MGT 73473

subject Type Homework Help
subject Pages 15
subject Words 1795
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Cables and associated connecting hardware whose transmission characteristics are
specified up to _________ fall into Category 5 UTP cabling.
A. 50 MHz
B. 100 MHz
C. 150 MHz
D. 200 MHz
_________ are programs that extract information from name servers in response to
client requests.
A. Name servers
B. DNS
C. Resolvers
D. IP datagram
Because of the limited frequencies available, a key design element of any
cellular system is to ___________.
A. use small cells
page-pf2
B. employ multiple access
C. limit the number of users at one time
D. use as many frequencies as possible
Which of the following is NOT a feature of an Intranet?
A. uses Internet based standards, such as HTML and SMTP
B. is used to connect both local and remote sites into one network
C. is used to distribute content to the general Internet
D. can be effectively managed
The most widely used format for raster-scan images is referred to as _______.
A. TIFF
B. JPEG
C. PNG
D. PDF
page-pf3
Electromagnetic signals:
A. are used only for optics
B. are used for analog and digital signals
C. are used for digital signals only
D. are used for analog signals only
The key elements of a protocol are:
A. syntax, structure, timing
B. syntax, semantics, structure
C. structure, semantics, format
D. format, syntax, semantics
page-pf4
Transport PDUs are typically called ________.
A. channels
B. segments
C. bridges
D. frames
The maximum number of Class A network addresses is __________.
A. 16
B. 126
C. 128
D. 256
The term "SONET" corresponds to:
A. special operations networking environment testing
B. synchronous optical networking environment testing
C. synchronous optical network
page-pf5
D. synchronous operational networking
The domain ________ is for network support centers, Internet service providers, and
other network-related organizations.
A. org
B. info
C. com
D. net
The stage of a virus where it is activated to perform the function for which it
was intended is referred to as the _________.
A. propagation phase
B. triggering phase
C. execution phase
D. none of the above
page-pf6
_________ processing refers to the traditional mainframe environment in which all or
virtually all of processing is done on a central host.
A. Host-based
B. Server-based
C. Client-based
D. Cooperative
_________ makes it possible to distribute both power and data using Ethernet cabling.
A. VLAN
B. PoE
C. MAC
D. CSMA
page-pf7
This is defined as a station movement from a BSS in one ESS to a BSS within another
ESS. This case is supported only in the sense that
the station can move. Maintenance of upper-layer connections supported by 11 cannot
be guaranteed. In fact, disruption of service is likely to occur.
A. ISS transition
B. no transition
C. BSS transition
D. ESS transition
The higher-layer protocols defined as part of SSL include:
A. handshake protocol
B. change cipher spec protocol
C. alert protocol
D. all of the above
A service provided as an alternative for attached devices using LLC is:
A. unacknowledged connectionless service
page-pf8
B. connection-mode service
C. acknowledged connectionless service
D. all of the above
The lowest layer of the IEEE 802 reference model corresponds to the ____________ of
the OSI model and includes such functions as encoding/decoding of signals and bit
transmission/reception.
A. physical layer
B. logic layer
C. link layer
D. control layer
Which of the following is NOT a benefit of distributed data processing?
A. increased responsiveness to organizational needs
B. better correspondence to organizational patterns
C. greater user involvement and control
page-pf9
D. enhanced centralization of data definitions
Asynchronous transmission includes a start and stop bit with each character transmitted
to ensure:
A. that the total number of bits is a factor of 10
B. to allow a continuous stream of data
C. to prevent single bit errors from occurring
D. to allow the receiver to maintain synchronization with the sender
Historically, the most commonly used text code is the __________, in which each
character in this code is represented by a unique 7-bit pattern.
A. UTF-8
B. IRA
C. Morse code
D. none of the above
page-pfa
The heart of the call placement process for VoIP is the ___________, defined in RFC
3261, which is an application-level control protocol for setting up, modifying, and
terminating real-time sessions between participants over an IP data network.
