26
CHAPTER 12: BEHIND THE SCENES: NETWORKING AND SECURITY Multiple Choice: 1. Which of the following is NOT an advantage of using networks compared to a stand-alone computer? A. ease of maintenance and administration B. enhanced resource sharing C. increased productivity D. increased communication capabilities Answer: A Reference: Networking Advantages Difficulty: Easy 2. ____________ networks may experience significant slowdowns if more than ten (10) users are on the network. A. Wide area B. Peer-to-peer C. Server-based D. Metropolitan area Answer: B Reference: Client/Server Networks Difficulty: Moderate 3. All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT: A. P2P networks do not require servers. B. security cannot be implemented centrally on P2P networks. C. each computer must be updated individually in P2P networks. D. P2P networks are decentralized and not easily scalable. Copyright © 2008 Prentice-Hall. All rights reserved. 1

Test Netw Ch1

Embed Size (px)

DESCRIPTION

net

Citation preview

Page 1: Test Netw Ch1

CHAPTER 12:BEHIND THE SCENES: NETWORKING AND SECURITY

Multiple Choice:

1. Which of the following is NOT an advantage of using networks compared to a stand-alone computer?

A. ease of maintenance and administration

B. enhanced resource sharing

C. increased productivity

D. increased communication capabilities

Answer: A Reference: Networking Advantages Difficulty: Easy

2. ____________ networks may experience significant slowdowns if more than ten (10) users are on the network.

A. Wide area

B. Peer-to-peer

C. Server-based

D. Metropolitan area

Answer: B Reference: Client/Server Networks Difficulty: Moderate

3. All of the following statements are DISADVANTAGES of peer-to-peer networks EXCEPT:

A. P2P networks do not require servers.

B. security cannot be implemented centrally on P2P networks.

C. each computer must be updated individually in P2P networks.

D. P2P networks are decentralized and not easily scalable.

Answer: A Reference: Client/Server Networks Difficulty: Easy

Copyright © 2008 Prentice-Hall. All rights reserved. 1

Page 2: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

4. Individual users must take responsibility for data backups and security on a peer-to-peer network because this kind of network is considered:

A. scalable.

B. centralized.

C. decentralized.

D. dedicated.

Answer: C Reference: Client/Server Networks Difficulty: Moderate

5. The ability to easily add additional users means that a network is:

A. scalable.

B. dedicated.

C. decentralized.

D. secure.

Answer: A Reference: Client/Server Networks Difficulty: Moderate

6. In a client/server network, all clients are connected to a server that performs tasks for them, such as backup and security; therefore, it is known as a ____________ network.

A. local area

B. dedicated

C. decentralized

D. centralized

Answer: D Reference: Client/Server Networks Difficulty: Easy

7. A(n) ____________ is a small group of computers and peripherals linked together in a small geographic area.

A. LAN

B. PAN

C. CAN

D. MAN

Answer: A Reference: Classifications of Client/Server Networks: LANs… Difficulty: Easy

Copyright © 2008 Prentice-Hall. All rights reserved. 2

Page 3: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

8. The Internet is most accurately categorized as a:

A. LAN.

B. PAN.

C. WAN.

D. MAN.

Answer: C Reference: Classifications of Client/Server Networks: LANS… Difficulty: Easy

9. PANs are used to connect ____________ devices (such as Bluetooth-enabled devices) in close proximity to each other.

A. peripheral

B. wireless

C. dedicated

D. client

Answer: B Reference: Classifications of Client/Server Networks: LANs… Difficulty: Easy

10. A(n) ____________ is a private corporate network, used exclusively by company employees.

A. Internet

B. local area network

C. peer-to-peer

D. intranet

Answer: D Reference: Constructing Client/Server Networks Difficulty: Moderate

11. ____________ is specialized software that runs on a server computer to control network functionality.

