Exam 7: Data Networking Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is a method of gauging the appropriate rate of data transmission based on how fast the recipient can accept data?

(Multiple Choice)
4.9/5
(28)

What term is used to describe a computer that is connected to a network that has a unique address?

(Short Answer)
4.8/5
(24)

Match each statement below with the correct item -An IP address reserved for communicating from a node to itself.

(Multiple Choice)
4.8/5
(33)

The symbolic name that resolves to a group of IP addresses is referred to as a(n) ____________________.

(Short Answer)
4.9/5
(29)

The process of reconstructing data units that have been segmented is known as:

(Multiple Choice)
4.8/5
(45)

A network in which clients use a central server to share data, data storage space, programs, and other devices is known as:

(Multiple Choice)
4.8/5
(35)

Match each statement below with the correct item -The use of an algorithm to scramble data so that it can only be read by reversing the formula.

(Multiple Choice)
4.8/5
(33)

The process of using an algorithm to decode a transmission and reveal encrypted data is known as:

(Multiple Choice)
4.8/5
(29)

The use of an algorithm to scramble data so that it can only be read by reversing the formula is known as decryption. _________________________

(True/False)
4.9/5
(27)

Does the term authentication refer to a piece of hardware in which a cable terminates?

(True/False)
4.9/5
(29)

Which of the following is the symbolic name that make up a network device's MAC address?

(Multiple Choice)
4.8/5
(38)

What is the name of the seventh layer of the OSI model?

(Short Answer)
4.8/5
(32)

Which of the following belongs to the Internet layer of the TCP/IP model and provides information about how and where data should be delivered?

(Multiple Choice)
4.9/5
(35)

Does the term host refer to a connectivity device that operates at the Physical layer of the OSI Model?

(True/False)
4.7/5
(36)

The process of using an algorithm to decode a transmission and reveal encrypted data is reassembly.

(True/False)
4.9/5
(35)

Does a frame contain the sender's and receiver's network addresses and control and control information?

(True/False)
4.9/5
(34)

A package for data that includes not only the raw data, but also the sender's and receiver's network address and control information is known as:

(Multiple Choice)
4.9/5
(27)

What term is used to describe the second of six characters that make up a network device's MAC address?

(Short Answer)
4.7/5
(31)

The practice of using more than one component to guard against outages is known as:

(Multiple Choice)
4.8/5
(29)

  What kind of network is shown in the figure above? What kind of network is shown in the figure above?

(Short Answer)
4.9/5
(33)
Showing 41 - 60 of 89
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)