TEST BANK
A Practical Introduction to Enterprise Network and Security
Management 2nd Edition
By Bongsik Shin
SC
O
R
EG
U
ID
ES
hgfdsa
, jhgfdsa
Table of Content
1. Networking: Fundamental Concepts
2. Cybersecurity: Fundamentals
3. Essential Layers of Computer Networking
SC
4. IP Address Planning and Management
5. Intermediary Devices
O
6. Wi-Fi and Cellular Network
R
7. Ethernet LAN
EG
8. Cybersecurity: Threats
9. Cybersecurity: Network and Host Protection
U
10. Cybersecurity: Data Protection
ID
11. Fundamentals of Packet Routing
12. Wide Area Network
ES
13. Physical Layer Data Transmissions
hgfdsa
, jhgfdsa
Test Bank for
A Practical Introduction to Enterprise Network and Security
Management, 2e Bongsik Shin (All Chapters)
Keys are marked with an “*”.
CHAPTER 1
SC
TEXTBOOK CHAPTER REVIEW QUESTIONS
1. represents the layout of network nodes and links.
A) Network node
B) Network domain
C) Network topology *
D) Network architecture
O
E) Network blueprint
2. Choose an ACCURATE statement regarding the relationship between hosts, intermediary
devices, and network nodes.
R
A) Hosts are intermediary devices.
B) Hosts are also called networking devices.
C) Intermediary devices include network nodes and hosts.
EG
D) An intermediary device is either a network node or a host.
E) Network nodes include intermediary devices and hosts. *
3. Which topology is used widely when network redundancy is important to prepare for node or
link failures?
A) point-to-point
B) partial mesh *
U
C) star
D) bus
E) hub-and-spoke
ID
4. When the number of possible voltage states doubles in digital signal encoding,
A) two more bits can be additionally sent per clock cycle.
B) the effective data rate is increased by 50%.
C) the effective data rate is reduced by 50%.
ES
D) the number of bits sent per clock cycle remains the same.
E) one more bit can be additionally sent per clock cycle. *
5. Star topology is also known as:
A) ring
B) partial mesh
C) full mesh
D) bus
hgfdsa
, jhgfdsa
E) hub-and-spoke *
6. Which is an access link?
A) router – router link
B) switch – switch link
C) switch – router link
D) web server – switch link *
E) wireless access point – switch link
SC
7. The Organizationally Unique Identifier (OUI) is an element of .
A) MAC addresses *
B) public addresses
C) IP addresses
D) global addresses
E) local addresses
O
8. The throughput of a network
A) represents the speed guaranteed by a service provider.
B) describes the strength of a signal.
R
C) is interchangeably used with the rated speed.
D) represents its maximum capacity in theory.
E) represents its actual speed. *
EG
9. In the network, data are produced and exchanged according to meticulously defined rules of
communication and engagement. These rules are codified in the .
A) protocol *
B) signal
C) network link
D) message
E) intermediary device
U
10. Choose an INCORRECT statement regarding the network link.
A) Copper wires and optical fibers are popular wired media these days.
ID
B) Network links are divided into access and trunk links.
C) Creating a computer network needs to have at least one trunk link. *
D) The access link provides connectivity between a host and an intermediary device.
E) The trunk link interconnects intermediary devices.
ES
11. The campus network is a type of the .
A) local area network *
B) metropolitan area network
C) personal area network
D) wide area network
E) wireless network
12. What is the binary combination of hexadecimal digits ‘B301’?
hgfdsa