Test Bank For A Guide to Designing and Implementing Local And Wide Area Networks, 2nd Edition Michael Palmer, Bruce Sinclair
Chapter 2 – LAN/WAN Interconnectivity
TRUE/FALSE
1.Taken together, the set of layers of the OSI model is called a stack.
ANS: T PTS: 1 REF: 44
2.SSL is a data encryption technique employed between a server and a client.
ANS: T PTS: 1 REF: 83
3.Typically, if a network has a low startup cost, there will be a low cost to maintain it.
ANS: F PTS: 1 REF: 58
4.In a traditional ring design, there are two terminators.
ANS: F PTS: 1 REF: 61
5.When data is transmitted in Ethernet communications, it is encapsulated in frames.
ANS: T PTS: 1 REF: 65
6.It is okay to use Ethernet II and standard 802.3 frames among the same communicating nodes on the same network.
ANS: F PTS: 1 REF: 66
7.All MAUs must have terminators.
ANS: F PTS: 1 REF: 68
8.When using FDDI, it is possible for several frames from several nodes to be on the network at a given time.
ANS: T PTS: 1 REF: 71
9.The telephone companies were the earliest source of WAN connectivity.
ANS: T PTS: 1 REF: 72
MODIFIED TRUE/FALSE
1.The figure above is a representation of a(n) digital signal. _________________________
ANS: F, analog
PTS: 1 REF: 44
2.Flow control ensures that one device does not send information faster than it can be received by another device. _________________________
ANS: T PTS: 1 REF: 49
3.The number, size, and frequency of packets transmitted on a network in a given amount of time is referred to as network usage. _________________________
ANS: F, network traffic
PTS: 1 REF: 58
4.A(n) backbone is a high-capacity communications medium that joins networks and central network devices on the same floor in a building, on different floors, and across long distances. _________________________
ANS: T PTS: 1 REF: 63
5.Discovery is the process of checking communication cable for a specific voltage level indicating the presence of a data-carrying signal. _________________________
ANS: F, Carrier sense
PTS: 1 REF: 64
6.The token ring transport method uses a physical star topology along with the logic of a(n) ring topology. _________________________
ANS: T PTS: 1 REF: 67
7.A(n) broadcast frame is one that is sent to all points on the network. _________________________
ANS: T PTS: 1 REF: 70
8.A(n) T-carrier line is a dedicated telephone line that can be used for data communications to connect two different locations for continuous point-to-point communications. _________________________
ANS: T PTS: 1 REF: 74
9.Throughput is the transmission capacity of a communications medium, which is typically measured in bits per second or hertz, and which is determined by the maximum minus the minimum transmission capacity. _________________________
ANS: F, Bandwidth
PTS: 1 REF: 77
MULTIPLE CHOICE
1.The OSI is the product of which standards organization?
a. |
ISO |
c. |
IEEE |
b. |
ANSI |
d. |
Both A and B. |
ANS: D PTS: 1 REF: 42
2.____ encoding assigns a binary value to the presence of a particular signal state.
a. |
Binary |
c. |
State-transition |
b. |
Current-state |
d. |
Basic |
ANS: B PTS: 1 REF: 45
3.____ encoding simply checks for a change in the signal state, from low to high or high to low.
a. |
Binary |
c. |
State-transition |
b. |
Current-state |
d. |
Basic |
ANS: C PTS: 1 REF: 45
4.EMI is a source of ____ layer interference.
a. |
Data Link |
c. |
Physical |
b. |
Network |
d. |
Transport |
ANS: C PTS: 1 REF: 46
5.The MAC sublayer of the Data Link layer does not ____.
a. |
ensure reliable communications by initiating a communications link between two nodes and then guarding them against interruptions to the link |
b. |
examine the physical or device address information contained in each frame |
c. |
regulate how multiple devices share communications on the same network |
d. |
None of the above. |
ANS: A PTS: 1 REF: 47
6.A device’s MAC address is coded as a ____ number.
a. |
binary |
c. |
hexadecimal |
b. |
decimal |
d. |
None of the above. |
ANS: C PTS: 1 REF: 47
7.____ is a process used by routers that involves gathering information about how many nodes are on a network and where they are located.
a. |
Encryption |
c. |
Beaconing |
b. |
Broadcasting |
d. |
Discovery |
ANS: D PTS: 1 REF: 48
8.The ____ layer offers a way to set up half- and full-duplex communications.
a. |
Communications |
c. |
Session |
b. |
Network |
d. |
Transport |
ANS: C PTS: 1 REF: 51
9.____ protocols enable an OSI layer on a sending node to communicate with the same layer on the receiving node.
a. |
Layer |
c. |
Link |
b. |
Peer |
d. |
Transfer |
ANS: B PTS: 1 REF: 54
10.A primitive is ____.
a. |
a command used to transfer information from one layer in an OSI stack to another layer |
b. |
the smallest unit of data allowed in the Physical layer |
c. |
a command used to transfer information from an OSI layer on the sending node to the same layer on the receiving node |
d. |
Both A and B. |
ANS: A PTS: 1 REF: 55
There are no reviews yet.