Network+ Guide to Networks 6th Edition by Tamara Dean Test Bank

<< Nursing A Concept Based Approach to Learning Volume II 2nd Ed Neuroscience Fundamentals Rehabilitation 4th Edition Lundy Ekman Test Bank >>
Product Code: 222
Availability: In Stock
Price: $24.99
Qty:     - OR -   Add to Wish List
Add to Compare

Network+ Guide to Networks 6th Edition by Tamara Dean Test Bank

Description

WITH ANSWERS
Network+ Guide to Networks 6th Edition by Tamara Dean Test Bank

Chapter 5: Topologies and Ethernet Standards

 

TRUE/FALSE

 

  1. Modern Ethernet networks are based on the star topology.

 

ANS:  T                    PTS:   1                    REF:   202

 

  1. The smallest LANs do not have a backbone.

 

ANS:  F                    PTS:   1                    REF:   205

 

  1. A serial backbone is the simplest kind of backbone.

 

ANS:  T                    PTS:   1                    REF:   205

 

  1. The most popular method for connecting nodes on a network is circuit switching.

 

ANS:  F                    PTS:   1                    REF:   210

 

  1. A networks access method is its method of controlling how network nodes access the communications channel.

 

ANS:  T                    PTS:   1                    REF:   212

 

MULTIPLE CHOICE

 

  1. A physical topology ____.
a. specifies device types c. specifies connectivity methods
b. depicts a network in broad scope d. specifies addressing schemes

 

 

ANS:  B                    PTS:   1                    REF:   199

 

  1. Without ____, a bus network would suffer from signal bounce.
a. hubs c. terminators
b. repeaters d. jamming

 

 

ANS:  C                    PTS:   1                    REF:   199

 

  1. In a ring network, each workstation acts as a(n) ____ for the transmission.
a. repeater c. terminator
b. amplifier d. manager

 

 

ANS:  A                    PTS:   1                    REF:   200

 

  1. A complex combination of topologies is known as a ____ topology.
a. mixed c. compound
b. hybrid d. mulitpart

 

 

ANS:  B                    PTS:   1                    REF:   203

 

  1. The most common logical topologies are ____ and ring.
a. bus c. wired
b. star d. hybrid

 

 

ANS:  A                    PTS:   1                    REF:   204

 

  1. A ____ is simply a linked series of devices.
a. star c. ring
b. star-wired ring d. daisy-chain

 

 

ANS:  D                    PTS:   1                    REF:   205

 

  1. In packet switching, when packets reach their destination node, the node ____ them based on their control information.
a. disassembles c. reassembles
b. deletes d. separates

 

 

ANS:  C                    PTS:   1                    REF:   210

 

  1. Collectively, MPLS labels are sometimes called a ____.
a. header c. frame
b. shim d. title

 

 

ANS:  B                    PTS:   1                    REF:   211

 

  1. All Ethernet networks, independent of their speed or frame type, use an access method called ____.
a. CSMA c. CSAM/CD
b. CSMA/DC d. CSMA/CD

 

 

ANS:  D                    PTS:   1                    REF:   212

 

  1. A ____ occurs when two transmissions interfere with each other.
a. jam c. carrier sense
b. collision d. multiple access event

 

 

ANS:  B                    PTS:   1                    REF:   212

 

  1. On an Ethernet network, a(n) ____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
a. collision domain c. interference domain
b. crash domain d. duplicate domain

 

 

ANS:  A                    PTS:   1                    REF:   212

 

  1. 1000Base-T is a standard for achieving throughputs ____ times faster than Fast Ethernet over copper cable.
a. 2 c. 10
b. 5 d. 100

 

 

ANS:  C                    PTS:   1                    REF:   216

 

  1. The 10GBase-T standard is considered a breakthrough for transmitting 10 Gbps over ____ medium.
a. coaxial c. fiber
b. twisted pair d. atmosphere

 

 

ANS:  B                    PTS:   1                    REF:   216

 

  1. The most common 1-Gigabit Ethernet standard in use today is ____.
a. 1000Base-T c. 10GBase-SR
b. 1000Base-SX d. 1000Base-LX

 

