Business Data Networks And Security 9th Edition by Raymond R. Pank Test Bank

<< Business Essentials 8th Canadian Edition By Ronald J. Ebert Test Bank Business Data Communications and Networking12th Edition by Jerry FitzGerald Test Bank >>
Product Code: 222
Availability: In Stock
Price: $24.99
Qty:     - OR -   Add to Wish List
Add to Compare

Business Data Networks And Security 9th Edition by Raymond R. Pank Test Bank

Description

WITH ANSWERS
Business Data Networks And Security 9th Edition by Raymond R. Pank Test Bank

Business Data Networks and Security, 9e (Panko)

Chapter 2  Network Standards

 

1) Network standards are also called protocols.

Answer:  TRUE

 

2) Standards govern ________.

  1. A) semantics
  2. B) syntax
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

3) The meaning of a message is referred to as the messages ________.

  1. A) protocol
  2. B) order
  3. C) value
  4. D) semantics

Answer:  D

 

4) How a message is organized is its ________.

  1. A) syntax
  2. B) semantics
  3. C) order
  4. D) Both A and B

Answer:  A

 

5) In HTTP, a server may initiate an interaction with the client.

Answer:  FALSE

 

6) Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.

  1. A) ACK
  2. B) SYN
  3. C) SYN/ACK
  4. D) None of the above

Answer:  C

 

7) If the destination host does not receive a segment, it will ________.

  1. A) transmit an ACK segment
  2. B) transmit a NAC segment
  3. C) transmit an RSND segment
  4. D) None of the above

Answer:  D

 

 

8) If the destination host receives a segment that has an error, it will ________.

  1. A) transmit an ACK segment
  2. B) transmit a NAC segment
  3. C) transmit an RST segment
  4. D) None of the above

Answer:  D

9) A sending host will retransmit a TCP segment if ________.

  1. A) it receives an ACK segment
  2. B) it receives a NAC segment
  3. C) RPT
  4. D) None of the above

Answer:  D

 

10) The side wishing to close a TCP segment sends a(n) ________ segment.

  1. A) SYN
  2. B) ACK
  3. C) FIN
  4. D) None of the above

Answer:  C

 

11) After the side wishing to close a TCP connection sends a FIN segment, it will ________.

  1. A) not send any more segments
  2. B) only send ACK segments
  3. C) only send FIN segments
  4. D) None of the above

Answer:  B

 

12) Which of the following is not one of the three general parts of messages?

  1. A) Address field.
  2. B) Header.
  3. C) Data field.
  4. D) Trailer.

Answer:  A

 

13) The ________ contains the content being delivered by a message.

  1. A) address field
  2. B) header
  3. C) data field
  4. D) trailer

Answer:  C

 

14) The header is defined as everything that comes before the data field.

Answer:  TRUE

 

15) Messages always have data fields.

Answer:  FALSE

 

16) The trailer is defined as everything that comes after the data field.

Answer:  TRUE

 

17) Most messages have trailers.

Answer:  FALSE

 

18) Headers usually are divided into fields.

Answer:  TRUE

19) Octet is the same as ________.

  1. A) bit
  2. B) byte
  3. C) Either A or B, depending on the context
  4. D) Neither A nor B

Answer:  B

 

20) Ethernet addresses are ________.

  1. A) 32 bits long
  2. B) 48 bits long
  3. C) 128 bits long
  4. D) None of the above

Answer:  B

 

21) Ethernet addresses are ________ long.

  1. A) 4 octets
  2. B) 6 octets
  3. C) 32 octets
  4. D) 48 octets

Answer:  B

 

22) ________ read(s) the destination MAC address in an Ethernet frame.

  1. A) The destination host
  2. B) Switches in the network
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

23) If the destination host finds an error in an Ethernet frame, it ________.

  1. A) sends back a NAK
  2. B) retransmits the frame
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

 

24) Ethernet does ________.

  1. A) error detection
  2. B) error correction
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

25) Ethernet detects errors but does not correct them. Therefore, Ethernet is reliable.

Answer:  FALSE

 

26) In an IP header, the first bit in the second row is bit ________.

  1. A) 0
  2. B) 31
  3. C) 32
  4. D) None of the above

Answer:  C

27) How long are IPv4 addresses?

  1. A) 32 octets.
  2. B) 48 bits.
  3. C) 20 octets.
  4. D) None of the above

Answer:  D

 

28) How long are IPv4 addresses?

