Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks
Exam 1: Introduction to Computer Networks and Data Communications76 Questions
Exam 2: Fundamentals of Data and Signals100 Questions
Exam 3: Conducted and Wireless Media103 Questions
Exam 4: Making Connections79 Questions
Exam 5: Making Connections Efficient: Multiplexing and Compression96 Questions
Exam 6: Errors, Error Detection, and Error Control75 Questions
Exam 7: Local Area Networks: Part I99 Questions
Exam 8: Local Area Networks: Part II113 Questions
Exam 9: Introduction to Metropolitan Area Networks and Wide Area Networks101 Questions
Exam 10: The Internet100 Questions
Exam 11: Voice and Data Delivery Networks97 Questions
Exam 12: Network Security100 Questions
Exam 13: Network Design and Management99 Questions
Select questions type
A network limit, called the ____, can be placed on how many times any packet is copied.
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
A
The sub-network of a wide area network is the logical infrastructure and thus consists of nodes and various types of interconnecting media.
Free
(True/False)
4.7/5
(36)
Correct Answer:
False
____ and distributed routing are methods for controlling routing information.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
D
A ____ profile describes various characteristics about the connection, such as basic data transfer rates, basic burst rates, excess data transfer rates, and excess burst rates.
(Multiple Choice)
4.9/5
(34)
Each time a packet is copied, a counter associated with the packet increases by one. This counter is called the ____.
(Multiple Choice)
4.8/5
(41)
In ____, before one node sends a series of n packets to another node, the sending node inquires in advance whether the receiving node has enough buffer space for the n packets.
(Multiple Choice)
4.8/5
(34)
A(n) ____________________ is a collection of nodes and interconnecting telecommunications links.
(Short Answer)
4.9/5
(31)
The underlying sub-network of a connectionless application cannot be a circuit-switched network.
(True/False)
4.9/5
(36)
____ is advantageous when a copy of a packet needs to get to all nodes.
(Multiple Choice)
4.9/5
(33)
When a user stores data in "the cloud", the data is stored on the user's premise in what is called a "cloud server".
(True/False)
4.9/5
(45)
A feature that is fairly common in ____ is the ability of a user to dynamically allocate more bandwidth on demand.
(Multiple Choice)
4.8/5
(28)
The three basic types of subnetworks are ____, packet-switched, and broadcast.
(Multiple Choice)
4.9/5
(36)
A ____ is a legally binding, written document, that can include service parameters offered in the service, various types of service/support options, incentives if the service levels are exceeded, and penalties if service levels are not met.
(Multiple Choice)
4.8/5
(39)
A(n) ____________________ network application provides some guarantee that information traveling through the network will not be lost.
(Short Answer)
4.9/5
(39)
The ____-switched network is most often found in networks designed to transfer computer data (such as the Internet).
(Multiple Choice)
4.9/5
(41)
A connection-oriented network application provides what is called a(n) ___________ service.
(Short Answer)
4.9/5
(32)
One of the primary advantages of ____ routing is the fact that no single node is responsible for maintaining all routing information.
(Multiple Choice)
4.9/5
(32)
Showing 1 - 20 of 101
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)