 

ANS:  D                    PTS:   1                    REF:   217

 

  1. 1000Base-SX has a maximum throughput of ____.
a. 1 Gbps c. 100 Gbps
b. 10 Gbps d. 1000 Gbps

 

 

ANS:  A                    PTS:   1                    REF:   217

 

  1. The 10-gigabit fiber optic standard with the shortest segment length is ____.
a. 10GBase-T c. 10GBase-LR
b. 10GBase-SR d. 10GBase-ER

 

 

ANS:  B                    PTS:   1                    REF:   218

 

  1. In the 10GBase-LR standard, the L stands for ____.
a. long reach c. long ring
b. LAN d. little ring

 

 

ANS:  A                    PTS:   1                    REF:   218

 

  1. Given their long-distance capabilities, 10GBase-ER and 10GBase-EW are best suited for use on ____.
a. VANs c. LANs
b. MANs d. WANs

 

 

ANS:  D                    PTS:   1                    REF:   219

 

  1. Within Ethernet frame types, the ____ signals to the receiving node that data is incoming and indicates when the data flow is about to begin.
a. FCS c. preamble
b. header d. frame

 

 

ANS:  C                    PTS:   1                    REF:   221

 

  1. Together, the FCS and the header make up the ____-byte frame for the data.
a. 15 c. 21
b. 18 d. 24

 

 

ANS:  B                    PTS:   1                    REF:   221

 

  1. The Ethernet II frame type contains a 2-byte ____ field that differentiates it from other Ethernet frame types.
a. data c. source
b. length d. type

 

 

ANS:  D                    PTS:   1                    REF:   222

 

COMPLETION

 

  1. In a(n) ____________________ topology, every node on the network is connected through a central device, such as a hub, router, or switch.

 

ANS:  star

 

PTS:   1                    REF:   201

 

  1. A network ____________________ is the part of a network to which segments and significant shared devices connect.

 

ANS:  backbone

 

PTS:   1                    REF:   205

 

  1. ____________________ is a component of a networks logical topology that determines how connections are created between nodes.

 

ANS:  Switching

 

PTS:   1                    REF:   209

 

  1. As part of CSMA/CD, a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.

 

ANS:  jamming

 

PTS:   1                    REF:   212

 

  1. Because of its support for multiple Network layer protocols and because it uses fewer bytes as overhead, ____________________ is the frame type most commonly used on contemporary Ethernet networks.

 

ANS:

Ethernet II (DIX)

Ethernet II

DIX

 

PTS:   1                    REF:   222

 

MATCHING

 

Match each item with a statement below:

a. PSE f. 802.3ae
b. 1000Base-LX g. 802.3z
c. 10Base-T h. 802.3u
d. 100Base-T i. PD
e. 1000Base-T  

 

 

  1. Follows the 5-4-3 rule of networking.

 

  1. The most common 1-Gigabit Ethernet.

 

  1. Also known as Gigabit Ethernet.

 

  1. Refers to the PoE device that receives the power.

 

  1. Also known as Fast Ethernet.

 

  1. Refers to the PoE device that supplies the power.

 

  1. IEEE standard for fiber-optic Ethernet networks transmitting data at 10 Gbps.

 

  1. IEEE standard for fiber-optic Ethernet networks transmitting data at 1 Gbps.

 

  1. IEEE standard for fiber-optic Ethernet networks transmitting data at 100 Mbps.

 

  1. ANS:  C                    PTS:   1                    REF:   215

 

  1. ANS:  B                    PTS:   1                    REF:   217

 

  1. ANS:  E                    PTS:   1                    REF:   216

 

  1. ANS:  I                     PTS:   1                    REF:   223

 

  1. ANS:  D                    PTS:   1                    REF:   215

 

  1. ANS:  A                    PTS:   1                    REF:   222-223

 

  1. ANS:  F                    PTS:   1                    REF:   218

 

  1. ANS:  G                    PTS:   1                    REF:   217

 

  1. ANS:  H                    PTS:   1                    REF:   215

 

SHORT ANSWER

 

  1. Describe the advantage of the star topology.

 

ANS:

Because they include a centralized connection point, star topologies can easily be moved, isolated, or interconnected with other networks; they are, therefore, scalable. For this reason, and because of their fault tolerance, the star topology has become the most popular fundamental layout used in contemporary LANs.