A. NOS software

B. NCP software

C. TCP software

D. MAC software

Answer: A Reference: Constructing Client/Server Networks Difficulty: Easy

Copyright © 2008 Prentice-Hall. All rights reserved. 3

Page 4: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

12. The layout and structure of the network is known as the network’s:

A. NOS.

B. topology.

C. components.

D. protocol.

Answer: B Reference: Constructing Client/Server Networks Difficulty: Easy

13. Cable and wireless communication technologies are types of:

A. network adapters.

B. topologies.

C. transmission media.

D. network operating systems.

Answer: C Reference: Constructing Client/Server Networks Difficulty: Moderate

14. Network navigation devices include all of the following EXCEPT:

A. servers.

B. routers.

C. switches.

D. hubs.

Answer: A Reference: Constructing Client/Server Networks Difficulty: Easy

15. ____________ servers store and manage files for network users.

A. File

B. Web

C. Authentication

D. Main

Answer: A Reference: Constructing Client/Server Networks Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 4

Page 5: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

16. A(n) ____________ server keeps track of users logging onto the network and the services available to the users.

A. file

B. authentication

C. Web

D. e-mail

Answer: B Reference: Servers Difficulty: Easy

17. ____________ servers are used to fulfill one specific function, such as handling e-mail.

A. Dedicated

B. Network

C. Protocol

D. Peer-to-peer

Answer: A Reference: Servers Difficulty: Moderate

18. ____________ servers are used to manage all client-requested printing jobs for all printers.

A. Database

B. Network

C. Print

D. E-mail

Answer: C Reference: Print Servers Difficulty: Easy

19. A(n) ____________ server, on a network, delivers the software to the clients because the software does not reside on the client computers.

A. Web

B. application

C. communications

D. database

Answer: B Reference: Application Servers Difficulty: Easy

Copyright © 2008 Prentice-Hall. All rights reserved. 5

Page 6: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

20. The ____________ server, on a network, is the single point of contact with the outside world and is often the only device connected to the Internet.

A. intranet

B. database

C. application

D. communications

Answer: D Reference: Communications Servers Difficulty: Challenging

21. In a(n) ____________ topology, all computers are connected in sequence, using a single cable.

A. bus

B. star

C. hybrid

D. ring

Answer: A Reference: Bus Topology Difficulty: Moderate

22. In a bus topology, a ____________, located at each end of the network, absorbs the signal to prevent it from being reflected back onto the cable.

A. node

B. terminator

C. packet

D. network device

Answer: B Reference: Bus Topology Difficulty: Easy

23. In a bus topology, the nodes do nothing to move the data along the network, making it a(n) ____________ topology.

A. client/server

B. active

C. passive

D. terminated

Answer: C Reference: Bus Topology Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 6

Page 7: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

24. Active topologies differ from passive topologies in that nodes on the active topology network:

A. help pass the data along the network.

B. listen for signals on the line before transmitting.

C. ultimately send their messages to a terminator.

D. actively search for packets intended for themselves.

Answer: A Reference: Ring Topology Difficulty: Challenging

25. When two computers send data at the same time on a bus network it is called a(n):

A. access method.

B. data collision.

C. active topology.

D. data termination.

Answer: B Reference: Bus Topology Difficulty: Moderate

26. In a ring topology, the computer in possession of the ____________can transmit data.

A. packet

B. data

C. access method

D. token

Answer: D Reference: Ring Topology Difficulty: Moderate

27. Because each node on the network is responsible for retransmitting the token and the data to the next node, the ____________ topology is considered an active topology.

