Test Bank For A Guide to Designing and Implementing Local And Wide Area Networks, 2nd Edition Michael Palmer, Bruce Sinclair

Digital item No Waiting Time Instant DownloadISBN-13: 978-0619121228 ISBN-10: 061912122X

In Stock

Original price was: $55.00.Current price is: $25.00.

SKU:000786000294

Test Bank For A Guide to Designing and Implementing Local And Wide Area Networks, 2nd Edition Michael Palmer, Bruce Sinclair

Chapter 2 – LAN/WAN Interconnectivity

TRUE/FALSE

1.Taken together, the set of layers of the OSI model is called a stack.

ANS: T PTS: 1 REF: 44

2.SSL is a data encryption technique employed between a server and a client.

ANS: T PTS: 1 REF: 83

3.Typically, if a network has a low startup cost, there will be a low cost to maintain it.

ANS: F PTS: 1 REF: 58

4.In a traditional ring design, there are two terminators.

ANS: F PTS: 1 REF: 61

5.When data is transmitted in Ethernet communications, it is encapsulated in frames.

ANS: T PTS: 1 REF: 65

6.It is okay to use Ethernet II and standard 802.3 frames among the same communicating nodes on the same network.

ANS: F PTS: 1 REF: 66

7.All MAUs must have terminators.

ANS: F PTS: 1 REF: 68

8.When using FDDI, it is possible for several frames from several nodes to be on the network at a given time.

ANS: T PTS: 1 REF: 71

9.The telephone companies were the earliest source of WAN connectivity.

ANS: T PTS: 1 REF: 72

MODIFIED TRUE/FALSE

1.The figure above is a representation of a(n) digital signal. _________________________

ANS: F, analog

PTS: 1 REF: 44

2.Flow control ensures that one device does not send information faster than it can be received by another device. _________________________

ANS: T PTS: 1 REF: 49

3.The number, size, and frequency of packets transmitted on a network in a given amount of time is referred to as network usage. _________________________

ANS: F, network traffic

PTS: 1 REF: 58

4.A(n) backbone is a high-capacity communications medium that joins networks and central network devices on the same floor in a building, on different floors, and across long distances. _________________________

ANS: T PTS: 1 REF: 63

5.Discovery is the process of checking communication cable for a specific voltage level indicating the presence of a data-carrying signal. _________________________

ANS: F, Carrier sense

PTS: 1 REF: 64

6.The token ring transport method uses a physical star topology along with the logic of a(n) ring topology. _________________________

ANS: T PTS: 1 REF: 67

7.A(n) broadcast frame is one that is sent to all points on the network. _________________________

ANS: T PTS: 1 REF: 70

8.A(n) T-carrier line is a dedicated telephone line that can be used for data communications to connect two different locations for continuous point-to-point communications. _________________________

ANS: T PTS: 1 REF: 74

9.Throughput is the transmission capacity of a communications medium, which is typically measured in bits per second or hertz, and which is determined by the maximum minus the minimum transmission capacity. _________________________

ANS: F, Bandwidth

PTS: 1 REF: 77

MULTIPLE CHOICE

1.The OSI is the product of which standards organization?

a.

ISO

c.

IEEE

b.

ANSI

d.

Both A and B.

ANS: D PTS: 1 REF: 42

2.____ encoding assigns a binary value to the presence of a particular signal state.

a.

Binary

c.

State-transition

b.

Current-state

d.

Basic

ANS: B PTS: 1 REF: 45

3.____ encoding simply checks for a change in the signal state, from low to high or high to low.

a.

Binary 

c.

State-transition

b.

Current-state 

d.

Basic

ANS: C PTS: 1 REF: 45

4.EMI is a source of ____ layer interference.

a.

Data Link

c.

Physical

b.

Network

d.

Transport

ANS: C PTS: 1 REF: 46

5.The MAC sublayer of the Data Link layer does not ____.

a.

ensure reliable communications by initiating a communications link between two nodes and then guarding them against interruptions to the link

b.

examine the physical or device address information contained in each frame

c.

regulate how multiple devices share communications on the same network

d.

None of the above.

ANS: A PTS: 1 REF: 47

6.A device’s MAC address is coded as a ____ number.

a.

binary

c.

hexadecimal

b.

decimal

d.

None of the above.

ANS: C PTS: 1 REF: 47

7.____ is a process used by routers that involves gathering information about how many nodes are on a network and where they are located.

a.

Encryption

c.

Beaconing

b.

Broadcasting

d.

Discovery

ANS: D PTS: 1 REF: 48

8.The ____ layer offers a way to set up half- and full-duplex communications.

a.

Communications

c.

Session

b.

Network

d.

Transport

ANS: C PTS: 1 REF: 51

9.____ protocols enable an OSI layer on a sending node to communicate with the same layer on the receiving node.

a.

Layer

c.

Link

b.

Peer

d.

Transfer

ANS: B PTS: 1 REF: 54

10.A primitive is ____.

a.

a command used to transfer information from one layer in an OSI stack to another layer

b.

the smallest unit of data allowed in the Physical layer

c.

a command used to transfer information from an OSI layer on the sending node to the same layer on the receiving node

d.

Both A and B.

ANS: A PTS: 1 REF: 55

Reviews

There are no reviews yet.

Write a review

Your email address will not be published. Required fields are marked *

 

 

Product has been added to your cart