4
NETWORK + GUIDE TO NETWORKS CHAPTER REVIEW QUESTIONS Chapter One 1. Which of the following distinguishes peer-to-peer networks from client/server networks? D. In peer-to-peer networks, no single computer has more authority than another, by default. 2. Which of the following is an advantage of using a peer-to-peer network over using a client/server network? C. A peer-to-peer network is easier to set up. 3. Which of the following is an advantage of using a client/server network over using a peer-to-peer network? B. A client/server network allows for easier expansion. 4. The first services widely used by networks were: D. File and print services 5. Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software? B. Desktop operating system software 6. What is the primary function of a file server on a network? D. It manages access and use of shared applications and data. 7. On most LANs, a computer acting as a server differs from a computer acting as a client in which of the following ways? (Choose two answers) D. The server would run a different operating system than the client. E. The server would possess greater processing power than the client. 8. In which of the following environments would a MAN be most appropriate? A. A corporate headquarters connecting its five building across a small building across s small campus. 9. Which of the following describes the combination of voice(such as telephone),video, and data signals sent over the same network? D. Convergence

NETWORK Guide to Network_Review_Chapters 1-2

Embed Size (px)

DESCRIPTION

End of chapter review question answers for CH 1-2

Citation preview

Page 1: NETWORK Guide to Network_Review_Chapters 1-2

NETWORK + GUIDE TO NETWORKS CHAPTER REVIEW QUESTIONS

Chapter One1. Which of the following distinguishes peer-to-peer networks from client/server networks?

D. In peer-to-peer networks, no single computer has more authority than another, by default.2. Which of the following is an advantage of using a peer-to-peer network over using a

client/server network?C. A peer-to-peer network is easier to set up.

3. Which of the following is an advantage of using a client/server network over using a peer-to-peer network?B. A client/server network allows for easier expansion.

4. The first services widely used by networks were:D. File and print services

5. Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software?B. Desktop operating system software

6. What is the primary function of a file server on a network?D. It manages access and use of shared applications and data.

7. On most LANs, a computer acting as a server differs from a computer acting as a client in which of the following ways? (Choose two answers)D. The server would run a different operating system than the client.E. The server would possess greater processing power than the client.

8. In which of the following environments would a MAN be most appropriate?A. A corporate headquarters connecting its five building across a small building across s small

campus.9. Which of the following describes the combination of voice(such as telephone),video, and data

signals sent over the same network?D. Convergence

10. What is the term used to describe a discrete unit of fata that is sent from one node to another over the network?B. A packet

11. How can a server tell the difference between many clients on a network?C. Each is identified by a unique network address.

12. What device connects a client computer to a network’s medium, such as a wire?A. Network interface card

13. Which of the following is a function of a network protocol?C. To ensure that data arrives at its destination in the proper sequence.

14. The physical layout of nodes on a network is known as the network’s:

Page 2: NETWORK Guide to Network_Review_Chapters 1-2

B. Topology15. Which of the following is an example of a mail service?

A. Exchanging messages between mail servers on different networks16. Which of the following network topologies is most common on today’s networks?

B. Star

17. Which of the following is an example of a network management service?A. Establishing permissions for users and groups of users to access certain applications on the

server18. Security is s concern when using remote access servers on a network because:

A. Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world.

19. Distributing data transfer activity equally over several devices or components belongs to which category of network management services?A. Load balancing

20. What organization sponsors the CCNA and CCIE certifications?B. CompTIA

Chapter TWO1. Which ofnthe following standards organizations has established guidleines for installing network

cables in commercial buildings?C. ANSI

2. Which technology does the IEEE 802.3 specification describe?B. Ethernet LANs

3. Which of the following IEEE specifications pertains to wireless networking?C. 802.11

4. Which layer of the OSI model is responsible for issuing acknowledgments (ACKs)?D. Transport Layer

5. Which OSI model layer is responsible for keeping open a communications path between your computer and the server when you dial in to a remote access server?D .Session Layer

6. Suppose your network is connected to another network via a router. Which OSI model layer provides the information necessary to direct data between the two networks?A. Network Layer

7. In which two layers of the OSI model do NICs belongs?D. Physical and Data Link Layers

8. Which standards organization developed the OSI model?A. ISO

9. Under what circumstances would the Transport layer use segmentation?

Page 3: NETWORK Guide to Network_Review_Chapters 1-2

C. When the destination node cannot accept the size of the data blocks transmitted by the source node.

10. Which OSI model layer generates and detects voltages so as to transmit and receive signals data?A. Physical Layer

11. What type of address follows a hierarchical format?C. Network addresses.

12. If the TCP protocol did not receive an acknowledgement for data it transmitted, what would it do?B. Retransmits the data to the recipient.

13. You have just installed a new NIC in your computer and see the following stamped on it: 000a5e1a8da2. This unique identifier is an example of what kind of address?B. MAC address

14. Which part of a MAC address is unique to each manufacturer?B. The block ID

15. What is the purpose of the trailer field added to a frame in the Data Link layer?A. To mark the end of a frame.

16. What are the sublayers of the Data Link layer as defined in the IEEE 802 standards?A. Logical Link Control sublayer and Media Access Control sublayer.

17. Which layer of the OSI model encapsulates Network layer packets?C. Data Link layer

18. Suppose that, at the receiving node, a frame’s FCS doesn’t match the FCD it was issued at the transmitting node. What happens as a result?B. The receiving node’s Data Link layer requests a retransmission.

19. In which of the following situations would it be most desirable to use a connectionless Transport layer protocol?C. When viewing a movie clip on the Web.

20. Which of the following would be found in a Data Link layer header?D. The source’s physical address

Chapter Three1. What is different about the method used to boost a digital signal’s strength, compared with the

method of boosting an analog signal’s strength?