Preview (11 of 36 pages)

This Document Contains Chapters 1 to 4 Chapter 1 Review Questions 1. Which of the following is one of the three basic functions a computer performs? (Choose all that apply.) a. Processing b. Storage c. Input d. Networking e. Output Answer: a. Processing c. Input e. Output 2. The __________ executes instructions provided by computer programs. a. CPU b. GPU c. RAM d. HDD Answer: a. CPU 3. When a CPU is composed of two or more processors, each one is referred to as a(n) ________. a. Chip b. Core c. Thread d. Unit Answer: b. Core 4. Which of the following is considered long-term storage? (Choose all that apply.) a. Flash drive b. RAM c. Cache d. Hard drive e. SSD Answer: a. Flash drive d. Hard drive e. SSD 5. Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU? a. BIOS b. RAM c. Chipset d. GPU Answer: c. Chipset 6. You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have? a. USB b. PCI c. AGP d. PCI-Express Answer: d. PCI-Express 7. The time it takes for read/write heads to move to the correct spot on the platter is the __________. a. Latency b. Seek time c. Transfer time d. Access time Answer: b. Seek time 8. Which of the following is a task usually performed by the BIOS? (Choose all that apply.) a. Perform a POST. b. Load the OS kernel. c. Manage system files. d. Begin the boot procedure. e. Handle network communication. Answer: a. Perform a POST. d. Begin the boot procedure. 9. Place the following steps of the boot procedure in order. a. The OS is loaded into RAM. b. CPU starts. c. OS services are started. d. Power is applied. e. The POST is executed. f. Boot devices are searched. Answer: d. Power is applied. b. CPU starts. e. The POST is executed. f. Boot devices are searched. a. The OS is loaded into RAM. c. OS services are started. 10. Which of the following is a critical service provided by the OS? (Choose all that apply.) a. Network configuration b. Memory management c. Hardware manufacturing d. File system e. Application development Answer: b. Memory management d. File system 11. An OS’s capability to run more than one application or process at the same time is referred to which of the following? a. Multithreading b. Multiprocessing c. Multitasking d. Parallel processing Answer: c. Multitasking 12. You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC? a. Firmware b. Device driver c. BIOS update d. Operating system update Answer: b. Device driver 13. Which of the following requests information stored on another computer? a. Network server b. Network client c. Network switch d. Network router Answer: b. Network client 14. Choose the correct order for the process of a user attempting to access network resources: 1. Network protocol 2. Application 3. Network client 4. NIC driver Answer: 2. Application 3. Network client 1. Network protocol 4. NIC driver 15. TCP/IP is an example of which of the following? a. Network hardware b. Network topology c. Network architecture d. Network protocol Answer: d. Network protocol 16. In network communication, the __________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.) a. MAC b. IP c. Logical d. Physical Answer: a. MAC d. Physical 17. A(n) __________ message is used to determine whether a computer is listening on the network. a. Trace b. Ping c. Echo d. Query Answer: b. Ping 18. TCP/IP uses __________ to look up a computer’s IP address, given its name. a. DNS b. ARP c. ICMP d. HTTP Answer: a. DNS 19. The unit of information containing MAC addresses and an error-checking code that’s processed by the network interface layer is referred to as a __________. a. Packet b. Segment c. Frame d. Datagram Answer: c. Frame 20. Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following? a. Fragmentation b. Encapsulation c. Compression d. Encryption Answer: b. Encapsulation 21. You’re the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure? a. LAN b. WAN c. Internetwork d. MAN Answer: c. Internetwork 22. Which of the following best describes a client? a. A computer that stores data and applications for the network b. A computer’s primary role in the network is to run user applications and access network resources c. A computer that manages and provides resources to other computers d. A server that handles network traffic Answer: b. A computer’s primary role in the network is to run user applications and access network resources 23. You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install? a. Client-server network b. Peer-to-peer network c. Hybrid network d. WAN Answer: b. Peer-to-peer network 24. Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.) a. Decentralized data storage b. Inexpensive c. User-managed resources d. Centralized administration Answer: a. Decentralized data storage b. Inexpensive c. User-managed resources 25. A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following? a. LAN b. WAN c. MAN d. VPN Answer: a. LAN 26. At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have LANs connected via the local phone company. This configuration is an example of which of the following? (Choose the best answer.) a. MAN b. WAN c. LAN d. WLAN Answer: a. MAN 27. You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server? a. File server software b. Backup software c. Virtualization software d. Directory services Answer: d. Directory services 28. Peer-to-peer networks aren’t suitable in which of the following situations? a. Tight security is required b. A small number of users c. Limited budget d. Simple file sharing needs Answer: a. Tight security is required 29. Which of the following best describes a storage area network? a. Uses fiber optic cables to connect computers within a building b. Uses high-speed networking technologies to give servers fast access to large amounts of disk storage c. Provides wireless access to storage devices d. Connects multiple LANs across a city Answer: b. Uses high-speed networking technologies to give servers fast access to large amounts of disk storage 30. Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008? a. They include advanced networking features b. They support a larger number of simultaneous users c. They require more complex server roles d. They support a graphics-intensive user interface Answer: d. They support a graphics-intensive user interface Hands-On Projects Hands-On Project 1-1 Step 2: Steps of the boot procedure: 1. Power is applied to the motherboard. 2. CPU starts. 3. CPU carries out BIOS startup routines, include the POST. Step 5: Final steps of the boot procedure: 4. Boot devices are searched for an OS. 5. The OS is loaded into RAM. 6. OS services are started. Hands-On Project 1-3 Step 5: • Word-processing program: User application • NIC displayed in the Connect using text box: Network interface • Client for Microsoft Networks: Network software • File and Printer Sharing for Microsoft Networks: Network software • Internet Protocol Version 4: Network protocol Hands-On Project 1-5 Step 2: workgroup, peer-to-peer Hands-On Project 1-6 Step 10: File sharing, peer-to-peer Case Projects Case Project 1-1 A server-based network is the best choice. A peer-to-peer network might work for now, but when new employees are hired, a peer-to-peer network would be too difficult to manage. The key is that easy backup and centralized storage for files point to a server-based network. Case Project 1-2 Because employees must be able to control access to their own resources, a peer-to-peer model works best. Supplies will likely include NICs, cabling, and a switch. Students should state they need to configure file shares and possibly create user accounts on the computers to allow access by other users. They might also need to configure IP address settings, although self-configuring addresses could be used. Case Project 1-3 An internetwork is called for because LANs in the same building are being connected. A router is probably needed for communication between LANs on the two floors. Case Project 1-4 A personal area network (PAN) Chapter 2 Review Questions 1. Which of the following is a limitation of early networks that used a daisy-chain method of connecting computers? (Choose all that apply.) a. Total number of computers that could be connected b. Network speed c. Cable length d. Interference Answer: a. Total number of computers that could be connected c. Cable length 2. Which of the following is true of a repeater? a. Receives and processes data packets b. Forwards packets based on IP addresses c. Receives bit signals and strengthens them d. Creates a switching table Answer: c. Receives bit signals and strengthens them 3. Which of the following is true of a hub? (Choose all that apply.) a. Routes packets to specific destinations b. Transmits regenerated signals to all connected ports c. Usually has four or more ports d. Can create collision domains Answer: b. Transmits regenerated signals to all connected ports c. Usually has four or more ports 4. Which of the following is the unit of measurement by which a hub's bandwidth is usually specified? a. Hertz b. Bits per second c. Packets per second d. Bytes per second Answer: b. Bits per second 5. Which of the following describes how devices connected to a hub use