Deck 2: Network Topology

Full screen (f)
exit full mode
Question
The connections for the ____ of a network may be provided through dedicated phone lines, twisted pair cable, fiber optic cable line-of-sight microwave RF, ATM, or other form of electronic connection.

A) physical topology
B) virtual topology
C) physical infrastructure
D) virtual interconnection
Use Space or
up arrow
down arrow
to flip the card.
Question
Companies that connect to a NAP enter into ____ agreements with each other that allow them to exchange traffic.

A) posting
B) partner
C) peering
D) polling
Question
The network cloud may comprise only the network found in a small laboratory, or it may represent an entire wide area network (WAN) such as the Internet.
Question
A ____ uses public network connections to establish private communication by encrypting the data transmitted between the two computers at each end of the connection.

A) NPV
B) VN
C) PVN
D) VPN
Question
A ____ is a portion of a network.

A) subnet
B) subunit
C) slice
D) subdivision
Question
____________________ is a logical, not physical, activity and is accomplished using a special subnet mask, such as 255.255.255.192.
Question
Token-ring networks, although logically viewed as rings, are connected using central ____.

A) media access units
B) multistation access units
C) station access units
D) access units
Question
Even if the encrypted traffic is intercepted, chances are very small that the contents can be decrypted if a suitably strong encryption method and key are used.
Question
In a bus network, if two or more nodes transmit data at the same time, a ____ occurs.

A) collision
B) compression
C) collusion
D) contention
Question
A(n) ____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.
Question
In a fully connected network, the number of connections at each node equals the total number of nodes plus one.
Question
A(n) ____________________ circuit is a prearranged path through the network that all packets will travel for a particular session between machines.
Question
With certain types of network communications, it is possible that duplicate packets of data are generated if an acknowledgement is not received by the source computer.
Question
In terms of security and reliability, we must concern ourselves with what is required to ____________________ our network.
Question
A ____ network uses a single shared common communication media that all nodes tap into.

A) ring
B) star
C) bus
D) string
Question
Seven fully connected nodes require ____ links.

A) 14
B) 21
C) 28
D) 35
Question
A(n) ____ is a 32-bit number used to locate and identify nodes on the Internet.

A) MAC address
B) TCP address
C) Ethernet address
D) IP address
Question
When a large amount of data must be sent between machines on a network, it is possible to set up a ____ between the machines.

A) permanent circuit
B) virtual circuit
C) virtual interface
D) physical interface
Question
In a star network, all nodes connect to a central communications ____________________.
Question
A network that can be partitioned is secure and reliable.
Question
Match between columns
Concerns the structure of the connections between the computers in a network
Topology
Concerns the structure of the connections between the computers in a network
Cloud
Concerns the structure of the connections between the computers in a network
Logical topology
Concerns the structure of the connections between the computers in a network
Tunnels
Concerns the structure of the connections between the computers in a network
NAPs
Logical connections between the nodes of the VPN
Topology
Logical connections between the nodes of the VPN
Cloud
Logical connections between the nodes of the VPN
Logical topology
Logical connections between the nodes of the VPN
Tunnels
Logical connections between the nodes of the VPN
NAPs
A graphical symbol used to describe a network without specifying the nature of the connections
Topology
A graphical symbol used to describe a network without specifying the nature of the connections
Cloud
A graphical symbol used to describe a network without specifying the nature of the connections
Logical topology
A graphical symbol used to describe a network without specifying the nature of the connections
Tunnels
A graphical symbol used to describe a network without specifying the nature of the connections
NAPs
Provide access to national and global network traffic
Topology
Provide access to national and global network traffic
Cloud
Provide access to national and global network traffic
Logical topology
Provide access to national and global network traffic
Tunnels
Provide access to national and global network traffic
NAPs
Has to do with the path a packet of data takes through the network
Topology
Has to do with the path a packet of data takes through the network
Cloud
Has to do with the path a packet of data takes through the network
Logical topology
Has to do with the path a packet of data takes through the network
Tunnels
Has to do with the path a packet of data takes through the network
NAPs
Question
Describe a private network.
Question
Describe a mesh network.
Question
Discuss subnetting.
Question
Describe a hybrid network.
Question
Discuss the difference between a hub and a switch.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Network Topology
1
The connections for the ____ of a network may be provided through dedicated phone lines, twisted pair cable, fiber optic cable line-of-sight microwave RF, ATM, or other form of electronic connection.

