 1/1
In Kerberos terminology, the server that issues keys to clients during initial client authentication is known as the ____
Choose one answer
a
authenticator Incorrect
b
KDC<<<< Correct
c
proxy Incorrect
d
gateway Incorrect
Correct Marks for this submission: 1/1
The ____ is responsible for facilitating regular, effective communication among project participants
Choose one answer
a
stakeholder Incorrect
b
shareholder Incorrect
c
project manager <<<< Correct
d
sponsor Incorrect
Correct Marks for this submission: 1/1
____ refers to the assessment, monitoring, and maintenance of all aspects of a network
Choose one answer
a
Project management Incorrect
b
Asset management Incorrect
c
User management Incorrect
d
Network management <<<< Correct
Correct Marks for this submission: 1/1