the speed at which the hub can transmit data? a. Dedicated bandwidth b. Bandwidth aggregation c. Bandwidth sharing d. Bandwidth reservation Answer: c. Bandwidth sharing 6. Which of the following is a likely indicator light on a hub? (Choose all that apply.) a. Power b. Link status c. Connection speed d. Activity Answer: b. Link status c. Connection speed d. Activity 7. Which of the following describes how devices connected to a switch use the speed at which the switch can transmit data? a. Dedicated bandwidth b. Bandwidth sharing c. Bandwidth reservation d. Bandwidth aggregation Answer: a. Dedicated bandwidth 8. What does a switch use to create its switching table? a. IP addresses b. Network topology c. Data packet types d. Source MAC addresses Answer: d. Source MAC addresses 9. What purpose does the timestamp serve in a switching table? a. Logs the time of packet transmission b. Indicates when a switch port is active c. Tells the switch when to delete an entry d. Records the time of last network update Answer: c. Tells the switch when to delete an entry 10. What feature of a switch allows devices to effectively communicate at 200 Mbps on a 100 Mbps switch? a. Packet buffering b. Full-duplex mode c. Switch buffering d. Virtual LANs (VLANs) Answer: b. Full-duplex mode 11. To which device is a wireless access point most similar in how it operates? a. Hub b. Switch c. Router d. Repeater Answer: a. Hub 12. What’s the purpose of an RTS signal in wireless networking? a. It requests permission to connect to the network. b. It specifies the rate at which data is transmitted. c. It allows a client to notify the AP that it's ready to send data. d. It provides error-checking information. Answer: c. It allows a client to notify the AP that it's ready to send data. 13. Which of the following is a common operational speed of a wireless network? a. 54 Mbps b. 100 Mbps c. 1 Gbps d. 11 Mbps Answer: d. 11 Mbps 14. Which of the following is a task performed by a NIC and its driver? (Choose all that apply.) a. Provides a connection to the network medium b. Configures network routing c. Receives packets from the network protocol and creates frames d. Encrypts data for secure transmission e. Adds error-checking data to the frame Answer: a. Provides a connection to the network medium c. Receives packets from the network protocol and creates frames e. Adds error-checking data to the frame 15. Which of the following best describes a MAC address? a. A unique identifier used to identify devices on a network. b. Two 24-bit numbers, in which one is the OUI c. A 64-bit address used to route data across the internet. d. A temporary address assigned by a DHCP server. Answer: b. Two 24-bit numbers, in which one is the OUI 16. Under which circumstances does a NIC allow inbound communications to pass through the interface? (Choose all that apply.) a. The destination MAC address is a broadcast address. b. The destination MAC address matches the built-in MAC address. c. The destination MAC address is all binary 1s. d. The packet is addressed to a multicast group. Answer: b. The destination MAC address matches the built-in MAC address c. The destination MAC address is all binary 1s 17. How does a protocol analyzer capture all frames? a. It intercepts packets at the router. b. It collects data from all switches in the network. c. It configures the NIC to operate in promiscuous mode. d. It uses a dedicated hardware tap. Answer: c. It configures the NIC to operate in promiscuous mode. 18. In Windows 7, which of the following displays information about currently installed NICs? a. Network Connections b. Device Manager c. Network and Sharing Center d. Control Panel Answer: a. Network Connections 19. Which of the following is the purpose of an SSID? a. Encrypts wireless data transmissions. b. Manages network traffic. c. Authenticates users on a wireless network. d. Identifies a wireless network Answer: d. Identifies a wireless network 20. Which of the following describe the function of routers? (Choose all that apply.) a. Forward frames within a local network b. Connect LANS c. Create collision domains d. Work with packets and IP addresses Answer: b. Connect LANS d. Work with packets and IP addresses 21. What information is found in a routing table? a. IP addresses of neighboring routers b. Network addresses and interfaces c. Details of each network's bandwidth d. Logs of network traffic Answer: b. Network addresses and interfaces 22. You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with each other in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do? a. Increase the size of each switch. b. Add more switches to the network. c. Reorganize the network into smaller groups and connect each group to a router. d. Replace switches with hubs to reduce network traffic. Answer: c. Reorganize the network into smaller groups and connect each group to a router. 