  1. A) 4 octets.
  2. B) 6 octets.
  3. C) 20 octets.
  4. D) 32 octets.

Answer:  A

 

29) Routers make forward decisions based on a packets source IP address.

Answer:  FALSE

 

30) Routers make packet forwarding decisions based on a packets ________.

  1. A) source IP address
  2. B) destination IP address
  3. C) Both A and B

Answer:  B

 

31) IP is reliable.

Answer:  FALSE

 

32) IP detects errors but does not correct them. Therefore, IP is reliable.

Answer:  FALSE

 

 

33) To handle internetwork transmission control tasks that IP cannot handle, the IETF created TCP.

Answer:  TRUE

 

34) TCP messages are called ________.

  1. A) frames
  2. B) fragments
  3. C) packets
  4. D) None of the above

Answer:  D

 

35) One-bit fields are called ________ fields.

  1. A) binary
  2. B) flag
  3. C) ACK
  4. D) None of the above

Answer:  B

 

36) If someone says that a 1-bit flag is set, this means that it is given the value ________.

  1. A) 0
  2. B) 1
  3. C) Either A or B
  4. D) Neither A nor B

Answer:  B

37) If the ACK bit is set, the acknowledgement number field MUST have a value.

Answer:  TRUE

 

38) Which of the following has a header checksum field?

  1. A) TCP.
  2. B) UDP.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

39) UDP checks messages for errors but does not correct them. UDP is ________.

  1. A) reliable
  2. B) unreliable
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

 

40) On a server, well-known port numbers indicate ________.

  1. A) applications
  2. B) connections with client computers
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

41) On a client, ephemeral port numbers indicate ________.

  1. A) applications
  2. B) connections with servers
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

42) The range 1024 to 4999 is the usual range for ________ port numbers.

  1. A) well-known
  2. B) ephemeral
  3. C) Both A and B

Answer:  B

 

43) 6,000 is in the range for ________ port numbers.

  1. A) well-known
  2. B) ephemeral
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

44) An IP address, a colon, and a port number constitute a(n) ________.

  1. A) well-known port number
  2. B) ephemeral port number
  3. C) connection
  4. D) socket

Answer:  D

45) The application layer standard always is HTTP.

Answer:  FALSE

 

46) Which of the following layers has the most standards?

  1. A) Data link.
  2. B) Internet.
  3. C) Transport.
  4. D) Application.

Answer:  D

 

 

47) Which layer has more standards?

  1. A) Internet.
  2. B) Application.
  3. C) Both of the above have about the same number of standards.

Answer:  B

 

48) At which layer would you find standards for requesting videos from a video sharing site such as YouTube?

  1. A) Application.
  2. B) Transport.
  3. C) Internet.
  4. D) None of the above

Answer:  A

 

49) At which layer would you find file transfer protocol standards for downloading files?

  1. A) Application.
  2. B) Transport.
  3. C) Internet.
  4. D) None of the above

Answer:  A

 

50) Nearly all application standards are simple, like HTTP.

Answer:  FALSE

 

51) In HTTP, most response message header fields consist of a keyword, an equal sign, and the value for the keyword.

Answer:  FALSE

 

52) In HTTP, the end of a header field is indicated by a ________.

  1. A) byte position
  2. B) CRLF
  3. C) colon
  4. D) blank line

Answer:  B

 

53) An HTTP request message usually has a ________.

  1. A) header
  2. B) data field
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

54) An HTTP response message usually has a ________.

  1. A) trailer
  2. B) data field
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

55) Converting application messages into bits is called ________.

  1. A) encapsulation
  2. B) encryption
  3. C) encoding
  4. D) conversion

Answer:  C

 

56) At what layer is encoding done?

  1. A) Application.
  2. B) Transport.
  3. C) Internet.
  4. D) None of the above

Answer:  A

 

57) How many bytes will it take to transmit Brain Dead without the quotation marks?

  1. A) 2
  2. B) 3
  3. C) 9
  4. D) None of the above

Answer:  D

 

58) How many bytes will it take to transmit Can you hear me now? without the quotation marks?

  1. A) 5
  2. B) 6
  3. C) 10
  4. D) None of the above

Answer:  D

 

59) Binary counting usually begins at 1.

Answer:  FALSE

 

60) In binary, 13 is 1101. What is 14?

  1. A) 1110
  2. B) 1111
  3. C) Neither A nor B

Answer:  A

 

61) If you have a field with N bits, you can represent N2 items.

