Multiple Choice Identify the choice that best completes the
statement or answers the question.
|
|
1.
|
Which of the following is NOT an example of a
network node?
a. | A modem | c. | A computer | b. | A printer | d. | An NOS |
|
|
2.
|
A computer network is defined as two or more
computers connected via ____________________ so that they can communicate with each
other.
a. | the Internet | c. | hardware | b. | software | d. | software and
hardware |
|
|
3.
|
Networks allow users to share:
a. | peripherals | c. | paper | b. | flash drives | d. | phones |
|
|
4.
|
A ____________ allows sharing of a broadband
Internet connection.
a. | phone cord | c. | HPNA adapter | b. | hub | d. | router |
|
|
5.
|
Network architectures are classified according
to:
a. | the way in which they are controlled and the distance between their
nodes | c. | the bandwidth supplied by the connection | b. | the distance between
the hub and the router. | d. | the
speed at which the processor runs |
|
|
6.
|
The most common type of home network
is:
a. | a token ring LAN | c. | a client/server network | b. | a peer-to-peer (P2P)
network | d. | a
WAN |
|
|
7.
|
In a client/server network, there are usually
many more _____________ than _____________.
a. | servers, clients | c. | clients, servers | b. | printers, computers | d. | clients,
computers |
|
|
8.
|
A network that has ten or more nodes is usually
configured as a:
a. | client/server network | c. | peer-to-peer network | b. | home network | d. | LAN |
|
|
9.
|
Which of the following is NOT an example of a
WAN:
a. | LANs connected in a single building | c. | A computer at a bank’s main
branch connected with a LAN at the bank’s branch office across town | b. | A LAN at the main
university campus connected with a LAN at the university extension site | d. | The computers in a lab at your school connected
to the computers in a lab at another school in your town |
|
|
10.
|
Which transmission media is able to transmit
data the fastest?
a. | Twisted pair cable | c. | Fiber optic cable | b. | Coaxial cable | d. | Wireless |
|
|
11.
|
The data transfer rate of a wireless network is
usually measured in:
|
|
12.
|
Throughput is the actual speed of data
transfer that is achieved in a network and is usually:
a. | more than the data transfer rate | c. | less than the data transfer
rate | b. | the same as the data transfer rate | d. | dependent on the cable’s bend
radius |
|
|
13.
|
a. | enable nodes in a network to communicate with each other | c. | are always Ethernet
NICs | b. | are built into the motherboard on each node | d. | are only necessary on servers in a
client/server network |
|
|
14.
|
Sophisticated networks generally use which of
the following hardware devices to ease the flow of data packets throughout the network?
a. | USB ports | c. | Network interface cards (NICs) | b. | Firewalls | d. | Routers and switches |
|
|
15.
|
Client/server networks are controlled by a
central server that runs a specialized piece of software called:
a. | Windows Vista | c. | a firewall. | b. | a network operating system
(NOS) | d. | Netware |
|
|
16.
|
A central server in a large client/server
network could be running any of the following EXCEPT:
a. | Windows Vista Enterprise | c. | Windows XP Home | b. | Windows XP
Professional | d. | Windows Server
2003 |
|
|
17.
|
The major difference in types of P2P networks is
the _________________ by which the nodes are connected.
a. | software | c. | network interface card | b. | port | d. | transmission medium |
|
|
18.
|
Ethernet networks are named for:
a. | the type of NIC installed in every node | c. | the type of transmission media
used | b. | the protocol used | d. | the type of operating system installed on every node |
|
|
19.
|
An Ethernet adapter is a:
a. | specific type of NIC. | c. | transmission medium | b. | specific type of router | d. | device that uses a simple algorithm to move
data |
|
|
20.
|
The most popular transmission media option for
wired Ethernet networks is:
a. | unshielded twisted-pair cable (UTP) | c. | power-line
cable | b. | fiber optic cable | d. | coaxial cable |
|
|
21.
|
Maximum cable runs (length) for Ethernet
networks using UTP cable is approximately:
a. | 50 feet | c. | 550 feet | b. | 330 feet | d. | 1,100 feet |
|
|
22.