 

PTS:   1                    REF:   202

 

  1. Explain how the star-wired bus topology works. Include a description of its drawbacks and benefits.

 

ANS:

In a star-wired bus topology, groups of workstations are star-connected to connectivity devices and then networked via a single bus, as shown in Figure 5-5. With this design, you can cover longer distances and easily interconnect or isolate different network segments. One drawback is that this option is more expensive than using the star topology alone because it requires more cabling and potentially more connectivity devices. However, compared with the benefits, these drawbacks are negligible. The star-wired bus topology forms the basis for modern Ethernet networks, which commonly use switches or routers as the connectivity devices.

 

PTS:   1                    REF:   203

 

  1. Explain why it is important to understand logical topologies.

 

ANS:

Understanding logical topologies is useful when troubleshooting and designing networks. For example, on Ethernet networks, it is necessary to understand that all of a segments broadcast traffic is transmitted to all of the segments nodes. As an example, suppose you connect your laptop to your companys Ethernet network. In an attempt to contact a DHCP server and obtain an IP address, your laptop issues a DHCP discover packet in broadcast fashion. Therefore, the packet is sent to every workstation connected to the same Ethernet segment as your laptop, even though the request wasnt meant for them.

 

PTS:   1                    REF:   204

 

  1. Explain how the distributed backbone is connected. Include a description of its benefits.

 

ANS:

A distributed backbone consists of a number of connectivity devices connected to one or more central connectivity devices, such as switches or routers, in a hierarchy. This kind of topology allows for simple expansion and limited capital outlay for growth, because more layers of devices can be added to existing layers.

 

PTS:   1                    REF:   206

 

  1. Briefly explain how CSMA/CD works.

 

ANS:

In CSMA/CD, when a node wants to transmit data it must first access the transmission media and determine whether the channel is free. If the channel is not free, it waits and checks again after a very brief amount of time. If the channel is free, the node transmits its data. Any node can transmit data after it determines that the channel is free.

 

PTS:   1                    REF:   212

 

  1. Explain the 5-4-3 rule of networking.

 

ANS:

10Base-T follows the 5-4-3 rule of networking. This rule says that, between two communicating nodes, the network cannot contain more than five network segments connected by four repeating devices, and no more than three of the segments may be populated (at least two must be unpopulated). The maximum distance that a 10Base-T segment can traverse is 100 meters. To go beyond that distance, Ethernet star segments must be connected by additional hubs or switches to form more complex topologies. This arrangement can connect a maximum of five sequential network segments, for an overall distance between communicating nodes of 500 meters.

 

PTS:   1                    REF:   215

 

  1. Within an Ethernet frame, describe the FCS (Frame Check Sequence) field and explain how it is used to make the header.

 

ANS:

All Ethernet frames contain a 4-byte FCS (Frame Check Sequence) field. Recall that the function of the FCS field is to ensure that the data at the destination exactly matches the data issued from the source using the CRC (Cyclic Redundancy Check) algorithm. Together, the FCS and the header make up the 18-byte frame for the data.

 

PTS:   1                    REF:   221

 

  1. Within an Ethernet frame, describe what happens if fewer than 46 bytes of data are supplied by the higher layers.

 

ANS:

If fewer than 46 bytes of data are supplied by the higher layers, the source node fills out the data portion with extra bytes until it totals 46 bytes. The extra bytes are known as padding and have no significance other than to fill out the frame. They do not affect the data being transmitted.

 

PTS:   1                    REF:   221

 

  1. What does the SFD identify?

 

ANS:

The SFD (start-of-frame delimiter) identifies where the data field begins.

 

PTS:   1                    REF:   221

 

  1. Briefly describe the IEEE 802.3af standard. Use an analogy and explain why it is useful.

 

ANS:

In 2003, IEEE released its 802.3af standard, which specifies a method for supplying electrical power over Ethernet connections, also known as PoE (Power over Ethernet). Although the standard is relatively new, the concept is not. In fact, your home telephone receives power from the telephone company over the lines that enter your residence. This power is necessary for dial tone and ringing. On an Ethernet network, carrying power over signaling connections can be useful for nodes that are far from traditional power receptacles or need a constant, reliable power source.