23. Review the routing table in Figure 2-29. Based on this figure, where will the router send a packet with the source network number 1.0 and the destination network number 3.0? a. WAN A b. LAN c. WAN B d. The packet will be dropped. Answer: c. WAN B 24. If a router receives a packet with a destination network address unknown to the router, what will the router do? a. Forward the packet to a default gateway. b. Discard the packet. c. Broadcast the packet to all network segments. d. Request more information from the source device. Answer: b. Discard the packet. 25. Which of the following is true about routers? (Choose all that apply.) a. They operate only at the data link layer. b. Use default routes for unknown network addresses c. Forward unicasts d. Operate in a half-duplex mode Answer: b. Use default routes for unknown network addresses c. Forward unicasts Challenge Labs Challenge Lab 2-1 • What filter options (if any) did you configure in Wireshark? Students should have created an ICMP filter for Wireshark. • What commands did you use to generate packets on the network? Students should ping each other to create traffic. • What IP addresses did you attempt to communicate with? Students should use IP addresses so that some ping traffic is directed to their computers and other pings are going to other computers on the network. • What was your result? Is your computer attached to a hub or switch? Why did you come to this conclusion? If all traffic was captured by Wireshark, including ping packets that weren’t sent to the student’s computer, a hub is being used. If only packets addressed to the student’s computer were captured, a switch is being used. Challenge Lab 2-2 • What type of packets does Trace Route use? Tracert in Windows uses ICMP packets; some Trace Route programs use UDP packets. • What is the response each router sends back to your computer? Each router sends a “TTL expired” message. • How does your computer get a response from each router between your computer and the destination? The TTL starts with a value of 1 and is incremented by 1 for each set of packets that’s sent. The packet’s TTL is decremented by each router encountering it. When the TTL reaches 0, the router that has the packet sends a "TTL expired" message back to the sending machine. In this way, the first set of packets with TTL=1 get to the first router, which decrements the TTL to 0 and sends a “TTL expired” message back to the sender. The second set of packets has a TTL of 2, so it gets to the second router before expiring and so on, until the destination device is reached. Chapter 5 covers more on TTL and ICMP. Case Projects Case Project 2-1 Because the main problem is caused by collisions, replacing some or all hubs with 10/100 Mbps switches should solve the problem. Switches would prevent most collisions, and the faster speed would also help with overall network response times. In addition, a switch can operate in full-duplex mode, allowing machines to send and receive data at the same time. NICs might have to be upgraded to take advantage of the faster speed and full-duplex mode. Cabling might need to be upgraded if it’s not at least Category 5. A router could also be added to divide the LAN into two smaller LANs, but this extra expense might be overkill to solve the problem. The problem doesn’t seem to be excessive broadcast traffic, which is one of the key problems routers solve. Adding a router to this network wouldn’t be incorrect—perhaps just unnecessary. Case Project 2-2 Because broadcast traffic is a key problem, a router should be configured to divide the LAN into two or more smaller LANs. In addition, the router must be configured correctly with IP addresses and the workstations configured with default gateways. Also, the workstations and servers on each IP network need to be configured with IP addresses suitable for the network they’re on. Chapter 5 covers more on IP addressing. Chapter 3 Review Questions 1. Which of the following describes the arrangement of network cabling between devices? a. Logical topology b. Logical bus c. Physical topology d. Network architecture Answer: c. Physical topology 2. Which of the following is an advantage of a star topology? (Choose all that apply.) a. Allows faster technologies than a bus does