Answer:  FALSE

62) A 5-bit field can represent ________ alternatives.

  1. A) 8
  2. B) 16
  3. C) 32
  4. D) 64

Answer:  C

 

63) Increasing an alternatives field length by one bit always doubles the number of alternatives it can represent.

Answer:  TRUE

 

64) A 7-bit field can represent ________ alternatives.

  1. A) 14
  2. B) 49
  3. C) 128
  4. D) 256

Answer:  C

 

65) To represent 65 alternatives, your alternatives field would have to be ________ bits long.

  1. A) 5
  2. B) 6
  3. C) 7
  4. D) 8

Answer:  C

 

66) The electrical signal generated by a microphone is called a(n) ________ signal.

  1. A) binary
  2. B) digital
  3. C) analog
  4. D) Either A or B

Answer:  A

 

67) A codec ________.

  1. A) encodes voice signals into analog signals
  2. B) encodes voice signals into binary signals
  3. C) compresses the signal
  4. D) Both B and C

Answer:  A

 

68) ________ is placing a message in the data field of another message.

  1. A) Encryption
  2. B) Vertical communication
  3. C) Layering
  4. D) Encapsulation

Answer:  D

 

69) After the internet layer process does encapsulation, it passes the IP packet to the ________ layer process.

  1. A) transport
  2. B) data link
  3. C) physical
  4. D) None of the above

Answer:  B

 

70) After the data link layer process does encapsulation, it passes the IP packet to the ________ layer process.

  1. A) physical
  2. B) internet
  3. C) transport
  4. D) None of the above

Answer:  A

 

71) Which layer process does not do encapsulation when an application layer process transmits a message?

  1. A) Physical.
  2. B) Data link.
  3. C) Internet.
  4. D) All do encapsulation.

Answer:  A

 

72) Network standards architectures break the standards functionality needed for communication into layers and define the functions of each layer.

Answer:  TRUE

 

73) Which of the following is a network standards architecture?

  1. A) ISO.
  2. B) TCP/IP.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

74) A corporate network can use either OSI standards at all layers or TCP/IP standards at all layers, but cannot use OSI standards at some layers and TCP/IP standards at other layers.

Answer:  FALSE

 

75) What is the dominant network standards architecture in most real firms today?

  1. A) OSI.
  2. B) TCP/IP.
  3. C) Neither A nor B

Answer:  C

 

 

76) Which of the following is a standards agency for OSI?

  1. A) IETF.
  2. B) ITU-T.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

77) Which of the following is a network standards architecture?

  1. A) ISO.
  2. B) OSI.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

78) OSI is dominant at the ________ layer.

  1. A) physical
  2. B) internet
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

79) OSI is dominant at the ________ layer.

  1. A) data link
  2. B) transport
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

80) OSI is dominant at the ________ layer.

  1. A) internet
  2. B) transport
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

81) Which of the following is an architecture?

  1. A) IP.
  2. B) TCP.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

 

82) Which of the following is a standard?

  1. A) TCP/IP.
  2. B) IP.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

83) Which of the following is a standards agency for TCP/IP?

  1. A) ITU-T.
  2. B) IETF.
  3. C) OSI.
  4. D) None of the above

Answer:  B

84) TCP/IP became dominant in corporations primarily because of ________.

  1. A) its use on the Internet
  2. B) its relatively simple standards, which led to low costs
  3. C) a government mandate
  4. D) All of the above

Answer:  B

 

85) Most IETF documents are called ________.

  1. A) official internet standards
  2. B) TCP/IP standards
  3. C) RFCs
  4. D) None of the above

Answer:  B

 

86) TCP/IP is dominant at the ________ layer(s).

  1. A) physical
  2. B) internet
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

87) TCP/IP is dominant at the ________ layer(s).

  1. A) data link
  2. B) transport
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

 

88) TCP/IP is dominant at the ________ layer(s).

  1. A) physical
  2. B) data link
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

89) Which standards architecture is dominant at the application layer?

  1. A) OSI.
  2. B) TCP/IP.
  3. C) IEEE.
  4. D) None of the above

Answer:  D

 

90) Almost all applications, regardless of what standards architecture they come from, can run over TCP/IP standards at the internet and transport layers.

Answer:  TRUE

91) Which layer(s) of the hybrid TCP/IPOSI standards architecture normally use(s) OSI standards?

  1. A) Data link.
  2. B) Transport.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

92) Which layer(s) of the hybrid TCP/IPOSI standards architecture normally use(s) TCP/IP standards?

