Two computers connected by a wire form a network.
TRUE
In 1954, the International Organization for Standardization (ISO) presented the Open Systems Interconnection (OSI) model.
FALSE
Computers must use a common protocol to communicate properly.
TRUE
Peer communication allows error checking to occur on two separate layers simultaneously.
TRUE
Many LANs and WANs contain several segments. Dividing a network into segments reduces performance.
FALSE
The number of nodes on a network and the length of cable used influence the quality of communication on the network.
TRUE
Repeaters and hubs reformat data structures, so they can connect networks that require different types of frames.
FALSE
The IEEE standard for WLANs use unlicensed, but not unregulated, radio frequencies.
TRUE
Bridges operate at the Network layer of the OSI model.
FALSE
Like bridges, switches operate at the Network layer of the OSI model.
FALSE
The term _____ refers to the wire cabling, such as coaxial or the more commonly used twisted-pair, that form the connections in most networks.
Media
_____ networks have computers that are servers and computers that act as clients to those servers.
Client/server
A _____ is contained within a company or department and located in a single geographic area, usually a building or part of a building
LAN
A _____ spans multiple geographic areas and is usually connected by common telecommunication carriers.
WAN
The term _____ refers to the intermediate stage between a LAN and a WAN.
MAN
The term _____ refers to a series of storage devices, such as tapes, hard drives, and CDs, that are networked together to provide very fast data storage for a network or sub-network.
SAN
The part of the company's network that allows access to non employees is called the _____, which is accessed over or through the Internet.
Extranet
The part of the company's network that allows access to employees is called the _____, which is completely separate from the Internet.
Intranet
The seven layers of the OSI reference model communicate with one another via _____ communication.
Peer
The OSI model _____ layer defines the mechanical, electrical, and procedural events that occur during the physical transmission of electronic signals on the wire.
Physical
The _____ is information that is used to determine whether data was corrupted during transmission.
CRC
The _____ sub-layer of the Data Link layer defines how data is packaged for the network.
LLC
The _____ sub-layer of the Data Link layer defines the media access method and provides a unique identifier for the network card.
MAC
A(n) _____ address is a 48-bit address represented as a 12-digit hexadecimal number given to each network card during production.
MAC
Because the MAC address is added during the manufacturing process, it is a permanent marking. For this reason, the address is also known as a _____.
BIA
The protocols at the Network layer allow computers to route packets to remote networks using a _____ address.
Logical
_____ protocols, such as TCP, require an acknowledgement (ACK) of the receipt of data packets.
Connection-oriented
_____ protocols such as User Datagram Protocol (UDP), do not require an ACK.
Connectionless
Data sent by a connectionless transport is called a _____.
Datagram
Each layer in a protocol stack may add a(n) _____ to the data as it is passed down the layers.
PDU
A(n) _____, which is also known as a header or a trailer, is specific information that is sent from one layer on the source computer to the same layer on the destination computer.
PDU
On analog networks, devices that boost the signal are called _____.
Amplifiers
Devices that "see" the traffic of other devices are said to be on the same _____ as those devices.
Collision domain
If a single access point is available in infrastructure mode, then the mode is said to be a(n) _____.
Basic Service Set (BSS)
Typically WLANs involve multiple access points connected to various switches in the network. This type of infrastructure mode is known as a(n) _____.
Extended Service Set (ESS)
A _____ filters traffic between network segments by examining the destination MAC address.
Bridge
_____ increase network performance by reducing the number of frames transmitted to the rest of the network.
Switches
Switches filter based on _____ addresses.
MAC
_____ provide filtering and network traffic control on LANs and WANs. These devices can connect multiple segments and multiple networks.
Routers
Routers operate at the _____ layer of the OSI model.
Network
When TCP/IP is used on an internetwork, the logical address is known as a(n) _____ address.
IP
_____ are commonly used to connect networks to the Internet.
Routers
A(n) _____ functions as both a bridge for nonroutable protocols and a router for routable protocols.
Brouter
A(n) _____ is usually a combination of hardware and software. Its purpose is to translate between different protocol suites.
Gateway
_____ have the most negative effect on network performance.
Gateways
_____ is a network access method (or media access method) originated by the University of Hawaii.
Ethernet
Ethernet uses _____ to prevent data packets from colliding on the network.
CSMA/CD
A _____ is the physical area in which a frame collision might occur.
Collision domain
_____ Ethernet uses the same network access method (CSMA/CD) as common 10BaseT Ethernet, but provides 10 times the data transmission rate.
Fast
Fast Ethernet is defined under the IEEE _____ standard.
802.3u
In _____ communications, devices can send and receive signals, but not at the same time.
Half-duplex
In _____ communications, devices can send and receive signals simultaneously.
Full-duplex
The TCP/IP model explains how the protocol suite works to provide communications.
TRUE
The Trivia File Transfer Protocol (TFTP) sends data using a reliable connection.
FALSE
Both TCP and UDP use port number for communication between hosts.
TRUE
The size of the TCP window determines the number of acknowledgements sent for a given data transfer.
TRUE
A small TCP window size produces few acknowledgements.
FALSE
The invention and evolution of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite resulted from a coordinated effort by the U.S. _________.
DOD
The _________ layer in the TCP/IP model maps to the OSI Application, Presentation, and Session layer.
Application
The _________ layer in the TCP/IP model determines the connectionless or connection-oriented services
Transport
The _________ layer in the TCP/IP model is a direct equivalent to the Network layer in the OSI reference model.
Internetwork
The _________ layer of the TCP/IP model maps to both the Data Link and Physical layers of the OSI reference model.
Network Interface
______ is a connection-oriented protocol that allows you to connect your computer to other computers on the Internet and view Web page content.
HTTP
The TCP/IP _____ layer performs several functions, the most notable being end-to-end packet delivery, reliability, and flow control.
Transport
____ is a communication method for network devices that is designed to reduce the flow of packets from their source.
Congestion avoidance
The _____ layer in the TCP/IP model handles software, or logical, addressing.
Internetwork
The _____ protocol provides a connectionless delivery services
IP
Many network devices maintain tables of the MAC and IP addresses of other devices on the network . These tables are called ______.
ARP tables
A (n) _____ supplies the MAC address of the destination host in a unicast packet.
ARP reply
_______ provides the same basic functionality as RARP
DHCP
Network administrators and support personnel commonly use the _______ utility to verify connectivity between two points.
Ping
The ______ utility uses ICMP echo request/reply messages and can verify Internetwork layer (OSI-Network layer) connectivity.
Trace
Trace shows the exact path a packet takes from the source to destination. This is accomplished through the use of the _____ counter.
TTL
A (n) _______ is caused by a malicious user or program that sends a large quantity of ICMP echo requests (ping) to a target device in an attempt to crash or greatly reduce the performance of the target device.
ICMP flood
A router references its _____ to determine which of its interfaces is connected to the destination network.
routing table
______ protocols allow the routers to be updated automatically.
Routing
The Cisco _____ model does not describe how communications take place. Rather, it focuses on how best to design a network, especially a relatively large network or one that is expected to grow.
Three-Layer Hierarchical
______ is the process of assigning unique IP addresses to devices on the network.
IP addressing