|
If a home network is connected to the Internet,
which of the following do you need to send data between the home network and the
Internet?
a. | A cable | c. | A switch | b. | A hub | d. | A router |
|
|
23.
|
A wireless network uses which of the following
as its transmission media?
a. | Laser waves | c. | Sound waves | b. | Fiber-optic waves | d. | Radio waves |
|
|
24.
|
Which of the following devices translates
electronic data into radio waves?
a. | A modem | c. | A transceiver | b. | A fiber-optic cable | d. | A receiver |
|
|
25.
|
Which of the following network adapters is most
likely to be preinstalled in a typical notebook computer today?
a. | A wireless network adapter | c. | A transceiver | b. | A power-line
adapter | d. | A
modem |
|
|
26.
|
Which of the following devices is needed to
share an Internet connection on a wireless network?
a. | A wireless hub | c. | A wireless router | b. | A fiber optic cable | d. | A modem |
|
|
27.
|
If you frequently transfer large data files
between nodes on a network, which of the following networks would be the best choice?
a. | Dial-up | c. | Ethernet | b. | Powerline | d. | Wireless |
|
|
28.
|
To improve communication effectiveness in a
wireless network, you can do all of the following EXCEPT:
a. | Reposition the computer you are using | c. | Move your computer next to a cement
wall. | b. | Move the computers in the network closer together | d. | Add a wireless access point (WAP) to the
network. |
|
|
29.
|
Most ________________ allow you to connect
wireless and wired computers to the same network.
a. | wireless routers | c. | transceivers | b. | servers | d. | modems |
|
|
30.
|
Public places at which you can wirelessly
connect to the Internet are known as:
a. | links | c. | wired spots. | b. | hotspots | d. | gateways |
|
|
31.
|
All of the following are reasons for using a
power-line network instead of an Ethernet network EXCEPT:
a. | Power-line networks cost less. | c. | You’re experiencing
interference with a wireless Ethernet network | b. | You don’t need to run new wires with a
power-line network | d. | Power-line networks can be easier to install |
|
|
32.
|
When setting up a network, you should set up any
computers running the Microsoft Vista operating system:
a. | first | c. | only before any computers running Linux | b. | last | d. | The
order does not matter |
|
|
33.
|
The weakest link in any computer security system
is:
a. | the operating system | c. | USB ports | b. | the network | d. | its users |
|
|
34.
|
What is the best thing a company can do to
prevent its electronic data from being stolen?
a. | Establish detailed security policies | c. | Shut off access on computers to
flash drives | b. | Disconnect employees’ computers from the Internet | d. | Install hidden
cameras |
|
|
35.
|
Which of the following is formally defined as
any criminal action perpetrated primarily through the use of a computer?
a. | Social networking | c. | Phishing | b. | Cybercrime | d. | Hacking |
|
|
36.
|
A packet sniffer is a program that can enable a
hacker to do all of the following EXCEPT:
a. | learn and use your credit card information to purchase items illegally | c. | steal your logon
and passwords for various accounts | b. | assume your identity | d. | launch a denial of service (DoS) attack on your
computer |
|
|
37.
|
Which of the following is a program that appears
to be something useful or desirable but at the same time does something malicious in the
background?
a. | A virus | c. | A worm | b. | A Trojan horse | d. | A zombie |
|
|
38.
|
Distributed denial of service (DDoS) attacks
have been associated with:
a. | attacks on famous blogs, eBay, and Amazon.com | c. | misuse of credit card
information | b. | identity theft | d. | theft of financial data at the IRS |
|
|
39.
|
The most likely method a hacker would take to
access a computer is:
a. | sitting down at a computer and installing hacking software | c. | through a company
intranet | b. | overhearing your password and/or log-on information | d. | through the
Internet |
|
|
40.
|
Rules for creating passwords include all of the
following EXCEPT:
a. | Keep your password a secret | c. | Change your password
frequently | b. | Keep you password written down, and put it in your wallet | d. | Create hard-to-guess passwords, with a
combination of letters and numbers |
|