Exam 2: How Lan and Wan Communications Work
Exam 1: Networking: an Overview42 Questions
Exam 2: How Lan and Wan Communications Work42 Questions
Exam 3: Using Network Communication Protocols42 Questions
Exam 4: Connecting Through a Cabled Network42 Questions
Exam 5: Devices for Connecting Networks42 Questions
Exam 6: Connecting Through a Wireless Network42 Questions
Exam 7: Sharing Resources on a Network42 Questions
Exam 8: Using a Server42 Questions
Exam 9: Understanding Wan Connection Choices42 Questions
Exam 10: Basic Network Design42 Questions
Exam 11: Securing Your Network42 Questions
Exam 12: Maintaining and Troubleshooting Your Network42 Questions
Select questions type
Ethernet transport (the IEEE 802.3 specification), takes advantage of the ____ and star topologies.
(Multiple Choice)
4.9/5
(34)
Computer programmers use the ____ layer to connect workstations to network services, such as linking an application into electronic mail.
(Multiple Choice)
4.8/5
(33)
____ circuits are logical communication paths set up to send and receive data.
(Multiple Choice)
4.9/5
(40)
A(n)____ line is a dedicated telephone line that can be used for data communications to connect two different locations for continuous point-to-point communications.
(Multiple Choice)
4.9/5
(27)
____ is a process that scrambles the data so that it cannot be read if intercepted by unauthorized users.
(Multiple Choice)
5.0/5
(27)
LAN and WAN communications have been generally guided by a network communications model called the ___________________________________ reference model.
(Short Answer)
4.9/5
(23)
Provide a high-level description of the bottom, middle, and top layers of the OSI model.
(Essay)
4.8/5
(29)
Describe the role of the headend in the star topology of a Cable TV WAN.
(Essay)
4.8/5
(39)
If no broadcasts are detected from the active monitor or any one of the standby monitors, a ring goes into a ____ condition.
(Multiple Choice)
4.9/5
(42)
The ____________________ layer of the OSI model controls the passage of packets along routes on the network.
(Short Answer)
4.8/5
(28)
The token ring transport method uses a physical ____ topology along with the logic of a ring topology.
(Multiple Choice)
4.8/5
(32)
What is the role of the media access control (MAC)sublayer of the Data Link layer?
(Essay)
5.0/5
(36)
Information from one layer is transferred to the next by means of commands called ____.
(Multiple Choice)
4.9/5
(28)
In a connectionless service, there is no acknowledgment that a frame has been received.
(True/False)
4.8/5
(44)
____ communications in FDDI networks are used for time-sensitive transmissions requiring continuous transmission.
(Multiple Choice)
4.8/5
(40)
A Class ____ protocol within the Transport layer provides an option to recover lost packets in certain situations.
(Multiple Choice)
4.9/5
(33)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)