1.
A ___________ is basically all of the components, hardware and software, involved in connecting
computers across small and large distances.
Correct Answer
C. Network
Explanation
A network refers to the collection of components, both hardware and software, that are used to connect computers over small or large distances. This includes devices such as routers, switches, cables, and protocols that enable communication between computers. A network can be a local area network (LAN) within a small area, a wide area network (WAN) that spans across larger distances, or even a storage area network (SAN) that is specifically designed for data storage and retrieval.
2.
_________ describe(s) users that can connect to a network from any location.
Correct Answer
C. Mobile users
Explanation
Mobile users are the correct answer because they are able to connect to a network from any location. This term refers to individuals who are not restricted to a specific physical location and can access the network using mobile devices such as smartphones, tablets, or laptops. They can connect to the internet and access resources or services regardless of their location, making them highly flexible and adaptable in terms of network connectivity.
3.
___________ has both physical and logical ring topologies.
Correct Answer
B. FDDI
Explanation
FDDI (Fiber Distributed Data Interface) is the correct answer because it is a networking technology that supports both physical and logical ring topologies. FDDI uses fiber optic cables to create a high-speed network with a ring structure, allowing data to flow in both directions. It also utilizes a token passing protocol to control access to the network, ensuring fair and efficient data transmission. Ethernet, on the other hand, is typically based on a bus or star topology, while Token Ring is a purely logical ring topology.
4.
Ethernet ___________ has/have both a physical and logical bus topology.
Correct Answer
B. 10Base2 and 10Base5
Explanation
Ethernet 10Base2 and 10Base5 have both a physical and logical bus topology. This means that the physical layout of the network resembles a bus, with all devices connected to a single cable. Additionally, the logical topology is also a bus, as data is transmitted in a linear fashion along the cable. Both 10Base2 and 10Base5 use coaxial cables to connect devices in a bus configuration, allowing for multiple devices to share the same cable.
5.
A ________ topology describes how devices communicate with each other.
Correct Answer
B. Logical
Explanation
A logical topology describes how devices communicate with each other. Unlike a physical topology, which focuses on the physical layout and connections of devices, a logical topology defines the flow of data between devices and the logical paths that data takes. It determines how devices are logically connected and how they exchange information, regardless of their physical location or connection type.
6.
_________ has a physical star topology but a logical ring topology.
Correct Answer
C. Token Ring
Explanation
Token Ring is a networking technology that uses a physical star topology, where each device is connected to a central hub or switch. However, it implements a logical ring topology, where data is transmitted in a circular manner from one device to the next until it reaches its destination. This is achieved through the use of a token passing mechanism, where a special token is passed from one device to another to control access to the network.
7.
A _________ is used to connect networking devices that are in a very close geographic area, such
as a floor of a building, a building itself, or a campus environment
Correct Answer
B. LAN
Explanation
A LAN (Local Area Network) is used to connect networking devices that are in a very close geographic area, such as a floor of a building, a building itself, or a campus environment. LANs are typically used in small to medium-sized networks and provide high-speed connections for computers and other devices within the same area. They allow for the sharing of resources such as files, printers, and internet connections among connected devices.
8.
A _________ uses Gigabit Ethernet as a media type
Correct Answer
D. LAN and MAN
Explanation
A LAN (Local Area Network) and MAN (Metropolitan Area Network) both use Gigabit Ethernet as a media type. Gigabit Ethernet is a high-speed networking technology that allows for data transmission at a rate of 1 gigabit per second. LANs are typically used within a small geographical area, such as an office building or campus, while MANs cover a larger area, such as a city or metropolitan area. Both types of networks require fast and reliable communication, making Gigabit Ethernet an ideal choice for their media type.
9.
A _________ provides a high-speed infrastructure to move data between storage devices and file
servers
Correct Answer
A. SAN
Explanation
A Storage Area Network (SAN) is a specialized network that provides a high-speed infrastructure to move data between storage devices and file servers. It allows multiple servers to access and share storage resources, enabling efficient data transfer and storage management. A SAN is designed to handle large amounts of data and provide high-speed connectivity, making it an ideal solution for organizations that require fast and reliable data storage and retrieval. A Local Area Network (LAN) and a Campus Network (CN) are not specifically designed for storage purposes and may not offer the same level of performance and scalability as a SAN.
10.
Which of the following is a disadvantage of SANs?
Correct Answer
B. Cost
Explanation
The correct answer is Cost. SANs (Storage Area Networks) can be expensive to implement and maintain. They require specialized hardware and software, as well as skilled personnel to manage and troubleshoot them. The initial setup costs, including the purchase of storage devices, switches, and other infrastructure, can be high. Additionally, ongoing maintenance and upgrades can also add to the overall cost of SANs. Therefore, cost is a significant disadvantage of SANs.