b. Requires less cabling than a bus topology c. Centralized monitoring of network traffic d. Simplifies troubleshooting Answer: a. Allows faster technologies than a bus does c. Centralized monitoring of network traffic 3. Which of the following is an example of a technology using a physical ring topology? a. Ethernet b. FDDI c. Token Ring d. Token Bus Answer: b. FDDI 4. Which technology is likely to be implemented as a point-to-point physical topology? a. Ethernet b. Token Ring c. FDDI d. Wireless bridge Answer: d. Wireless bridge 5. Which of the following describes a hub-based Ethernet network? a. Logical star b. Logical bus c. Logical ring d. Logical mesh Answer: b. Logical bus 6. Which of the following is a characteristic of a logical ring topology? (Choose all that apply.) a. Typically uses a central hub b. One technology uses an MAU c. It’s used by FDDI d. Some technologies use a token Answer: b. One technology uses an MAU c. It’s used by FDDI d. Some technologies use a token 7. Which best describes a typical wireless LAN? a. Logical star topology b. Logical mesh topology c. Logical bus topology d. Logical ring topology Answer: c. Logical bus topology 8. Which of the following is a characteristic of a switched logical topology? (Choose all that apply.) a. Uses a central hub b. Creates dynamic connections c. Uses a physical bus d. Uses a physical star topology Answer: b. Creates dynamic connections d. Uses a physical star topology 9. Which of the following is a characteristic of unshielded twisted-pair cabling? (Choose all that apply.) a. Supports high-speed connections up to 10 Gbps b. Typically used in fiber-optic networks c. Has a distance limitation of 100 meters d. Susceptible to electrical interference Answer: c. Has a distance limitation of 100 meters d. Susceptible to electrical interference 10. Which of the following is a characteristic of fiber-optic cabling? (Choose all that apply.) a. Can be used in electrically noisy environments b. Susceptible to electromagnetic interference c. Carries data over longer distances than UTP does d. Typically more expensive than UTP Answer: a. Can be used in electrically noisy environments c. Carries data over longer distances than UTP does 11. Which topology most likely uses coaxial cabling? a. Physical star b. Physical ring c. Physical bus d. Physical mesh Answer: c. Physical bus 12. Which of the following is true of a MAC address? a. It is a unique identifier assigned to each IP address. b. It can change depending on the network segment. c. A destination address of 12 hexadecimal Fs is a broadcast. d. It is used only for wireless networks. Answer: c. A destination address of 12 hexadecimal Fs is a broadcast. 13. Which of the following is the most commonly used Ethernet frame type? a. Ethernet II b. 802.3 c. 802.2 d. SNAP Answer: a. Ethernet II 14. Which of the following is a field of the most common Ethernet frame type? (Choose all that apply.) a. Header checksum b. Source IP Address c. Destination MAC Address d. Data e. FCS Answer: c. Destination MAC Address d. Data e. FCS 15. Which access method uses a “listen before sending” strategy? a. CSMA/CA b. CSMA/CD c. Token Passing d. Polling Answer: b. CSMA/CD 16. Which of the following is true about full-duplex Ethernet? (Choose all that apply.) a. Supports half-duplex communication. b. Collision detection is turned off. c. It’s possible only with switches. d. It uses CSMA/CD for collision management. Answer: b. Collision detection is turned off. c. It’s possible only with switches. 17. Which of the following is defined by the extent to which signals in an Ethernet bus topology network are propagated? a. Collision domain b. Broadcast domain c. Signal domain d. Collision window Answer: a. Collision domain 18. Which of the following is considered a property of Ethernet? (Choose all that apply.) a. Scalable b. Best-effort delivery system c. High latency d. Centralized management Answer: a. Scalable b. Best-effort delivery system 19. Which of the following is true of IEEE 802.3an? a. Operates at 10 Mbps b. Operates over fiber optics c. Supports half-duplex mode d. Operates only in full-duplex mode Answer: d. Operates only in full-duplex mode 20. Which of the following is a feature of 100BaseFX? (Choose all that apply.) a. Often used as backbone cabling b. Operates at 1000 Mbps c. Uses single-mode fiber d. Uses two strands of fiber Answer: a. Often used as backbone cabling d. Uses two strands of fiber 21. Which Wi-Fi standard can provide the highest bandwidth? a. 802.11a b. 802.11b c. 802.11n d. 802.11ac Answer: d. 802.11ac 22. Which of