A. SIP
B. SDP
C. PDP
D. POP
Email functions concerned with the protocol operations needed to transmit and deliver
messages are considered:
A. message transfer agent functions
B. client functions
C. email client functions
D. user agent functions
page-pfb
A _________ is a dedicated network that provides access to various types of storage
devices including tape libraries, optical jukeboxes, and disk arrays.
A. BI
B. DW
C. SAN
D. NAS
Which of the following is NOT a standard MIME content type?
A. audio
B. binary
C. messages
D. image
Which security area is addressed in IEEE 802.11i ?
A. authentication
page-pfc
B. key management
C. data transfer privacy
D. all of the above
The ________ relays mail for one application-level hop.
A. MSA
B. MS
C. MTA
D. MDA
The sequence 10101011, which indicates the actual start of the frame and enables the
receiver to locate the first bit of the rest of the frame, is the ______.
A. FCS
B. SFD
C. DA
D. SA
page-pfd
________ defines a format for text messages that are sent using e-mail.
A. RFC 208
B. RFC 1939
C. RFC 137
D. RFC 822
________ is used on SONET to support long-haul voice, data, and video applications
over fiber-optic circuits.
A. WDM
B. TDM
C. DMT
D. LMV
page-pfe
A description of the nature of service to be provided, the expected performance level of
the service, and the process for monitoring and reporting the service level, is
information that is typically included in a _________ .
A. SLA
B. QoS
C. LAN
D. DS
__________ is similar to online chat because it is text-based and
exchanged bidirectionally in real time.
A. Audio conferencing
B. Instant messaging
C. Presence
D. Web conferencing
The efficiency of an asynchronous transmission using 1 stop bit, 1 start bit, and 1 parity
bit is:
page-pff
A. 20%
B. 30%
C. 50%
D. 70%
The newer IPv6 specification uses addresses to identify hosts that consist of:
A. 128 bits
B. 64 bits
C. 32 bits
D. 16 bits
It is difficult to use low frequencies for unguided radio transmission of data because the
antenna dishes would have to be extremely large.
page-pf10
There are many protocols and technologies to select from when building an entire
communication system.
In general, noise can be defined as:
A. loud, high amplitude signals
B. errors in transmission
C. unwanted energy or signals on the transmission path
D. analog signals instead of digital
An advantage of packet switching over circuit switching is:
A. line efficiency is better
B. priorities can be used
C. can carry out data-rate conversion
page-pf11
D. all of the above
Traditionally, twisted pair has been the workhorse for communications of all sorts.
___________ notifies the user that congestion avoidance procedures should be initiated
where applicable for traffic in the same direction as the received frame.
Intranets are expensive to implement, but inexpensive to maintain.
page-pf12
__________ is a U.S. federal agency that deals with measurement science, standards,
and technology related to U.S. government use and to the promotion of U.S. private
sector innovation.
Carrier Ethernet often capitalizes on the existence of optical fiber and dense wavelength
division multiplexing (DWDM) infrastructure to provide WAN and MAN services to
subscribers.
For amplitude, frequency or phase shift keying, that respective characteristic of the
carrier wave is change to indicate the next binary digit; these binary digits can be
represented by this signal change or a lack of signal change.
page-pf13
In early business computer networks, communication lines were primarily provided by
CLECs.
The IPsec Architecture document mandates support for two types of key management:
manual and ___________.
A ________ refers to a group of hosts that are under the administrative control of a
single entity, such as a company or government agency.
The Joint Photographic Experts Group (JPEG) is a collaborative standards-making
effort between ISO and ITU-T.
page-pf14
The ________________ facility enables communicating nodes to encrypt messages
to prevent eavesdropping by third parties.
Wireless networks cannot be deployed without the aid of the network administrators.
The objective of the third generation of wireless communication is to provide
high-speed wireless communications to support multimedia, data, and video, in addition
to voice.
page-pf15
The electronics in the satellite that takes an uplink signal and converts it to a downlink
signal is called a _________ .
An error detection code is also referred to as a frame check sequence or a ________.
Although the use of ________ for voice transmission is declining, it is still used widely
for television distribution systems, including broadcast television and cable TV.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.