Sunteți pe pagina 1din 3

NETWORK + GUIDE TO NETWORKS CHAPTER REVIEW QUESTIONS Chapter One

1. Which of the following distinguishes peer-to-peer networks from client/server networks? D. In peer-to-peer networks, no single computer has more authority than another, by default. 2. Which of the following is an advantage of using a peer-to-peer network over using a client/server network? C. A peer-to-peer network is easier to set up. 3. Which of the following is an advantage of using a client/server network over using a peer-topeer network? B. A client/server network allows for easier expansion. 4. The first services widely used by networks were: D. File and print services 5. Suppose you wanted to share documents among several computers in your household in a peerto-peer fashion. You could do that by properly configuring which of the following types of software? B. Desktop operating system software 6. What is the primary function of a file server on a network? D. It manages access and use of shared applications and data. 7. On most LANs, a computer acting as a server differs from a computer acting as a client in which of the following ways? (Choose two answers) D. The server would run a different operating system than the client. E. The server would possess greater processing power than the client. 8. In which of the following environments would a MAN be most appropriate? A. A corporate headquarters connecting its five building across a small building across s small campus. 9. Which of the following describes the combination of voice(such as telephone),video, and data signals sent over the same network? D. Convergence 10. What is the term used to describe a discrete unit of fata that is sent from one node to another over the network? B. A packet 11. How can a server tell the difference between many clients on a network? C. Each is identified by a unique network address. 12. What device connects a client computer to a networks medium, such as a wire? A. Network interface card 13. Which of the following is a function of a network protocol? C. To ensure that data arrives at its destination in the proper sequence. 14. The physical layout of nodes on a network is known as the networks:

B. Topology 15. Which of the following is an example of a mail service? A. Exchanging messages between mail servers on different networks 16. Which of the following network topologies is most common on todays networks? B. Star 17. Which of the following is an example of a network management service? A. Establishing permissions for users and groups of users to access certain applications on the server 18. Security is s concern when using remote access servers on a network because: A. Access servers enable computers to dial in to a network and obtain access to its resources, thereby exposing the network to the outside world. 19. Distributing data transfer activity equally over several devices or components belongs to which category of network management services? A. Load balancing 20. What organization sponsors the CCNA and CCIE certifications? B. CompTIA

Chapter TWO
1. Which ofnthe following standards organizations has established guidleines for installing network cables in commercial buildings? C. ANSI 2. Which technology does the IEEE 802.3 specification describe? B. Ethernet LANs 3. Which of the following IEEE specifications pertains to wireless networking? C. 802.11 4. Which layer of the OSI model is responsible for issuing acknowledgments (ACKs)? D. Transport Layer 5. Which OSI model layer is responsible for keeping open a communications path between your computer and the server when you dial in to a remote access server? D .Session Layer 6. Suppose your network is connected to another network via a router. Which OSI model layer provides the information necessary to direct data between the two networks? A. Network Layer 7. In which two layers of the OSI model do NICs belongs? D. Physical and Data Link Layers 8. Which standards organization developed the OSI model? A. ISO 9. Under what circumstances would the Transport layer use segmentation?

C. 10.

11. 12.

13.

14. 15. 16. 17. 18.

19.

20.

When the destination node cannot accept the size of the data blocks transmitted by the source node. Which OSI model layer generates and detects voltages so as to transmit and receive signals data? A. Physical Layer What type of address follows a hierarchical format? C. Network addresses. If the TCP protocol did not receive an acknowledgement for data it transmitted, what would it do? B. Retransmits the data to the recipient. You have just installed a new NIC in your computer and see the following stamped on it: 000a5e1a8da2. This unique identifier is an example of what kind of address? B. MAC address Which part of a MAC address is unique to each manufacturer? B. The block ID What is the purpose of the trailer field added to a frame in the Data Link layer? A. To mark the end of a frame. What are the sublayers of the Data Link layer as defined in the IEEE 802 standards? A. Logical Link Control sublayer and Media Access Control sublayer. Which layer of the OSI model encapsulates Network layer packets? C. Data Link layer Suppose that, at the receiving node, a frames FCS doesnt match the FCD it was issued at the transmitting node. What happens as a result? B. The receiving nodes Data Link layer requests a retransmission. In which of the following situations would it be most desirable to use a connectionless Transport layer protocol? C. When viewing a movie clip on the Web. Which of the following would be found in a Data Link layer header? D. The sources physical address

Chapter Three
1. What is different about the method used to boost a digital signals strength, compared with the method of boosting an analog signals strength?

S-ar putea să vă placă și