the following is true about infrastructure mode in wireless networks? (Choose all that apply.) a. Devices communicate directly with each other. b. Uses a central device c. Operates in ad-hoc mode d. Most like a logical bus and physical star Answer: b. Uses a central device d. Most like a logical bus and physical star 23. How many channels can be used on an 802.11b network in North America? a. 5 b. 8 c. 11 d. 14 Answer: c. 11 24. Which media access method does Wi-Fi use? a. CSMA/CD b. Token Passing c. Polling d. CSMA/CA Answer: d. CSMA/CA 25. Which of the following is true about the token ring technology? (Choose all that apply.) a. It uses a bus topology for physical cabling. b. All computers have equal access to the media. c. It is faster than Ethernet. d. Only the computer with the token can transmit data. Answer: b. All computers have equal access to the media d. Only the computer with the token can transmit data. Challenge Labs Challenge Lab 3-1 Example: • What type of device are the computers attached to? The computers are attached to a logical bus topology device, which is a hub. • What type of device is at the center of the extended star? The center of the extended star should be a switch because each switch port makes a collision domain. • How many collision domains are in this network? There's one collision domain for each connected switch port. In the sample drawing, there are four collision domains. Challenge Lab 3-2 • Which device in your extended star did you connect the AP to and why? To provide the best access for your wireless devices, the AP should be connected to the switch in the center of the extended star. • Which wireless mode are you using: ad hoc or infrastructure? Because you’re using an AP or wireless router, you’re using infrastructure mode. • What logical and physical topology does adding wireless bring to this network? The logical topology is a bus, and the physical topology is a star. Challenge Lab 3-3 • Approximately how many wireless networks did insider find? Answers will vary. • Which wireless channels are the most heavily used? Answers will vary. • If you were to set up a new wireless LAN based on what insider found, what channel would you use for the network? Answers will vary but should correlate with the answer to Question 2, in which students should choose one of the less heavily used channels. Case Projects Case Project 3-1 • What changes in equipment are required to bring this company’s network up to date to solve the shared-bandwidth problem? A switch, possibly working at a faster rate, such as 100 Mbps or 1 Gbps. • What topology and which type of device can be used in the manufacturing area to solve the cabling difficulties? Use a wireless AP in a star topology, and equip computers with wireless NICs, assuming there’s not substantial radio frequency interference to interfere with wireless signals. Case Project 3-2 • What type of topology should be used in this network? An extended star should be used, with a switch as the central device. • Will the network be peer to peer or server based? The discussion of EBiz.com’s requirements mentions five existing servers, without requiring the introduction of new servers, so this implementation obviously involves a server-based network. • How many computers will be attached to the network? Counting the servers, 255 computers (5 existing servers, 250 employee workstations). • What kind of networking device is easiest to reconfigure? What kind offers the best access to the network medium’s bandwidth between pairs of devices? These questions are a dead giveaway that the required solution must be built around a switch for the overall network. Case Project 3-3 • Will the network be peer to peer or server based? The discussion of ENorm, Inc.’s requirements mentions access to two separate centralized databases, so this network must be server based. • How many computers will be attached to the network? Counting the servers, and assuming all 20 workstations are attached in each factory floor work cell, a total of 92 computers (2 servers, 50 front-office employee workstations, and 40 factory floor employee workstations). • What topology works best for the offices, given the availability of wiring closets? What topology works best for the factory floor, given its need for constant reconfiguration? The availability of wiring closets for office workstations indicates that a physical star topology will work (the most commonly used in that kind of office situation); the need for constant reconfiguration on the factory floor indicates that a flexible solution