Exam 7: Data Networking Fundamentals
Exam 1: Telecommunications Overview92 Questions
Exam 2: Principles of Telecommunications Technology83 Questions
Exam 3: The Evolution of Telecommunications Technology and Policy93 Questions
Exam 4: The Public Network94 Questions
Exam 5: Customer Premise Equipment and Applications94 Questions
Exam 6: Signaling and Switching93 Questions
Exam 7: Data Networking Fundamentals89 Questions
Exam 8: Physical Transmission Media94 Questions
Exam 9: Wireless Transmission and Services95 Questions
Exam 10: Network Access and Transmission Methods93 Questions
Exam 11: Data Network Connectivity92 Questions
Exam 12: Internet Standards and Services91 Questions
Exam 13: Information Security92 Questions
Exam 14: Convergence of Voice, Video, and Data93 Questions
Select questions type
Which of the following is a method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data?
(Multiple Choice)
4.9/5
(28)
What term is used to describe a computer that is connected to a network that has a unique address?
(Short Answer)
4.8/5
(24)
Match each statement below with the correct item
-An IP address reserved for communicating from a node to itself.
(Multiple Choice)
4.8/5
(33)
The symbolic name that resolves to a group of IP addresses is referred to as a(n) ____________________.
(Short Answer)
4.9/5
(29)
The process of reconstructing data units that have been segmented is known as:
(Multiple Choice)
4.8/5
(45)
A network in which clients use a central server to share data, data storage space, programs, and other devices is known as:
(Multiple Choice)
4.8/5
(35)
Match each statement below with the correct item
-The use of an algorithm to scramble data so that it can only be read by reversing the formula.
(Multiple Choice)
4.8/5
(33)
The process of using an algorithm to decode a transmission and reveal encrypted data is known as:
(Multiple Choice)
4.8/5
(29)
The use of an algorithm to scramble data so that it can only be read by reversing the formula is known as decryption. _________________________
(True/False)
4.9/5
(27)
Does the term authentication refer to a piece of hardware in which a cable terminates?
(True/False)
4.9/5
(29)
Which of the following is the symbolic name that make up a network device's MAC address?
(Multiple Choice)
4.8/5
(38)
Which of the following belongs to the Internet layer of the TCP/IP model and provides information about how and where data should be delivered?
(Multiple Choice)
4.9/5
(35)
Does the term host refer to a connectivity device that operates at the Physical layer of the OSI Model?
(True/False)
4.7/5
(36)
The process of using an algorithm to decode a transmission and reveal encrypted data is reassembly.
(True/False)
4.9/5
(35)
Does a frame contain the sender's and receiver's network addresses and control and control information?
(True/False)
4.9/5
(34)
A package for data that includes not only the raw data, but also the sender's and receiver's network address and control information is known as:
(Multiple Choice)
4.9/5
(27)
What term is used to describe the second of six characters that make up a network device's MAC address?
(Short Answer)
4.7/5
(31)
The practice of using more than one component to guard against outages is known as:
(Multiple Choice)
4.8/5
(29)
Showing 41 - 60 of 89
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)