A) physical topology
B) virtual topology
C) physical infrastructure
D) virtual interconnection
A
2
Companies that connect to a NAP enter into ____ agreements with each other that allow them to exchange traffic.

A) posting
B) partner
C) peering
D) polling
C
3
The network cloud may comprise only the network found in a small laboratory, or it may represent an entire wide area network (WAN) such as the Internet.
True
4
A ____ uses public network connections to establish private communication by encrypting the data transmitted between the two computers at each end of the connection.

A) NPV
B) VN
C) PVN
D) VPN
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
A ____ is a portion of a network.

A) subnet
B) subunit
C) slice
D) subdivision
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
____________________ is a logical, not physical, activity and is accomplished using a special subnet mask, such as 255.255.255.192.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
Token-ring networks, although logically viewed as rings, are connected using central ____.

A) media access units
B) multistation access units
C) station access units
D) access units
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
Even if the encrypted traffic is intercepted, chances are very small that the contents can be decrypted if a suitably strong encryption method and key are used.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
In a bus network, if two or more nodes transmit data at the same time, a ____ occurs.

A) collision
B) compression
C) collusion
D) contention
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A(n) ____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
In a fully connected network, the number of connections at each node equals the total number of nodes plus one.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
A(n) ____________________ circuit is a prearranged path through the network that all packets will travel for a particular session between machines.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
With certain types of network communications, it is possible that duplicate packets of data are generated if an acknowledgement is not received by the source computer.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
In terms of security and reliability, we must concern ourselves with what is required to ____________________ our network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ network uses a single shared common communication media that all nodes tap into.

A) ring
B) star
C) bus
D) string
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
Seven fully connected nodes require ____ links.

A) 14
B) 21
C) 28
D) 35
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ is a 32-bit number used to locate and identify nodes on the Internet.

A) MAC address
B) TCP address
C) Ethernet address
D) IP address
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
When a large amount of data must be sent between machines on a network, it is possible to set up a ____ between the machines.

A) permanent circuit
B) virtual circuit
C) virtual interface
D) physical interface
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
In a star network, all nodes connect to a central communications ____________________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
A network that can be partitioned is secure and reliable.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
Concerns the structure of the connections between the computers in a network
Topology
Concerns the structure of the connections between the computers in a network
Cloud
Concerns the structure of the connections between the computers in a network
Logical topology
Concerns the structure of the connections between the computers in a network
Tunnels
Concerns the structure of the connections between the computers in a network
NAPs
Logical connections between the nodes of the VPN
Topology
Logical connections between the nodes of the VPN
Cloud
Logical connections between the nodes of the VPN
Logical topology
Logical connections between the nodes of the VPN
Tunnels
Logical connections between the nodes of the VPN
NAPs
A graphical symbol used to describe a network without specifying the nature of the connections
Topology
A graphical symbol used to describe a network without specifying the nature of the connections
Cloud
A graphical symbol used to describe a network without specifying the nature of the connections
Logical topology
A graphical symbol used to describe a network without specifying the nature of the connections
Tunnels
A graphical symbol used to describe a network without specifying the nature of the connections
NAPs
Provide access to national and global network traffic
Topology
Provide access to national and global network traffic
Cloud
Provide access to national and global network traffic
Logical topology
Provide access to national and global network traffic
Tunnels
Provide access to national and global network traffic
NAPs
Has to do with the path a packet of data takes through the network
Topology
Has to do with the path a packet of data takes through the network
Cloud
Has to do with the path a packet of data takes through the network
Logical topology
Has to do with the path a packet of data takes through the network
Tunnels
Has to do with the path a packet of data takes through the network
NAPs
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
Describe a private network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
Describe a mesh network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss subnetting.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
Describe a hybrid network.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
Discuss the difference between a hub and a switch.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 26 flashcards in this deck.