is required. Normally, this requirement dictates wireless or bus topology solutions. Although a physical bus topology can be flexible, it’s not nearly as flexible as a wireless topology, and physical bus topologies are obsolete. Wireless is probably the best way to go, assuming the manufacturing space doesn’t use devices that emit radio frequency interference, such as microwave ovens, cordless handsets, and so forth. Chapter 4 Review Questions 1. Which of the following is a common characteristic of a networking medium? (Choose all that apply.) a. Bandwidth rating b. Interference susceptibility c. Maximum segment length d. Signal propagation speed Answer: a. Bandwidth rating b. Interference susceptibility c. Maximum segment length 2. Which of the following types of fiber-optic connectors provides high density and requires only one connector for two cables? a. SC b. LC c. MT-RJ d. ST Answer: c. MT-RJ 3. Which of the following conditions requires cables not to exceed a recommended maximum length? a. Signal loss b. Interference c. Crosstalk d. Attenuation Answer: d. Attenuation 4. Which of the following is the process for representing bit signals on the medium? a. Modulation b. Encoding c. Encryption d. Framing Answer: b. Encoding 5. What happens to signals as they travel the length of the medium? a. They amplify. b. They refract. c. They attenuate. d. They accelerate. Answer: c. They attenuate. 6. Which of the following is UTP susceptible to? (Choose all that apply.) a. EMI b. Crosstalk c. Signal reflection d. Attenuation Answer: a. EMI b. Crosstalk 7. The space between a false ceiling and the true ceiling where heating and cooling air circulates is called the __________. a. Raceway b. Riser c. Conduit d. Plenum Answer: d. Plenum 8. What type of connector is used most commonly with TP network wiring? a. LC b. RJ-45 c. SC d. MT-RJ Answer: b. RJ-45 9. You have been hired to install a network at a large government agency that wants to reduce the likelihood of electronic eavesdropping on its network. What type of cable is most resistant to eavesdropping? a. Coaxial b. Shielded twisted-pair c. Unshielded twisted-pair d. Fiber optic Answer: d. Fiber optic 10. Which of the following is a characteristic of unshielded twisted-pair cable? (Choose all that apply.) a. Supports high-speed connections up to 10 Gbps b. Typically used in fiber-optic networks c. Has a distance limitation of 100 meters d. Is susceptible to electrical interference Answer: c. Has a distance limitation of 100 meters d. Is susceptible to electrical interference 11. Which of the following is a characteristic of fiber-optic cabling? (Choose all that apply.) a. Can be used in electrically noisy environments b. Susceptible to electromagnetic interference c. Carries data over longer distances than UTP d. More affordable than UTP Answer: a. Can be used in electrically noisy environments c. Carries data over longer distances than UTP 12. You’re preparing to install a conventional Ethernet network in your new office building, but your boss tells you to be ready to handle a switchover to 1 Gbps Ethernet next year. What types of cable could you install? (Choose all that apply.) a. Cat 5 b. Fiber optic c. Cat 6 d. Cat 6a Answer: b. Fiber optic c. Cat 6 13. When two cables run side by side, signals traveling down one wire might interfere with signals traveling on the other wire. What is this phenomenon called? a. Reflection b. Attenuation c. Cross-talk d. Interference Answer: c. Crosstalk 14. What characteristic of twisted-pair cabling helps mitigate the effects of crosstalk? a. Differential signals b. Shielding c. Twisting of the pairs d. Termination Answer: c. Twisting of the pairs 15. What is the wireless device used to link buildings without cable? a. Repeater b. Access Point c. Router d. Bridge Answer: d. Bridge 16. Which of the following is a wiring standard for twisted-pair cable connections? (Choose all that apply.) a. ISO/IEC 11801 b. TIA/EIA 568A c. TIA/EIA 568B d. TIA/EIA 570 Answer: b. TIA/EIA 568A c. TIA/EIA 568B 17. Which of the following is a component of a structured cabling system? (Choose all that apply.) a. Patch cables b. Switches c. Routers d. Horizontal wiring Answer: a. Patch cables d. Horizontal wiring 18. Where are you most likely to find vertical cabling? (Choose all that apply.) a. Equipment rooms b. Data centers c. Connecting TCs d. Work areas Answer: a. Equipment rooms c. Connecting TCs 19. Which of the following is a tool needed to make a patch cable? (Choose all that apply.) a. Wire crimper b. Cable stripper c. Crimping tool d. Punch-down tool