A. ring

B. bus

C. star

D. hybrid

Answer: A Reference: Ring Topology Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 7

Page 8: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

28. Which of the following statements about ring topology networks is TRUE?

A. A ring topology network is plagued with data collisions.

B. A ring topology network uses the CSMA/CD access method to transmit data.

C. A ring topology network allows only one node to transmit data at a time.

D. A ring topology network is considered passive.

Answer: C Reference: Ring Topology Difficulty: Moderate

29. In the star topology, the central point of failure is the:

A. client.

B. switch.

C. terminator.

D. access point.

Answer: B Reference: Star Topology Difficulty: Challenging

30. Which of the following statements, concerning star topology networks, is FALSE?

A. Star topology networks use the CSMA/CD access method.

B. If one computer fails, it does not affect the rest of the network.

C. There are no data collisions on a star topology network.

D. If the switch fails, the network no longer functions.

Answer: C Reference: Star Topology Difficulty: Challenging

31. When a collision occurs on an Ethernet network, the node that detects the collision sends a(n):

A. token.

B. packet.

C. jam signal.

D. warning.

Answer: C Reference: Star Topology Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 8

Page 9: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

32. On an Ethernet network, after a collision occurs between two computers and a jam signal is sent, what happens next?

A. The signals are encrypted to avoid a second collision.

B. A token is resent by the two computers that caused the collision.

C. The two computers wait random amounts of time, and then resend their signals.

D. The switch notifies the network of the collision.

Answer: C Reference: Star Topology Difficulty: Challenging

33. Which of the following statements is FALSE concerning bandwidth?

A. Bandwidth defines the speed at which the data flows on the network.

B. Cable is rated by the maximum amount of bandwidth it supports.

C. Bandwidth is the amount of data transmitted across the transmission medium in a certain amount of time.

D. Bandwidth is measured in bits per second (bps).

Answer: A Reference: Transmission Media Difficulty: Easy

34. ____________ defines whether the transmission media uses electrical impulses or pulses of light to transmit data.

A. Bandwidth

B. Susceptibility to interference

C. Signal transmission method

D. Access method

Answer: C Reference: Wired Transmission Media Difficulty: Challenging

35. EMI and RFI are types of:

A. signal interference.

B. bandwidth measurements.

C. twisted pair cable.

D. wireless transmission media.

Answer: A Reference: Wired Transmission Media Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 9

Page 10: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

36. All of the following statements concerning twisted pair cable are true EXCEPT:

A. Twisted pair uses pulses of light to send data.

B. The number of twists in twisted pair is significant because it makes the wires less susceptible to interference.

C. UTP is not recommended in areas with significant sources of interference.

D. The two most common types of UTP in use today are Cat 5e and Cat 6.

Answer: A Reference: Twisted Pair Cable Difficulty: Moderate

37. UTP and STP are examples of:

A. CATV cable.

B. thicknet coaxial cable.

C. fiber-optic cable.

D. twisted pair cable.

Answer: D Reference: Twisted Pair Cable Difficulty: Easy

38. The core of a coaxial cable is usually made from:

A. magnesium oxide.

B. copper.

C. silicon.

D. glass fibers.

Answer: B Reference: Coaxial Cable Difficulty: Easy

39. All of the following statements regarding fiber-optic cable are true EXCEPT:

A. the core of fiber-optic cable is composed of copper.

B. fiber-optic cable uses pulses of light to transmit data.

C. data passes through fiber-optic cable in one direction only.

D. the outer jacket of fiber-optic cables is often made of Kevlar.

Answer: A Reference: Fiber-Optic Cable Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 10

Page 11: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

40. The wired medium least susceptible to signal interference is:

A. STP cable.

B. coaxial cable.

C. fiber-optic cable.

D. UTP cable.

Answer: C Reference: Fiber-Optic Cable Difficulty: Moderate

41. ____________ wireless devices have largely been replaced with faster technology.

A. 802.11b

B. 802.11g

C. 802.11n

D. 802.11a

Answer: A Reference: Wireless Media Options Difficulty: Moderate

42. All of the following protocols are proprietary EXCEPT:

A. TCP/IP.

B. IPX.

C. NetBEUI.

D. AFP.

Answer: A Reference: Network Operating Systems Difficulty: Easy

43. The major network operating systems for installation on the server, in a client/server environment, include all of the following EXCEPT:

A. Windows Server 2003.

B. UNIX.

C. Windows XP.

D. Novell NetWare.

Answer: C Reference: Network Operating Systems Difficulty: Easy

Copyright © 2008 Prentice-Hall. All rights reserved. 11

Page 12: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

44. The OSI model is divided into ____________ processes called layers.

A. five

B. six

C. seven

D. eight

Answer: C Reference: Dig Deeper: The OSI Model Difficulty: Easy

45. In the OSI model, the ____________ layer handles data encryption and compression.

A. application

B. presentation

C. data link

D. session

Answer: B Reference: Dig Deeper: The OSI Model Difficulty: Challenging

46. In the OSI model, the ____________ layer is responsible for assembling the data packets into frames.

A. session

B. transport

C. data link

D. network

Answer: C Reference: Dig Deeper: The OSI Model Difficulty: Challenging

47. The device that acts as an interface to connect with and communicate on a network is known as the:

A. network adapter.

B. hub.

C. repeater.

D. switch.

Answer: A Reference: Network Adapters Difficulty: Easy

Copyright © 2008 Prentice-Hall. All rights reserved. 12

Page 13: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

48. Which of the following statements concerning MAC addresses is TRUE?

A. A MAC address is used to externally identify a computer on a network.

B. The MAC address and the IP address can be used interchangeably.

C. A MAC address must match the IP address.

D. The first three numbers in the address identify the manufacturer.

Answer: D Reference: MAC Addresses Difficulty: Challenging

49. If a network requires a cable to connect two devices farther apart than the normal maximum run length of the media, the way to prevent signal degradation is to install a(n):

A. adapter.

B. repeater.

C. bridge.

D. switch.

Answer: B Reference: Repeaters and Hubs Difficulty: Moderate

50. Another name for a “smart” hub is a:

A. bridge.

B. repeater.

C. firewall.

D. switch.

Answer: D Reference: Switches and Bridges Difficulty: Moderate

Fill in the Blank:

51. ____________ are designed to send information between two networks.

Answer: Routers Reference: Routers Difficulty: Easy

52. The special communications software, installed on a computer to enable the network adapter to communicate with the operating system is called the ____________.

Answer: device driver Reference: Network Adapters Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 13

Page 14: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

53. Entering a user ID and password is known as ____________.

Answer: authentication Reference: Authentication Difficulty: Easy

54. The acronym NOS stands for ____________.

Answer: Network Operating System Reference: Network Operating Systems Difficulty: Easy

55. NetBEUI, AFP, and IPX are known as ____________ protocols, which means that they do not work with another vendor’s NOS.

Answer: proprietary Reference: Network Operating Systems Difficulty: Challenging

56. The ____________ identifies a computer internally on the network.

Answer: MAC address Reference: MAC Addresses Difficulty: Moderate

57. In the OSI model, the ____________ layer converts the data into signals for transmission over the network.

Answer: physical Reference: Dig Deeper: The OSI Model Difficulty: Challenging

58. Combining multiple topologies into one network is known as a(n) ____________ network.

Answer: hybrid Reference: Comparing Topologies Difficulty: Easy

59. CSMA/CD is the access method used on ____________ networks.

Answer: Ethernet Reference: Star Topology Difficulty: Challenging

60. The ____________ passing method is used on a ring topology to avoid collisions.

Answer: token Reference: Ring Topology Difficulty: Moderate

61. ____________ is the amount of data that can be transmitted over transmission media in a certain amount of time.

Answer: Bandwidth Reference: Wired Transmission Media Difficulty: Challenging

62. A(n) ____________ is a set of rules for exchanging communication.

Answer: protocol Reference: Star Topology Difficulty: Easy

63. ____________ cable is composed of a glass or plastic fiber (or bundle of fibers) as its core.

Answer: Fiber-optic Reference: Fiber-Optic Cable Difficulty: Easy

64. ____________ networks do not need specialized network operating system software.

Answer: Peer-to-peer Reference: Network Operating Systems Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 14

Page 15: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

65. The 802.11 wireless standard is also known as ____________.

Answer: Wi-Fi Reference: Wireless Media Options Difficulty: Easy

66. In wireless networks, wireless NICs connect to ____________, which provide wireless devices with a sending and receiving connection to the network.