  1. A) Data link.
  2. B) Transport.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

93) Wireless LAN transmission normally is governed by ________ standards.

  1. A) OSI
  2. B) TCP/IP
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

94) Switched WAN transmission is governed by ________ standards.

  1. A) OSI
  2. B) TCP/IP
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

95) The OSI ________ layer allows application communication to be restarted at the last rollback point.

  1. A) application
  2. B) presentation
  3. C) session
  4. D) None of the above

Answer:  C

 

96) The OSI ________ layer is designed to handle data formatting differences between two computers.

  1. A) application
  2. B) presentation
  3. C) session
  4. D) None of the above

Answer:  B

 

97) The OSI ________ layer is designed to handle compression and encryption for applications.

  1. A) application
  2. B) presentation
  3. C) session
  4. D) None of the above

Answer:  A

98) The OSI presentation layer is actually used ________.

  1. A) to convert between file formats
  2. B) as a category for data file standards used by multiple applications
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

99) Which of the following is NOT an OSI layer name?

  1. A) Data link.
  2. B) Internet.
  3. C) Session.
  4. D) Presentation.

Answer:  C

 

100) In OSI, the presentation layer is Layer ________.

  1. A) 7
  2. B) 6
  3. C) 5
  4. D) None of the above

Answer:  B

 

Business Data Networks and Security, 9e (Panko)

Chapter 10  Wide Area Networks

 

1) A network that runs on the customer premises is a ________.

  1. A) LAN
  2. B) WAN
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

2) A LAN is a network that ________.

  1. A) links different sites together
  2. B) provides service within about a mile
  3. C) provides service within a site
  4. D) All of the above

Answer:  C

 

3) A WAN is a network that ________.

  1. A) links different sites together
  2. B) provides service within about a mile
  3. C) provides service within a site
  4. D) All of the above

Answer:  A

 

4) Companies use carriers for WAN transmission because ________.

  1. A) companies lack rights of way
  2. B) carriers have extremely strong security
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

5) The general name for a company that is given rights of way to lay wires through public areas is carrier.

Answer:  TRUE

 

6) A company has more control over its ________ technology.

  1. A) LAN
  2. B) WAN

Answer:  A

 

7) LAN speeds are faster than WAN speeds. This is because of ________.

  1. A) technological limitations
  2. B) regulatory limitations
  3. C) the slow corporate adoption of newer WAN technologies
  4. D) economics

Answer:  A

 

8) WAN prices are closely related to carrier costs.

Answer:  FALSE

9) Which of the following has more diversity in technologies?

  1. A) LANs.
  2. B) WANs.
  3. C) Both A and B are about equal in diversity of technologies.

Answer:  B

 

10) Which of the following usually offers higher speeds?

  1. A) MANs.
  2. B) WANs.
  3. C) Both A and B are about equal in typical speeds.

Answer:  A

 

11) LANs are ________.

  1. A) single networks
  2. B) internets
  3. C) Either A or B
  4. D) Neither A nor B

Answer:  C

 

12) WANs are ________.

  1. A) single networks
  2. B) internets
  3. C) Either A or B
  4. D) Neither A nor B

Answer:  C

 

13) The Internet is a ________.

  1. A) LAN
  2. B) WAN
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

14) Which of the following does the carrier NOT own?

  1. A) The network core.
  2. B) Customer premises equipment.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

 

15) Low-speed leased lines use ________ transmission lines to the customer premises.

  1. A) one-pair voice-grade UTP
  2. B) one-pair data-grade UTP
  3. C) two-pair data-grade UTP
  4. D) four-pair UTP

Answer:  C

16) Local loop access lines to business use which of the following transmission media?

  1. A) 1-pair data-grade UTP.
  2. B) Optical fiber.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

17) Carrier access lines to residential buildings typically use ________.

  1. A) one-pair voice-grade UTP
  2. B) two-pair voice-grade UTP
  3. C) two-pair data-grade UTP
  4. D) four-pair UTP

Answer:  A

 

18) UTP transmission is normally limited to about 100 meters.

Answer:  FALSE

 

19) Which of the following go from one customer site to another customer site?

  1. A) Leased lines.
  2. B) Access lines.
  3. C) Both A and B

Answer:  C

 

20) Leased lines are ________.

  1. A) point-to-point lines between two premises
  2. B) always on
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

21) Leased lines standards are most different around the world at speeds ________.

