| Verified | Latest 2024 Version
Each state or Canadian province has its own ___________ to regulate communications within its
borders. - ✔✔public utilities commission
The _________________ is a United States government agency that regulates voice and data
communication. - ✔✔FCC
Which of the following is not a basic architecture for dedicated circuit networks? - ✔✔bus
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the
next usually with a series of point-to-point dedicated circuits. - ✔✔ring design
A star architecture: - ✔✔connects all computers to one central computer that routes messages to the
appropriate computer
In ______ geometric layout for a network, every computer is connected to every other computer often
by point-to-point dedicated circuits. - ✔✔full mesh design
_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services
in North America today. - ✔✔T-carrier services
The data rate for a T-1 circuit in North America is: - ✔✔1.544 Mbps
The data rate for a T-3 circuit in North America is: - ✔✔44.376 Mbps
A _______ is a connectionless method of sending data packets on a packet switched service. -
✔✔datagram
, ___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring
messages they exchange across an NAP or MAE. - ✔✔Peering
A _________ is the place at which the ISP provides services to its customers. - ✔✔point-of-presence
A ___________ is used by ISPs to authenticate its customers - ✔✔remote-access server
Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known
as ______________ technologies - ✔✔broadband
A __________ separates traditional voice telephone transmission from the data transmissions in the
equipment located at the customer site for DSL - ✔✔line splitter
Another term for cable networks that use both fiber-optic and coaxial cable is __________ - ✔✔hybrid
fiber coax
In a DSL environment, local loops from many customers enter and are connected to the _____. -
✔✔main distribution facility
The closest the Internet has to an "owning" organization is the ___________. - ✔✔Internet Society
The ___________ is responsible for technical management of IETF and the Internet standards process -
✔✔Internet Engineering Steering Committee
Which of the following new Internet efforts was started by 34 universities? - ✔✔Internet2
Which of the following is not one of the major categories (or sub-categories) into which network security
threats can be placed? - ✔✔controlled chaos
Often, incidents of unauthorized access known as___________, involve employees of the organization,
surprisingly enough. - ✔✔Intrusion