Answer: wireless access points Reference: Network Adapters Difficulty: Moderate

67. ____________ are containers that hold multiple data packets.

Answer: Frames Reference: MAC Addresses Difficulty: Challenging

68. The acronym MAC, as in MAC address, stands for ____________.

Answer: Media Access Control Reference: MAC Addresses Difficulty: Moderate

69. A(n) ____________ sends data only to the intended recipient as opposed to a hub, which sends the data to all devices connected to it.

Answer: switch Reference: Switches and Bridges Difficulty: Moderate

70. ____________ are devices used to send data between different segments (collision domains) on a network.

Answer: Bridges Reference: Switches and Bridges Difficulty: Easy

71. ____________ amplify a signal and retransmit it to extend cable runs beyond the maximum run length.

Answer: Repeaters Reference: Repeaters and Hubs Difficulty: Moderate

72. ____________ is the open protocol used by the Internet.

Answer: TCP/IP Reference: Network Operating Systems Difficulty: Challenging

73. EMI and RFI are types of ____________.

Answer: interference Reference: Wired Transmission Media Difficulty: Easy

74. The term packet screening refers to the examination of incoming data packets by the ____________to ensure that they originate or are authorized by valid users on the internal network.

Answer: firewall Reference: Firewalls Difficulty: Moderate

75. ____________ use IP addresses to send information between two networks.

Answer: Routers Reference: Routers Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 15

Page 16: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

True and False:

76. In a ring topology, if one computer fails it can bring the entire network to a halt.

Answer: True Reference: Ring Topology Difficulty: Easy

77. An application server acts as a go-between for computers on an internal network and the external network (Internet).

Answer: False (proxy) Reference: Firewalls Difficulty: Moderate

78. The hub is responsible for breaking down data into packets and preparing the packets for transmission across the network.

Answer: False (network adapter or NIC) Reference: Network Adapters Difficulty: Easy

79. In the OSI model, the session layer sets up and manages the virtual (not physical) connection between the sending and receiving devices.

Answer: True Reference: Dig Deeper: The OSI Model Difficulty: Challenging

80. Twisted pair cable has the lowest susceptibility to interference.

Answer: False (highest) Reference: Figure 12.14: Comparison of Characteristics… Difficulty: Moderate

81. Throughput is another name for bandwidth.

Answer: True Reference: Wired Transmission Media Difficulty: Easy

82. Crosstalk interference is the tendency of signals on one twisted pair wire to interfere with signals on a wire next to it.

Answer: True Reference: Twisted Pair Cable Difficulty: Easy

83. The ring topology is the most widely deployed client/server topology in businesses today.

Answer: False (star) Reference: Star Topology Difficulty: Moderate

84. Token passing and CSMA/CD are methods of avoiding data collisions.

Answer: True Reference: Network Topologies Difficulty: Easy

85. A bus topology provides a fairer allocation of resources than a ring topology by giving all the nodes on the network an equal opportunity to send data.

Answer: False Reference: Ring Topology Difficulty: Challenging

86. MAC addresses enable computers on one network to communicate with computers on another network.

Answer: False (IP addresses) Reference: MAC Addresses Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 16

Page 17: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

87. Bridges are relatively simple devices whose sole purpose is to amplify a signal and retransmit it.

Answer: False (Repeaters) Reference: Repeaters and Hubs Difficulty: Challenging

88. In a star network, the failure of one computer affects the other computers on the network.

Answer: False Reference: Figure 12.10: Advantages and Disadvantages of Bus,… Difficulty: Easy

89. Hubs receive a signal from a device, reconstruct it, and transmit it to all the ports on the hub.

Answer: True Reference: Repeaters and Hubs Difficulty: Challenging

90. Authentication can be achieved through passwords, biometric access devices, and possessed objects.

Answer: True Reference: Authentication Difficulty: Easy

Matching:

91. Match the following acronyms to their descriptions:

I. MAC A. type of interference

II. CSMA/CD B. device address

III. OSI C. Ethernet access method

IV. EMI D. type of cable

V. UTP E. protocol standard

Answer: B, C, E, A, D Reference: Multiple locations in chapter Difficulty: Moderate

92. Match the following terms to their meanings:

I. frame A. packet granting transmission rights

II. bastion B. assemblage of packets

III. token C. a Novell protocol

IV. IPX D. host configured as proxy server

V. jam E. signal indicating data collisions

Answer: B, D, A, C, E Reference: Multiple locations in chapter Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 17

Page 18: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

93. Match the following devices to their functions:

I. repeater A. sends data to a specific device, not to all devices

II. hub B. transmits data between two different networks

III. switch C. device used for signal amplification and retransmission

IV. bridge D. multiport device used for signal amplification and broadcast

V. router E. connects collision domains of a network

Answer: C, D, A, E, B Reference: Multiple locations in chapter Difficulty: Challenging

94. Match the following terms to their meanings:

I. topology A. communication rules

II. proxy B. large size coaxial cable

III. intranet C. server controlling Internet access of network

IV. protocol D. private Web-based network

V. ThickNet E. layout of a network

Answer: E, C, D, A, B Reference: Multiple locations in chapter Difficulty: Moderate

95. Match the following acronyms to their descriptions:

I. TCP/IP A. proprietary communications protocol

II. IPX B. software controlling communications in a network

III. NOS C. network spanning a metropolitan area

IV. MAN D. type of network adapter

V. NIC E. open communications protocol

Answer: E, A, B, C, D Reference: Multiple locations in chapter Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 18

Page 19: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

96. Match the following OSI layers to their functions:

I. Session A. reformats, compresses, and encrypts data

II. Presentation B. sets up a virtual connection between sending and receiving devices andmanages

communication

III. Data Link C. determines where to send the data packets on the network

IV. Transport D. assembles the data packets into frames and delivers them to the physical layer

V. Network E. handles packet acknowledgment

Answer: B, A, D, E, C Reference: Dig Deeper: The OSI Model Difficulty: Challenging

97. Match the following terms to their meanings:

I. bandwidth A. entering a user ID and password

II. bend radius B. examining incoming data packets to ensure they originated from an authorized user

III. ThinNet C. degree of flexibility in a cable

IV. authentication D. a type of coaxial cable used for cable TV

V. packet screening E. amount of data that can be transmitted in a certain amount of time

Answer: E, C, D, A, B Reference: Multiple locations in chapter Difficulty: Moderate

98. Match the following terms to their meanings:

I. firewall A. a security measure, composed of hardware or software, to protect a network from attacks over the

Internet

II. terminator B. a device that absorbs the signal to prevent its reflection back onto the network

III. passive topology C. a special data packet on a ring topology

IV. access method D. nodes on a network do nothing to move data along the network

V. token E. controls how computers can use the transmission media

Answer: A, B, D, E, C Reference: Multiple locations in chapter Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 19

Page 20: Test Netw Ch1

Chapter 12: Behind the Scenes: Networking and Security

99. Match the following terms to their meanings:

I. active topology A. combining multiple topologies into one network

II. hybrid B. the routes data takes to flow between devices

III. transmission media C. each node on the network is responsible for retransmitting the signal

IV. device driver D. a chunk of data containing the address of the receiving computer

V. packet E. enables a device to communicate with the operating system

Answer: C, A, B, E, D Reference: Multiple locations in chapter Difficulty: Moderate

100. Match the following terms to their meanings:

I. crosstalk A. tendency of signals on one wire to interfere with signals on a wire next to it

II. CAT 6 B. can handle bandwidth of 1 Gbps

III. open protocol C. computers connected in sequence on a single cable

IV. centralized D. not associated with one particular vendor

V. bus E. characteristic of client/server networks

Answer: A, B, D, E, C Reference: Multiple locations in chapter Difficulty: Moderate

Copyright © 2008 Prentice-Hall. All rights reserved. 20