 

PTS:   1                    REF:   222

Chapter 15: Network Management

 

TRUE/FALSE

 

  1. Documenting and capturing an accurate picture of a networks physical and logical elements are initial steps in understanding the network.

 

ANS:  T                    PTS:   1                    REF:   698

 

  1. The more data you gather while establishing your networks baseline, the less accurate your prediction will be.

 

ANS:  F                    PTS:   1                    REF:   699

 

  1. The first step in configuration management is to take an inventory of each node on the network.

 

ANS:  F                    PTS:   1                    REF:   707

 

  1. A patch is a replacement for an entire software package.

 

ANS:  F                    PTS:   1                    REF:   708

 

  1. For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.

 

ANS:  F                    PTS:   1                    REF:   715

 

MULTIPLE CHOICE

 

  1. ____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every devices hardware configuration.
a. Change c. Asset
b. Performance d. Configuration

 

 

ANS:  D                    PTS:   1                    REF:   696

 

  1. A(n) ____ is a graphical representation of a networks devices and connections.
a. Multi Router Traffic Grapher c. wiring schematic
b. network diagram d. event viewer

 

 

ANS:  B                    PTS:   1                    REF:   696

 

  1. A(n) ____ is a graphical representation of a networks wired infrastructure.
a. Multi Router Traffic Grapher c. wiring schematic
b. network diagram d. event viewer

 

 

ANS:  C                    PTS:   1                    REF:   697

 

  1. ____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
a. Performance c. Network
b. Fault d. Configuration

 

 

ANS:  A                    PTS:   1                    REF:   701

 

  1. ____ management refers to the detection and signaling of device, link, or component faults.
a. Performance c. Network
b. Fault d. Configuration

 

 

ANS:  B                    PTS:   1                    REF:   701

 

  1. The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
a. base lining c. polling
b. interrogating d. pushing

 

 

ANS:  C                    PTS:   1                    REF:   701

 

  1. A network management agent is a ____ that collects information about a devices operation and provides it to the network management application.
a. software routine c. GUI
b. hardware device d. probe

 

 

ANS:  A                    PTS:   1                    REF:   701

 

  1. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
a. Traffic monitoring c. Traffic polling
b. Traffic routing d. Traffic shaping

 

 

ANS:  D                    PTS:   1                    REF:   704

 

  1. ____ is the local storage of frequently needed files that would otherwise be obtained from an external source.
a. Swapping c. Caching
b. Paging d. Segmentation

 

 

ANS:  C                    PTS:   1                    REF:   706

 

  1. The most common type of caching is ____ caching.
a. online c. Internet
b. Web d. device

 

 

ANS:  B                    PTS:   1                    REF:   706

 

  1. A ____ is a network device devoted to storage and delivery of frequently requested files.
a. cache engine c. server
b. Web site host d. database host

 

 

ANS:  A                    PTS:   1                    REF:   706

 

  1. A key component in managing networks is identifying and tracking its hardware and software through ____ management.
a. performance c. configuration
b. change d. asset

 

 

ANS:  D                    PTS:   1                    REF:   707

 

  1. A ____ is a correction, improvement, or enhancement to a software application.
a. revision c. patch
b. change d. software upgrade

 

 

ANS:  C                    PTS:   1                    REF:   708

 

  1. A ____ is a major change to a software packages existing code.
a. revision c. patch
b. change d. software upgrade

 

 

ANS:  D                    PTS:   1                    REF:   708

 

  1. ____ upgrades typically overwrite some system files on the workstation, so their installation may affect other applications adversely.
a. Principle c. Patch
b. Application d. Full

 

 

ANS:  B                    PTS:   1                    REF:   708

 

  1. The most critical type of software upgrade you will perform is an upgrade to your ____.
a. database c. NOS
b. application d. backbone

 

 

ANS:  C                    PTS:   1                    REF:   709

 