  1. A) below about 50 Mbps
  2. B) above about 50 Mbps
  3. C) Leased line speeds around the world are about equally different in both speed ranges.

Answer:  A

 

 

22) T1 leased lines run at a speed of about ________.

  1. A) 250 kbps
  2. B) 1 Mbps
  3. C) 10 Mbps
  4. D) 45 Mbps

Answer:  A

 

23) E1 leased lines run at a speed of about ________.

  1. A) 250 kbps
  2. B) 2 Mbps
  3. C) 34 Mbps
  4. D) 45 Mbps

Answer:  B

24) SONET/SDH lines use ________.

  1. A) optical fiber
  2. B) high-quality forms of data-grade UTP
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

25) Which of the following is a fractional T1 line speed?

  1. A) 128 kbps.
  2. B) 1 Mbps.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

26) In the United States, to get a leased line of at least 2.5 Mbps. Your access line would be ________.

  1. A) T1
  2. B) Fractional T1
  3. C) Bonded T1s
  4. D) None of the above

Answer:  C

 

27) Which of the following are more widely used?

  1. A) T1 lines.
  2. B) SONET lines.
  3. C) Both are used about equally.

Answer:  A

 

28) All SONET/SDH leased lines run faster than 50 Mbps.

Answer:  TRUE

 

29) The slowest offered SONET/SDH leased lines run at about 50 Mbps.

Answer:  FALSE

 

30) What transmission medium do ALL DSL services use?

  1. A) One-pair data-grade UTP.
  2. B) Two-pair data-grade UTP.
  3. C) One-pair voice-grade UTP.
  4. D) Two-pair voice-grade UTP.

Answer:  C

 

31) Which of the following already runs to nearly all customer premises?

  1. A) 4-pair UTP.
  2. B) 1-pair VG UTP.
  3. C) 1-pair DG UTP.
  4. D) None of the above

Answer:  B

32) Which of the following DSL services tend to be symmetric in speed?

  1. A) Residential.
  2. B) Business.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

33) Which of the following DSL services usually offers QoS guarantees?

  1. A) Residential.
  2. B) Business.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

34) ADSL offers symmetric service.

Answer:  FALSE

 

35) Which of the following DSL services does not offer QoS guarantees?

  1. A) Residential.
  2. B) Business.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

36) In ADSL, the customer should have ________.

  1. A) splitters
  2. B) an ADSL modem
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

 

37) In ADSL, the residential customer needs a(n) ________.

  1. A) DSLAM
  2. B) ADSL modem
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

38) For ADSL service, which of the following typically must be added to the telephone system?

  1. A) A DSLAM.
  2. B) A transmission line to the customer premises.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

39) DSL throughput is typically sensitive to distance from the nearest switching building.

Answer:  TRUE

40) Fiber to the home service is normally created by ________.

  1. A) running optical fiber to neighborhoods
  2. B) running individual fiber cords from the nearest switching building to individual homes
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

41) For their transmission medium, cable television companies primarily use ________.

  1. A) 2-pair VG UTP cabling
  2. B) 2-pair DG UTP cabling
  3. C) coaxial cable
  4. D) 4-pair UTP

Answer:  C

 

42) To deliver signals to individual residences, cable television companies primarily use coaxial cable.

Answer:  TRUE

 

43) In coaxial cable, the two conductors ________.

  1. A) run side-by-side
  2. B) are twisted around each other
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

 

44) Two-way amplifiers are needed for cable ________ service.

  1. A) television
  2. B) data
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

45) Leased line switched WANs typically use ________.

  1. A) leased lines
  2. B) a router at each site
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

46) A firm uses a PSDN. It has four sites. How many leased lines will it need?

  1. A) None
  2. B) 1
  3. C) 4
  4. D) None of the above

Answer:  C

 

47) In a PSDN, companies connect to the network core at ________.

  1. A) NAPs
  2. B) Public/Private access points
  3. C) POPs
  4. D) DSLAMs

Answer:  C

48) The PSDN transport core normally is drawn as a cloud ________.

  1. A) because it has no internal structure
  2. B) for security reasons
  3. C) because customers do not need to care about what is inside it
  4. D) All of the above

Answer:  C

 

49) Which of the following is in Frame Relays speed range?

  1. A) 10 Mps.
  2. B) 100 Mbps.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

 

50) Which of the following offers speeds that match speed range of greatest corporate demand for WAN transmission?

