Filters
Question type

Study Flashcards

Wireless network traffic can be captured with sniffers.

A) True
B) False

Correct Answer

verifed

verified

Describe the two categories of wireless technologies.

Correct Answer

verifed

verified

Answers will vary.The two categories of ...

View Answer

The _____is a seven-layer architecture for defining how data is transmitted from computer to computer in a network. ​


A) Transmission Control Protocol model
B) client / server model
C) Open Systems Interconnection model
D) basic input / output model

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

An access point (AP) is the part of a wireless local area network (WLAN) that connects it to other networks.

A) True
B) False

Correct Answer

verifed

verified

Which of the following statements is true of the types of client / server architectures?


A) An n-tier architecture tests software easily.
B) An n-tier architecture helps improve network performance.
C) A two-tier architecture allows easy upgrades of applications.
D) A two-tier architecture requires minor modifications in case of any changes in application logic.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

_____ is responsible for packet forwarding.


A) Internet Protocol
B) Transmission Control Protocol
C) User Datagram Protocol
D) Extensible Authentication Protocol

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Internet Protocol (IP) operates at the _____ of the Open Systems Interconnection (OSI) model.


A) Transport layer
B) Physical layer
C) Data Link layer
D) Network layer

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

List the common applications of convergence.

Correct Answer

verifed

verified

Answers will vary.Common applications of...

View Answer

What are the major types of networks?

Correct Answer

verifed

verified

Answers will vary.There are three major types of networks: local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). In all these networks, computers are usually connected to the network via a network interface card (NIC), a hardware component that enables computers to communicate over a network.

Narrowband is capable of transmitting a maximum of 60,000 bps.

A) True
B) False

Correct Answer

verifed

verified

Identify an advantage of centralized processing.


A) It helps in exercising tight control over system operations and applications.
B) It is highly responsive to users' needs.
C) It has the highest fault tolerance.
D) It is highly compatible with organizational growth because workstations can be added easily.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Identify an advantage of the bus topology.


A) It makes fault diagnosis easy.
B) It detects problems easily due to its centralized control.
C) It handles steady traffic well.
D) It is effective even when network traffic is heavy.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

C

Describe a star topology.

Correct Answer

verifed

verified

Answers will vary.A star topology usuall...

View Answer

A routing table lists _____.


A) nodes on a network
B) the IP address of a router
C) the protocols that each node understands
D) packets to be sent

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The data transfer speeds of local area networks (LANs) are typically below 100 Mbps.

A) True
B) False

Correct Answer

verifed

verified

In the early days of computer technology, a(n) _____system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers. ​


A) centralized processing
B) decentralized processing
C) distributed processing
D) interconnected processing

E) None of the above
F) All of the above

Correct Answer

verifed

verified

A

In the context of security of wireless networks, which of the following is true of Wired Equivalent Privacy (WEP) ?


A) It is suitable for large networks with high bandwidths.
B) It is the most secure system for wireless networks.
C) In WEP, keys are dynamically generated based on the user's ID and password.
D) In WEP, a key must be entered manually into the access point and the client computer.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

Ethernet is a standard communication protocol embedded in software and hardware devices used for building a local area network (LAN).

A) True
B) False

Correct Answer

verifed

verified

Terrestrial microwave systems use radio control transmitters and receivers for transmitting data.

A) True
B) False

Correct Answer

verifed

verified

Bandwidth is often expressed as _____.


A) meters per second
B) bits per second
C) amperes per second
D) moles per second

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 105

Related Exams

Show Answer