  1. The process of reverting to a previous version of software after attempting to upgrade it is known as ____.
a. backleveling c. downgrading
b. reverse engineering d. change back

 

 

ANS:  A                    PTS:   1                    REF:   711

 

  1. A networked ____ is perhaps the simplest device to add.
a. workstation c. printer
b. hub d. server

 

 

ANS:  A                    PTS:   1                    REF:   713

 

  1. Above all, keep ____ in mind when you upgrade or install hardware on a network.
a. user inconvenience c. costs
b. time d. safety

 

 

ANS:  D                    PTS:   1                    REF:   715

 

  1. The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.
a. cabling c. NOS
b. printer d. backbone

 

 

ANS:  D                    PTS:   1                    REF:   715

 

  1. Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.
a. research c. plan
b. justify d. document

 

 

ANS:  B                    PTS:   1                    REF:   716

 

COMPLETION

 

  1. ____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.

 

ANS:  Network management

 

PTS:   1                    REF:   695

 

  1. A(n) ____________________ is a report of the networks current state of operation.

 

ANS:  baseline

 

PTS:   1                    REF:   698

 

  1. The definition of managed devices and their data are collected in a(n) ____________________.

 

ANS:

MIB (Management Information Base)

Management Information Base

MIB

 

PTS:   1                    REF:   701

 

  1. On Windows-based computers an event log and can be easily viewed with the GUI ____________________ application.

 

ANS:  Event Viewer

 

PTS:   1                    REF:   703

 

  1. ____________________ holds down costs because the ISP doesnt have to plan for every client using all the throughput he could at all times

 

ANS:  Traffic policing

 

PTS:   1                    REF:   705

 

MATCHING

 

Match each item with a statement below:

a. HIPAA f. system log
b. CALEA g. event log
c. SNMP h. NOS
d. syslog function i. RFP
e. agent  

 

 

  1. Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.

 

  1. Stores results from devices monitoring conditions in UNIX or Linux-based networks.

 

  1. Collects information about a devices operation but does not demand significant process resources.

 

  1. Records event information from Linux and UNIX machines.

 

  1. Stores results from devices monitoring conditions in Windows-based networks.

 

  1. Specifies what work a contractor should do.

 

  1. Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.

 

  1. Usually involves significant, potentially drastic, changes to the way your servers and clients operate.

 

  1. Addresses the security and privacy of medical records.

 

  1. ANS:  C                    PTS:   1                    REF:   701

 

  1. ANS:  F                    PTS:   1                    REF:   703

 

  1. ANS:  E                    PTS:   1                    REF:   701

 

  1. ANS:  D                    PTS:   1                    REF:   703

 

  1. ANS:  G                    PTS:   1                    REF:   705

 

  1. ANS:  I                     PTS:   1                    REF:   716

 

  1. ANS:  B                    PTS:   1                    REF:   700

 

  1. ANS:  H                    PTS:   1                    REF:   709

 

  1. ANS:  A                    PTS:   1                    REF:   701

 

SHORT ANSWER

 

  1. Describe the purpose of baseline measurements.

 

ANS:

Baseline measurements allow you to compare future performance increases or decreases caused by network changes or events with past network performance. Obtaining baseline measurements is the only way to know for certain whether a pattern of usage has changed (and requires attention) or, later, whether a network upgrade made a difference. Each network requires its own approach. The elements you measure depend on which functions are most critical to your network and its users.

 

PTS:   1                    REF:   699

 

  1. Explain how to gather baseline data on a network.

 

ANS:

Although you could theoretically use a network monitor or network analyzer and record its output at regular intervals, several software applications can perform the baselining for you. These applications range from freeware available on the Internet to expensive, customizable hardware and software combination products. Before choosing a network-baselining tool, you should determine how you will use it. If you manage a small network that provides only one critical application to users, an inexpensive tool may suffice. If you work on a WAN with several critical links, however, you should investigate purchasing a more comprehensive package. The baseline measurement tool should also be capable of collecting the statistics needed.