11.
A _________ looks at OSI Reference Model layers 4–7 to make intelligent decisions about how to obtain information for a user.
Correct Answer
C. CN
Explanation
A CN (Content Network) looks at OSI Reference Model layers 4-7 to make intelligent decisions about how to obtain information for a user.
12.
Which of the following standards or protocols are used by the session layer?
Correct Answer
B. NFS
Explanation
NFS (Network File System) is a protocol used by the session layer. It allows a user on a client computer to access files over a network as if they were located on the local computer. NFS provides a transparent and efficient way for remote file sharing and access, making it a suitable choice for the session layer.
13.
The _________ layer provides for hardware addressing
Correct Answer
C. Data link
Explanation
The Data link layer provides for hardware addressing. This layer is responsible for the reliable transfer of data between nodes on a network. It adds a header to the data packet, including the source and destination MAC addresses, which are unique hardware addresses assigned to network devices. This addressing allows the data to be correctly delivered to the intended recipient at the physical layer.
14.
CSMA/CD stands for ________.
Correct Answer
B. Carrier Sense Multiple Access/Collision Detection
Explanation
CSMA/CD stands for Carrier Sense Multiple Access/Collision Detection. This is a networking protocol used in Ethernet networks to control access to the network medium. "Carrier Sense" refers to the process of checking if the network medium is currently in use before transmitting data. "Multiple Access" means that multiple devices can access the network at the same time. "Collision Detection" is the mechanism used to detect and resolve collisions that occur when two or more devices transmit data simultaneously.
15.
MAC addresses are _________ bits in length and are represented in a ___________ format.
Correct Answer
48
hexadecimal
Explanation
MAC addresses are 48 bits in length and are represented in a hexadecimal format. The 48-bit length of MAC addresses allows for a large number of unique addresses to be assigned to network devices. The hexadecimal format is used to represent the MAC address because it is a base-16 number system that uses digits 0-9 and letters A-F. This format provides a concise and easily readable representation of the MAC address.
16.
Ethernet ________ uses a type field.
Correct Answer
A. II
Explanation
Ethernet II uses a type field. The Ethernet II frame format is the most commonly used Ethernet frame format and includes a type field that specifies the protocol being used in the data section of the frame. This allows the receiver to correctly interpret and process the data. The other options, 802.3 and 802.2, are different Ethernet frame formats that do not use a type field.
17.
Which component of the data link layer for IEEE specifies network protocols?
Correct Answer
A. LLC
Explanation
The LLC (Logical Link Control) component of the data link layer for IEEE specifies network protocols. It provides services such as flow control, error control, and addressing. LLC is responsible for managing communication between the network layer and the MAC (Media Access Control) sublayer. It ensures that data is properly transmitted and received, and handles the organization and synchronization of data frames.
18.
The network layer solves all of the following problems except ___________.
Correct Answer
C. Hierarchy through the use of pHysical addresses
Explanation
The network layer is responsible for routing packets across different networks, ensuring that they reach their intended destination. It addresses broadcast problems by using techniques like IP multicast to efficiently send data to multiple recipients. It also handles conversion between media types by encapsulating data from higher layers into packets that can be transmitted over different types of physical media. Additionally, it deals with collision problems through protocols like Ethernet that implement collision detection and avoidance mechanisms. However, the network layer does not solve the problem of hierarchy through the use of physical addresses. This is typically addressed at higher layers of the network stack, such as the application or transport layer.
19.
Reliable connections go through a three-way handshake. Place the following in the correct order:
ACK (1), SYN, (2), SYN/ACK (3).
Correct Answer
C. 2, 3, 1
Explanation
The correct order for the three-way handshake is 2, 3, 1. The first step is the SYN packet, which is sent by the client to the server to initiate the connection. The server then responds with the SYN/ACK packet, indicating that it has received the request and is willing to establish a connection. Finally, the client sends an ACK packet to acknowledge the server's response and complete the handshake process.
20.
Connection multiplexing is done through the use of a ________ number.
Correct Answer
A. Socket
Explanation
Connection multiplexing is done through the use of a socket number. A socket is a software endpoint that enables communication between two computers over a network. It allows multiple connections to be established and managed simultaneously, enabling connection multiplexing. By assigning a unique socket number to each connection, the system can distinguish between different connections and route data packets accordingly. Therefore, using a socket number is essential for connection multiplexing.