Chapter 1 Solutions - RQ

lynxfatkidneyedΔίκτυα και Επικοινωνίες

26 Οκτ 2013 (πριν από 4 χρόνια και 15 μέρες)

479 εμφανίσεις

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


Chapter 1 Solutions
-

R
EVIEW
Q
UESTIONS

1.

W
hich

of the following is one of the three basic functions a computer performs? (Choose all that apply.)

a. Processing


c. Input


e. Output

2.

The __________ executes instructions provided by computer programs.

a. CPU

3.

When a CPU is composed of two or more processors, each one is referred to as a(n) ________.

b. Core

4.

W
hich

of the following is considered long
-
term storage? (Choose all that apply.)

a. Flash drive

d. Hard drive

5.

W
hich

motherboard component controls data tran
sfers between memory, expansion slots, I/O devices, and the
CPU?

c. Chipset

6.

You want to purchase a new high
-
performance graphics card for your computer. W
hich

type of connector
should it have?

d. PCI
-
Express

7.

The time it takes for read/write heads to move
to the correct spot on the platter is the ____________.

b. Seek time

8.

W
hich

of the following is a task usually performed by the BIOS? (Choose all that apply.)

a. Perform a POST.



d. Begin the boot procedure.

9.

Place the following steps of the boot procedure
in order.

Answer: d, b, e, f, a, c

10.

W
hich

of the following is a critical service provided by the OS? (Choose all that apply.)

b. Memory management

d. File system

11.

An OS

s capability to run more than one
application

or process at the same time is referred to
which of the
following?

c. Multitasking

12.

You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What
additional
software must be
installed

to allow the OS to communicate with the new NIC?

b. Device driver

13.

W
hich

of the following requests information stored on
another

computer?

b. Network client

14.

Choose the correct order for the process of a user attempting to access network resources:

d. 2, 3, 1, 4

15.

TCP/IP is an example of
which

of the following?

d. Network protoco
l

16.

In network communication, the ______________ address is used to deliver a frame to the correct computer on
the network. (Choose all that apply.)

a. MAC

d. Physical

17.

A(n) ______________ message is used to determine whether a computer is listening on the ne
twork.

b. Ping

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


18.

TCP/IP uses _________ to look up a computer

s IP address, given its name.

a. DNS

19.

The unit of information containing MAC addresses and an error
-
checking code that

s processed by the
network interface layer is referred to as a _______________.

c. Frame

20.

Data is processed from the time an application creates it to the time it reaches the network medium. This
process
include
s adding information such as addresses and is called which of the following?

b. Encapsulation

21.

Y
ou

re the network administrato
r for a company that has just expanded from one floor to two floors of a large
building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network
performance will suffer if you add computers to your existing LAN. In

addition, new users will be working in a
separate business unit, and there are reasons to logically separate the two groups of computers. What type of
network should you configure?

c. Internetwork

22.

W
hich

of the following best describes a client?

b. A
computer

s primary role in the network is to run user applications and access network resources.

23.

You work for a small company with four users who need to share information on their computers. The budget is
tight, so the network must be as inexpensive as po
ssible. What type of network should you install?

b. Peer
-
to
-
peer network

24.

Which of the following characteristics is associated with a peer
-
to
-
peer network? (Choose all that apply.)

a. Decentralized data storage

b. Inexpensive

c. User
-
managed resources

25.

A
device interconnects five computers and a printer in a single office so that users can share the printer. This
configuration is an example of which of the following?

a. LAN

26.

At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have
LANs connected via the
local phone company. This configuration is an example of which of the following? (Choose the best answer.)

a. MAN

27.

You have installed
Windows Server 2008

on a new server and want to centralize user logons and security
policies. What t
ype of software should you install and configure on this server?

d. Directory services

28.

Peer
-
to
-
peer networks aren

t suitable in which of the following situations?

a. Tight security is required.

29.

W
hich

of the following best describes a storage area network?

b. Uses high
-
speed networking technologies to give servers fast access to large amounts of disk storage

30.

Why might Windows 7 or Windows Vista require more RAM or disk space than
Windows Server 2008
?

d. They support a graphics
-
intensive user interface.

C
HAPTER
2

S
OLUTIONS
-

R
EVIEW
Q
UESTIONS

1.

W
hich

of the following is a limitation of early networks that used a daisy
-
chain method of connecting
computers? (Choose all that apply.)

a. Total number of computers that could be connected


c. Cable length

2.

W
hich

of the following is true of a repeater?

c. Receives bit signals and strengthens them

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


3.

W
hich

of the following is true of a hub? (Choose all that apply.)

b. Transmits regenerated signals to all connected ports


c. Usually has four or more ports

4.

W
hich

of the
following is the unit of measurement by
which

a hub's bandwidth is usually specified?

b. Bits per second

5.