 

PTS:   1                    REF:   699

 

  1. Explain how a network management application can present an administrator with results after data is collected.

 

ANS:

After data is collected, the network management application can present an administrator with several ways to view and analyze the data. For example, a popular way to view data is in the form of a map that shows fully functional links or devices in green, partially (or less than optimally) functioning links or devices in yellow, and failed links or devices in red.

 

PTS:   1                    REF:   702

 

  1. List six characteristics software running on network devices may use to prioritize traffic.

 

ANS:

Several types of traffic prioritization that is, treating more important traffic preferentially exist. Software running on a router, multilayer switch, gateway, server, or even a client workstation can prioritize traffic according to any of the following characteristics:

 

  • Protocol
  • IP address
  • User group
  • DiffServ (Differentiated Services) flag or TOS (type of service) field in an IP datagram
  • VLAN tag in a Data Link layer frame
  • Service or application

 

PTS:   1                    REF:   706

 

  1. Describe how to select an asset management tool.

 

ANS:

The asset management tool you choose depends on your organizations needs. You might purchase an application that can automatically discover all devices on the network and then save that information in a database, or you might use a simple spreadsheet to save the data. In either case, your asset management records should be comprehensive and accessible to all personnel who may become involved in maintaining or troubleshooting the network. In addition, ensure that the asset management database is regularly updated, either manually or automatically, as changes to network hardware and software occur. The information you retain is useful only while it is current.

 

PTS:   1                    REF:   707

 

  1. Explain how asset management simplifies maintaining and upgrading the network.

 

ANS:

Asset management simplifies maintaining and upgrading the network chiefly because you know what the system includes. For example, if you discover that a router purchased two years ago requires an upgrade to its operating system software to fix a security flaw, you need to know how many routers are installed, where they are installed, and whether any have already received the software upgrade. An up-to-date asset management system allows you to avoid searching through old invoices and troubleshooting records to answer these questions.

 

PTS:   1                    REF:   707

 

  1. Explain the purpose of a patch.

 

ANS:

A patch is a correction, improvement, or enhancement to a software application. It differs from a revision or software upgrade in that it changes only part of an application, leaving most of the code untouched. Patches are often distributed at no charge by software vendors in an attempt to fix a bug in their code or to add slightly more functionality.

 

PTS:   1                    REF:   708

 

  1. Describe the preparation and implementation requirements when upgrading a network printer.

 

ANS:

A networked printer is easy to add to your network, too. Adding this equipment is slightly more complex than adding a networked workstation, however, because of its unique configuration process and because it is shared. Although it affects multiple users, a networked printer does not typically perform a mission-critical function in an organization, so the length of time required to install one does not usually affect productivity. Thus, although you should notify the affected users of a networked printer addition, you do not need to notify all users and support staff. Likewise, you do not need to restrict access to the network or worry about downtime in this instance.

 

PTS:   1                    REF:   713-714

 

  1. Describe the preparation and implementation requirements when upgrading a hub or access point.

 

ANS:

A single hub or access point might service as few as one or as many as 64 users. You do not have to worry about downtime or notifying users when adding a new hub or access point, because it cannot affect anyone until it is actually in use. However, if you are upgrading or swapping out an existing hub or access point, you must notify the affected users, because the upgrade or swap will create downtime. In addition, consider the traffic and addressing implications of adding or upgrading a hub or access point.

 

PTS:   1                    REF:   714

 

  1. Explain how to provide a way to reverse the hardware upgrade and reinstall the old hardware when necessary.

 

ANS:

As with software changes, you should provide a way to reverse the hardware upgrade and reinstall the old hardware if necessary. If you are replacing a faulty component or device, this restoration, of course, is not possible. If you are upgrading a component in a device, on the other hand, keep the old component safe (for example, keep NICs in static-resistant containers) and nearby. Not only might you need to put it back in the device, but you might also need to refer to it for information. Even if the device seems to be operating well with the new component, keep the old component for a while, especially if it is the only one of its kind at your organization.

 

PTS:   1                    REF:   716

Write a review

Your Name:


Your Review: Note: HTML is not translated!

Rating: Bad           Good

Enter the code in the box below:



 

Once the order is placed, the order will be delivered to your email less than 24 hours, mostly within 4 hours. 

If you have questions, you can contact us here