Name:     ID: 
 
Email: 

cis 101 ch-7

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Which of the following is NOT an example of a network node?
a.
A modem
c.
A computer
b.
A printer
d.
An NOS
 

 2. 

A computer network is defined as two or more computers connected via ____________________ so that they can communicate with each other.
a.
the Internet
c.
hardware
b.
software
d.
software and hardware
 

 3. 

Networks allow users to share:
a.
peripherals
c.
paper
b.
flash drives
d.
phones
 

 4. 

A ____________ allows sharing of a broadband Internet connection.
a.
phone cord
c.
HPNA adapter
b.
hub
d.
router
 

 5. 

Network architectures are classified according to:
a.
the way in which they are controlled and the distance between their nodes
c.
the bandwidth supplied by the connection
b.
the distance between the hub and the router.
d.
the speed at which the processor runs
 

 6. 

The most common type of home network is:
a.
a token ring LAN
c.
a client/server network
b.
a peer-to-peer (P2P) network
d.
a WAN
 

 7. 

In a client/server network, there are usually many more _____________ than _____________.
a.
servers, clients
c.
clients, servers
b.
printers, computers
d.
clients, computers
 

 8. 

A network that has ten or more nodes is usually configured as a:
a.
client/server network
c.
peer-to-peer network
b.
home network
d.
LAN
 

 9. 

Which of the following is NOT an example of a WAN:
a.
LANs connected in a single building
c.
A computer at a bank’s main branch connected with a LAN at the bank’s branch office across town
b.
A LAN at the main university campus connected with a LAN at the university extension site
d.
The computers in a lab at your school connected to the computers in a lab at another school in your town
 

 10. 

Which transmission media is able to transmit data the fastest?
a.
Twisted pair cable
c.
Fiber optic cable
b.
Coaxial cable
d.
Wireless
 

 11. 

The data transfer rate of a wireless network is usually measured in:
a.
Kbps
c.
Tbps
b.
Gbps
d.
Mbps
 

 12. 

Throughput is the actual speed of data transfer that is achieved in a network and is usually:
a.
more than the data transfer rate
c.
less than the data transfer rate
b.
the same as the data transfer rate
d.
dependent on the cable’s bend radius
 

 13. 

Network adapters:
a.
enable nodes in a network to communicate with each other
c.
are always Ethernet NICs
b.
are built into the motherboard on each node
d.
are only necessary on servers in a client/server network
 

 14. 

Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
a.
USB ports
c.
Network interface cards (NICs)
b.
Firewalls
d.
Routers and switches
 

 15. 

Client/server networks are controlled by a central server that runs a specialized piece of software called:
a.
Windows Vista
c.
a firewall.
b.
a network operating system (NOS)
d.
Netware
 

 16. 

A central server in a large client/server network could be running any of the following EXCEPT:
a.
Windows Vista Enterprise
c.
Windows XP Home
b.
Windows XP Professional
d.
Windows Server 2003
 

 17. 

The major difference in types of P2P networks is the _________________ by which the nodes are connected.
a.
software
c.
network interface card
b.
port
d.
transmission medium
 

 18. 

Ethernet networks are named for:
a.
the type of NIC installed in every node
c.
the type of transmission media used
b.
the protocol used
d.
the type of operating system installed on every node
 

 19. 

An Ethernet adapter is a:
a.
specific type of NIC.
c.
transmission medium
b.
specific type of router
d.
device that uses a simple algorithm to move data
 

 20. 

The most popular transmission media option for wired Ethernet networks is:
a.
unshielded twisted-pair cable (UTP)
c.
power-line cable
b.
fiber optic cable
d.
coaxial cable
 

 21. 

Maximum cable runs (length) for Ethernet networks using UTP cable is approximately:
a.
50 feet
c.
550 feet
b.
330 feet
d.
1,100 feet
 

 22. 

If a home network is connected to the Internet, which of the following do you need to send data between the home network and the Internet?
a.
A cable
c.
A switch
b.
A hub
d.
A router
 

 23. 

A wireless network uses which of the following as its transmission media?
a.
Laser waves
c.
Sound waves
b.
Fiber-optic waves
d.
Radio waves
 

 24. 

Which of the following devices translates electronic data into radio waves?
a.
A modem
c.
A transceiver
b.
A fiber-optic cable
d.
A receiver
 

 25. 

Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
a.
A wireless network adapter
c.
A transceiver
b.
A power-line adapter
d.
A modem
 

 26. 

Which of the following devices is needed to share an Internet connection on a wireless network?
a.
A wireless hub
c.
A wireless router
b.
A fiber optic cable
d.
A modem
 

 27. 

If you frequently transfer large data files between nodes on a network, which of the following networks would be the best choice?
a.
Dial-up
c.
Ethernet
b.
Powerline
d.
Wireless
 

 28. 

To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT:
a.
Reposition the computer you are using
c.
Move your computer next to a cement wall.
b.
Move the computers in the network closer together
d.
Add a wireless access point (WAP) to the network.
 

 29. 

Most ________________ allow you to connect wireless and wired computers to the same network.
a.
wireless routers
c.
transceivers
b.
servers
d.
modems
 

 30. 

Public places at which you can wirelessly connect to the Internet are known as:
a.
links
c.
wired spots.
b.
hotspots
d.
gateways
 

 31. 

All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:
a.
Power-line networks cost less.
c.
You’re experiencing interference with a wireless Ethernet network
b.
You don’t need to run new wires with a power-line network
d.
Power-line networks can be easier to install
 

 32. 

When setting up a network, you should set up any computers running the Microsoft Vista operating system:
a.
first
c.
only before any computers running Linux
b.
last
d.
The order does not matter
 

 33. 

The weakest link in any computer security system is:
a.
the operating system
c.
USB ports
b.
the network
d.
its users
 

 34. 

What is the best thing a company can do to prevent its electronic data from being stolen?
a.
Establish detailed security policies
c.
Shut off access on computers to flash drives
b.
Disconnect employees’ computers from the Internet
d.
Install hidden cameras
 

 35. 

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
a.
Social networking
c.
Phishing
b.
Cybercrime
d.
Hacking
 

 36. 

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
a.
learn and use your credit card information to purchase items illegally
c.
steal your logon and passwords for various accounts
b.
assume your identity
d.
launch a denial of service (DoS) attack on your computer
 

 37. 

Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background?
a.
A virus
c.
A worm
b.
A Trojan horse
d.
A zombie
 

 38. 

Distributed denial of service (DDoS) attacks have been associated with:
a.
attacks on famous blogs, eBay, and Amazon.com
c.
misuse of credit card information
b.
identity theft
d.
theft of financial data at the IRS
 

 39. 

The most likely method a hacker would take to access a computer is:
a.
sitting down at a computer and installing hacking software
c.
through a company intranet
b.
overhearing your password and/or log-on information
d.
through the Internet
 

 40. 

Rules for creating passwords include all of the following EXCEPT:
a.
Keep your password a secret
c.
Change your password frequently
b.
Keep you password written down, and put it in your wallet
d.
Create hard-to-guess passwords, with a combination of letters and numbers
 



 
         Start Over