W
hich

of the following describes how devices connected to a hub use the speed at
which

the
hub can transmit
data?

c. Bandwidth sharing

6.

W
hich

of the following is a likely indicator light on a hub? (Choose all that apply.)

b. Link status

c. Connection speed

d. Activity

7.

W
hich

of the following describes how devices connected to a switch use the speed at
which

the switch can
transmit data?

a. Dedic
ated bandwidth

8.

What does a switch use to create its switching table?

d. Source MAC addresses

9.

What purpose does the timestamp serve in a switching table?

c. Tells the switch when to delete an entry

10.

What feature of a switch allows devices to effectively comm
unicate at 200 Mbps on a 100 Mbps switch?

b. Full
-
duplex mode

11.

To w
hich

device is a wireless access point most similar in how it operates?

a. Hub

12.

What

s the purpose of an RTS signal in wireless networking?

c. It allows a client to notify the AP that it's
ready to send data.

13.

W
hich

of the following is a common operational speed of a wireless network?

d. 11 Mbps

14.

W
hich

of the following is a task performed by a NIC and its driver? (Choose all that apply.)

a. Provides a connection to the network medium



c. Rece
ives packets from the network protocol and creates frames

e. Adds error
-
checking data to the frame

15.

W
hich

of the following best describes a MAC address?

b. Two 24
-
bit numbers, in
which

one is the OUI

16.

Under
which

circumstances does a NIC allow inbound commun
ications to pass through the interface? (Choose
all that apply.)

b. The destination MAC address matches the built
-
in MAC address.

c. The destination MAC address is all binary 1s.

17.

How does a protocol analyzer capture all frames?

c. It configures the NIC to
operate in promiscuous mode.

18.

In Windows 7,
which

of the following displays information about currently installed NICs?

a. Network Connections

19.

W
hich

of the following is the purpose of an SSID?

d. Identifies a wireless network

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


20.

W
hich

of the following describe the function of routers? (Choose all that apply.)

b. Connect LANS


d. Work with packets and IP addresses

21.

What information is found in a routing table?

b. Network addresses and interfaces

22.

You currently have 15 switches with an ave
rage of 20 stations connected to each switch. The switches are
connected to one
another

so that all 300 computers can communicate with each other in a single LAN. You have
been detecting a high percentage of broadcast frames on this LAN. You think the numb
er of broadcasts might be
having an impact on network performance. What should you do?

c. Reorganize the network into smaller groups and connect each group to a router.

23.

Review the routing table in Figure 2
-
29. Based on this figure, where will the router se
nd a packet with the
source network number 1.0 and the destination network number 3.0?

c. WAN B

24.

If a router receives a packet with a destination network address unknown to the router, what will the router do?

b. Discard the packet.

25.

Which of the following i
s true about routers? (Choose all that apply.)

b. Use default routes for unknown network addresses

c. Forward unicasts


Chapter 3 Solutions
-

R
EVIEW
Q
UESTIONS

1.

W
hich

of the following describes the arrangement of network cabling between devices?

c. Physical
topology

2.

W
hich

of the following is an advantage of a star topology? (Choose all that apply.)

a. Allows faster technologies than a bus does

c. Centralized monitoring of network traffic

3.

W
hich

of the following is an example of a technology using a physical ring topology?

b. FDDI

4.

W
hich

technology is likely to be implemented as a point
-
to
-
point physical topology?

d. Wireless bridge

5.

W
hich

of the following describes a hub
-
based Ethernet network?

b.

Logical bus

6.

W
hich

of the following is a characteristic of a logical ring topology? (Choose all that apply.)

b. One technology uses an MAU.

c. It’s used by FDDI.

d. Some technologies use a token.

7.

W
hich

best describes a typical wireless LAN?

c. Logical bus
topology

8.

W
hich

of the following is a characteristic of a switched logical topology? (Choose all that apply.)

b. Creates dynamic connections

d. Uses a physical star topology

9.

W
hich

of the following is a characteristic of unshielded twisted
-
pair cabling? (Cho
ose all that apply.)

c. Has a distance limitation of 100 meters

d. Susceptible to electrical interference

10.

W
hich

of the following is a characteristic of fiber
-
optic cabling? (Choose all that apply.)

a. Can be used in electrically noisy environments


c. Carr
ies data over longer distances than UTP does

11.

W
hich

topology most likely uses coaxial cabling?

c. Physical bus

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


12.

W
hich

of the following is true of a MAC address?

c. A destination address of 12 hexadecimal Fs is a broadcast.

13.

W
hich

of the following is the most
commonly used Ethernet frame type?

a. Ethernet II

14.

W
hich

of the following is a field of the most common Ethernet frame type? (Choose all that apply.)

b. FCS

c. Destination MAC Address

d. Data

15.