Answer: b. Cable stripper c. Crimping tool 20. Which type of connection is most likely to require a crossover cable? a. PC to switch b. Switch to router c. Hub to router d. PC to router Answer: d. PC to router 21. Which UTP limitations can be solved by fiber-optic cable? (Choose all that apply.) a. Bandwidth b. EMI susceptibility c. Signal attenuation d. Segment length Answer: a. Bandwidth b. EMI susceptibility d. Segment length 22. How many strands of fiber-optic cable are needed for a network connection? a. 1 b. 2 c. 4 d. 6 Answer: b. 2 23. Which statement is true about fiber-optic cables? a. MMF uses a single mode of light and has a thicker core. b. SMF uses lasers and has a thinner core. c. MMF uses a laser for longer distances. d. SMF is used for shorter distances. Answer: b. SMF uses lasers and has a thinner core. 24. Which type of wireless network requires a clear line of sight between transmitter and receiver? (Choose all that apply.) a. Infrared b. Spread spectrum c. Terrestrial microwave d. Satellite Answer: a. Infrared c. Terrestrial microwave 25. Which of the following wireless technologies does a 802.11 wireless network using the 2.4 GHz frequency range use? a. Frequency hopping spread spectrum b. Direct-sequence spread spectrum c. Time-division multiple access d. Orthogonal frequency-division multiplexing Answer: b. Direct-sequence spread spectrum Case Projects Case Project 4-1 A. If any kind of conductive cable has to pass through an interference-heavy environment—and the shop floor at XYZ sounds extremely “noisy”—it must be routed through metal conduit to deflect most of the interference. Even so, close proximity to intense sources of interference could still impede network traffic, so care must be taken when routing the conduit to avoid coming closer than 25 feet to intense sources of interference, such as arc welders or metal stampers. The only medium guaranteed to be immune to this interference is, of course, fiber-optic cable. In this kind of environment, it should still be run through conduit to protect it from errant forklifts and heavy machinery. B. Although a segment of 10Base5 would do the job, coaxial cable, particularly thicknet, is long obsolete in most networking applications. The best, and only reasonable, choice for this situation is fiber-optic cable. C. Given that most interflow gaps in office buildings are seldom more than 20 feet, the maximum distance from the 9th to the 11th floor is around 60 feet. Figuring an additional 40 feet at both ends for elevator shaft to wiring closet runs, UTP cabling can work in this situation, but it must be routed through conduit because of an elevator shaft’s electrically noisy environment. (Elevators can be high, if intermittent, sources of EMI and even RFI.) Fiber-optic cabling remains the best solution, however, because of its immunity to interference. Because of the temperature and humidity conditions in elevator shafts, fiber-optic cable should still be run through conduit in that kind of environment. In addition, nothing beats fiber-optic cable for open-ended bandwidth. D. The wireless solution for VBISP is WiMAX, which can provide bandwidth up to 70 Mbps at distances up to 30 miles. Fiber-optic cable might work, but the distance would make it an expensive solution. E. Given that the distance to be spanned is global in scope, the only feasible technology covered in the chapter is satellite microwave, which can literally span the entire planet. The reason laying cable isn’t feasible is that the distance between Des Moines and Malaysia is around 10,000 to 12,000 miles. Not only would the expense be astronomical—many billions of dollars—but also laying cable across the United States, international waters, and into Malaysia is not something most private organizations, such as MarTexCo, are willing to undertake. Case Project 4-2 Whenever cables go through the ground, differences in ground potential between one location and another can cause current to flow. Because this interferes with, if not blocks, network communication, most network engineers recommend using fiber-optic cable for in-ground cable runs. In addition, only fiber can accommodate increasingly large amounts of bandwidth, leaving room for higher-speed technologies to use the existing in-ground cable. Therefore, of the possible answers to this case project, answers a, c, and d are correct. Solution Manual for Guide to Networking Essentials Gregory Tomsho 9781111312527, 9781305105430, 9788131502136

Document Details

Related Documents

Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right