  1. A) Frame Relay.
  2. B) ATM.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

51) ATM ________.

  1. A) offers speeds in the range of greatest corporate demand
  2. B) is relatively inexpensive
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

52) Metropolitan area Ethernet is used primarily ________.

  1. A) in MANs
  2. B) to link sites in distant cities
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

53) Metro Ethernet offers relatively high speeds and low costs.

Answer:  TRUE

 

54) Why is metro Ethernet popular?

  1. A) Familiarity.
  2. B) Rapid reprovisioning.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

55) Why is metro Ethernet popular?

  1. A) It uses a familiar technology.
  2. B) It has attractive prices.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

56) The use of virtual circuits ________.

  1. A) reduces costs
  2. B) improves reliability
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

 

57) In ________, switching decisions are based on destination addresses.

  1. A) Ethernet
  2. B) PSDNs that use virtual circuits
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

58) Frame Relay frames contain ________.

  1. A) destination addresses
  2. B) virtual circuit numbers
  3. C) Both A and B

Answer:  B

 

59) Using the Internet as a WAN is attractive because of ________.

  1. A) the Internets low cost per bit
  2. B) the Internets service quality
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

60) Service quality issues with the Internet can be addressed by using ________.

  1. A) a single ISP
  2. B) multiple ISPs

Answer:  A

 

61) In cellular technology, a ________ is a small geographical area.

  1. A) cell
  2. B) cellsite
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

62) In cellular technology, a cellsite is a small geographical area.

Answer:  FALSE

 

63) An MTSO ________.

  1. A) controls cellsites in a cellular system
  2. B) links mobile users to wired telephone customers
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

64) Cells are used in cellular telephony to provide ________.

  1. A) service for more customers
  2. B) greater reliability
  3. C) greater speed
  4. D) All of the above

Answer:  A

 

65) Cellular technology was created to support more customers in a single area.

Answer:  TRUE

 

66) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________.

  1. A) traditional cellular technology
  2. B) CDMA
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

67) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology.

Answer:  FALSE

 

68) If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with CDMA cellular technology.

Answer:  FALSE

 

69) When a cellular customer moves from one cell in a city to another cell in the same city, this is ________.

  1. A) cell switching
  2. B) a handoff
  3. C) cell hopping
  4. D) roaming

Answer:  B

 

70) When a cellular customer moves from one city to another, this is ________.

  1. A) roaming
  2. B) a handoff
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

71) Which of the following is true?

  1. A) Roaming means the same thing in cellular and 802.11 networks.
  2. B) Handoff means the same thing in cellular and 802.11 networks.
  3. C) Both A and B are true.
  4. D) Neither A nor B is true.

Answer:  B

 

72) Handoff means the same thing in cellular and 802.11 networks.

Answer:  FALSE

73) For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access?

  1. A) 1G.
  2. B) 2G.
  3. C) 3G.
  4. D) 4G.

Answer:  C

 

74) Which of the following offers true 4G speeds?

  1. A) LTE.
  2. B) LTE Advanced.
  3. C) HSPA+.
  4. D) All of the above

Answer:  B

 

75) According to the ITU, which of the following offers true 4G speeds?

  1. A) LTE.
  2. B) HSPA+.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

76) According to the ITU, which of the following can be advertised as 4G?

  1. A) LTE.
  2. B) HSPA+.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

77) HSPA+ is a ________ service.

  1. A) 1G
  2. B) 2G
  3. C) 3G
  4. D) 4G

Answer:  C

 

78) On what full 4G standard are carriers converging?

  1. A) LTE.
  2. B) LTE Advanced.
  3. C) HSPA+.
  4. D) None of the above

Answer:  B

 

 

79) By regulation, cellular systems must give almost the same throughput at different times during the day.

Answer:  FALSE

 

80) By regulation, cellular systems must give almost the same throughput at different places in their service areas.

Answer:  FALSE

81) Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network.

Answer:  TRUE

 

82) Some smart phones can act as wireless access points.

Answer:  TRUE

 

83) To use your smartphone as a wireless access point today generally will require you to pay a larger monthly fee.

Answer:  TRUE

 

84) Combining multiple WAN technologies into a collectively managed system is called having ________.

  1. A) SNMP
  2. B) network visibility
  3. C) a virtual WAN
  4. D) WAN optimization

Answer:  C

Write a review

Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below:



 

Once the order is placed, the order will be delivered to your email less than 24 hours, mostly within 4 hours. 

If you have questions, you can contact us here