W
hich

access method uses a “listen before sending” strategy?

b.
CSMA/CD

16.

W
hich

of the following is true about full
-
duplex Ethernet? (Choose all that apply.)

b. Collision detection is turned off.

c. It’s possible only with switches.

17.

Which of the following is defined by the extent to which signals in an Ethernet bus topol
ogy network are
propagated?

b. Collision domain

18.

W
hich

of the following is considered a property of Ethernet? (Choose all that apply.)

a. Scalable


b. Best
-
effort delivery system

19.

W
hich

of the following is true of IEEE 802.3an?

d. Operates only in
full
-
duplex mode

20.

W
hich

of the following is a feature of 100BaseFX? (Choose all that apply.)

a. Often used as backbone cabling

d. Uses two strands of fiber

21.

W
hich

Wi
-
Fi standard can provide the highest bandwidth?

c. 802.11n

22.

Which of the following is true abo
ut infrastructure mode in wireless networks? (Choose all that apply.)

b. Uses a central device

d. Most like a logical bus and physical star

23.

How many channels can be used on an 802.11b network in North America?

c. 11

24.

W
hich

media access method does Wi
-
Fi use
?

d. CSMA/CA

25.

Which of the following is true about the token ring technology? (Choose all that apply.)

b. All computers have equal access to the media.


d. Only the computer with the token can transmit data.

Chapter 4 Solutions
-

R
EVIEW
Q
UESTIONS

1.

Which of
the following is a common characteristic of a networking medium? (Choose all that apply.)

a. Bandwidth rating


b. Interference susceptibility

d. Maximum segment length

2.

Which of the following types of fiber
-
optic connectors provides high density and
requires only one connector
for two cables?

c. MT
-
RJ

3.

Which of the following conditions requires cables not to exceed a recommended maximum length?

d. Attenuation

4.

W
hich

of the following is the process for representing bit signals on the medium?

b. Encoding

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


5.

What
happens to signals as they travel the length of the medi
um?

c. They attenuate.

6.

W
hich

of the following is UTP susceptible to? (Choose all that apply.)

a. EMI

b. Crosstalk

7.

The space between a false ceiling and the true ceiling where heating and cooling
air circulates is called the
______________.

d. Plenum

8.

What type of connector is used most commonly with TP network wiring?

b. RJ
-
45

9.

9
.

You have been hired to install a network at a large government agency that wants to reduce the likelihood
of electronic
eavesdropping on its network. What type of cable is most resistant to eavesdropping?

d. Fiber optic

10.

W
hich

of the following is a characteristic of unshielded twisted
-
pair cable? (Choose all that apply.)

c. Has a distance limitation of 100 meters

d. Is susce
ptible to electrical interference

11.

W
hich

of the following is a characteristic of fiber
-
optic cabling? (Choose all that apply.)

a. Can be used in electrically noisy environments


c. Carries data over longer distances than UTP

12.

You’re preparing to install a conventional Ethernet network in your new office building, but your boss tells you
to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install? (Choose
all that apply.)

b. Fiber optic


d. Cat 6

13.

When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the
other wire. What is this phenomenon called?

d. Crosstalk

14.

What characteristic of twisted
-
pair cabling helps mitigate the effects of cr
osstalk?

a. Differential signals

15.

What is the wireless device used to link buildings without cable?

d. Bridge

16.

Which of the following is a wiring standard for twisted
-
pair cable connections? (Choose all that apply.)

b. TIA/EIA 568A

d. TIA/EIA 568B

17.

W
hich

of the following is a component of a structured cabling system? (Choose all that apply.)

a. Patch cables

d. Horizontal wiring

18.

Where are you most likely to find vertical cabling? (Choose all that apply.)

a. Equipment rooms


c. Connecting TCs

19.

W
hich

of the f
ollowing is a tool needed to make a patch cable? (Choose all that apply.)

b. Cable stripper


c. Crimping tool

20.

W
hich

type of connection is most likely to require a crossover cable?

d. PC to router

21.

W
hich

UTP limitations can be solved by fiber
-
optic cable? (C
hoose all that apply.)

a. Bandwidth


b. EMI susceptibility

d. Segment length

22.

How many strands of fiber
-
optic cable are needed for a network connection?

b. 2

Guide to Networking Essentials
, 6th ed., ISBN 1111312524


23.

W
hich

statement is true about fiber
-
optic cables?

b. SMF uses lasers and has a thinner core.

24.

W
hich

type of wireless network requires a clear line of sight between transmitter and receiver? (Choose all that
apply.)

a. Infrared


d. Terrestrial microwave

25.

Which of the following wireless technologies does a 802.11 wireless network using the 2.4 GHz frequenc
y
range use?

d. Direct
-
sequence spread spectrum