Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSIS 330 Final Exam_Answer (Versions 2), Business Data Communication Systems – CSIS 330, Liberty University, Verified correct answers

Beoordeling
-
Verkocht
-
Pagina's
22
Geüpload op
20-09-2020
Geschreven in
2020/2021

CSIS 330 Final Exam_Answer (Versions 2), Business Data Communication Systems – CSIS 330, Liberty University, Verified correct answers CSIS 330 Final Exam, Liberty University • Question 1 1 out of 1 points According to the textbook, data centers are normally not very expensive to build and maintain, which explains the current trend for all organizations to create them. • Question 2 1 out of 1 points Using a HomePlug standard Powerline adapter, devices can connect to the LAN wherever there is an electrical outlet. • Question 3 1 out of 1 points Which devices on a network will hear an ARP request? • Question 4 1 out of 1 points Which protocol enables reliable communication between processes running on separate hosts and has reliable, acknowledged transmissions. • Question 5 1 out of 1 points According to the textbook, real-time applications require more planning and dedicated services (relative to other types of data) to ensure priority delivery of voice and video traffic. • Question 6 1 out of 1 points Which of the following connections runs over a telephone line with the line split into three channels? • Question 7 1 out of 1 points IEEE rates UTP cabling according to its performance, thereby placing cables into categories according to their ability to carry higher-bandwidth rates. Of the following categories, which one is the recommended type for data networking in new building installations? • Question 8 1 out of 1 points The need for a single, reserved circuit from end to end exists in a packet-switched network. • Question 9 1 out of 1 points What is true of Tier 3 ISPs? • Question 10 1 out of 1 points What is the decimal equivalent of the binary number ? • Question 11 1 out of 1 points According to the textbook, which of the following is a way in which network infrastructures can vary? • Question 12 1 out of 1 points Which of the following is not one of the three primary collaboration Questions that organizations must ask to achieve effective collaboration? • Question 13 1 out of 1 points Like IPv4, IPv6 uses both the prefix length and the dotted-decimal subnet mask notation for indicate the network portion of an IPv6 address. • Question 14 1 out of 1 points The ________________ provides communications between the hardware and software of the computer system as well as manages hardware resources. • Question 15 1 out of 1 points Which IPv4 block of addresses is reserved for multi-cast groups? • Question 16 1 out of 1 points What is a fault-tolerant network? • Question 17 1 out of 1 points According to the textbook, switch devices and wireless access points cannot be separate dedicated devices within a network implementation. • Question 18 1 out of 1 points What type of physical topology involves end systems connected to their respective neighbor, forming a circle? • Question 19 1 out of 1 points ___________________________ is the most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router. • Question 20 1 out of 1 points ______________ are pages that are easy to update and edit and give anyone a means to communicate their thoughts to a global audience without technical knowledge of web design. They are like an individual, personal journal. • Question 21 1 out of 1 points What are two types of network security concerns that must be addressed with respect to security? • Question 22 1 out of 1 points What is the result of the binary number ANDed with ? • Question 23 1 out of 1 points In the textbook, which of the following is not listed among the most common external threats to networks? • Question 24 1 out of 1 points The seven OSI model layers are more often referred to by number rather than by name. Which layer number is the session layer in the OSI model? • Question 25 1 out of 1 points UDP is a reliable protocol, whereas TCP does not provide reliability. • Question 26 1 out of 1 points Which type of traffic must receive the highest priority from QoS? • Question 27 1 out of 1 points To identify a target application in a data stream, the transport layer assigns each application an identifier known as a(n) ___________________. • Question 28 1 out of 1 points According to the textbook, a ______________________ network is one that limits the impact of a failure so that the fewest number of devices are affected by it. • Question 29 1 out of 1 points A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users. • Question 30 1 out of 1 points ________________ is the name given to the clock signal that occurs evenly spaced time durations during which data signals are sent in synchronous transmissions. • Question 31 1 out of 1 points What is the IPv6 DHCP message that corresponds to the IPv4 DHCPACK message? • Question 32 1 out of 1 points Which of the following is not a characteristic of single-mode fiber? • Question 33 1 out of 1 points Which of the following is not a factor that needs to be considered when designing a small network? • Question 34 1 out of 1 points Just above the physical layer is the _________________ layer. • Question 35 1 out of 1 points What is the hexadecimal equivalent of the decimal number 68? • Question 36 1 out of 1 points Which field in an Ethernet frame is used for error detection? • Question 37 1 out of 1 points When a host sends messages using a one-to-many delivery option, it is known as a ____________________. • Question 38 1 out of 1 points Global configuration mode and interface configuration modes can only be reached from the User EXEC mode. • Question 39 1 out of 1 points What is the binary equivalent of the decimal number 128? • Question 40 1 out of 1 points Which protocol enables clients to retrieve email from a mail server and downloads email from the mail server to the desktop? • Question 41 1 out of 1 points What is the binary equivalent of the decimal number 119? • Question 42 1 out of 1 points How many hosts per network can you have with a subnet mask of 255.255.224.0? • Question 43 1 out of 1 points Which of the following is not a way of ensuring confidentiality in a network? • Question 44 1 out of 1 points The local routing table of a host typically contains a route to the loopback interface (127.0.0.1). This address is known as a ______________________. • Question 45 1 out of 1 points The further a device is from a wireless access point, the stronger the wireless signal it receives. • Question 46 1 out of 1 points The function of the _________ layer is to facilitate the transport of data from one network to another. • Question 47 1 out of 1 points Which of the following is a characteristic of Cat7 cable? • Question 48 1 out of 1 points ________________________ is technology that is integrated into everyday appliances, allowing them to interconnect with other devices, making them more automated. • Question 49 1 out of 1 points According to the textbook, throughput usually does not match the specified bandwidth in physical layer implementations. • Question 50 1 out of 1 points According to the textbook, when a banner is used on an IOS device, it should always welcome someone to the device as its first statement. • Question 51 1 out of 1 points You are given an IPv4 network address of 192.168.10.0/24 by your ISP. You need to subnet this network. You know that the subnet mask will be 255.255.255.252. What is the last usable host address of the first subnet (i.e. subnet[0])? • Question 52 1 out of 1 points The _____________ command is used to verify the internal IP configuration on a local host. • Question 53 1 out of 1 points Which Wi-Fi standard operates in the 2.4-GHz frequency band and offers speeds of up to 11 Mbps? • Question 54 1 out of 1 points Which of the following data communications standards apply to wireless media? I. IEEE 802.11 II. IEEE 802.15 III. IEEE 802.16 • Question 55 1 out of 1 points What command(s) is(are) used to take a device from privileged EXEC mode to the global configuration mode? • Question 56 1 out of 1 points You have been assigned an IP address for your network of 192.168.1.0 / 24. Each subnet needs to accommodate 12 hosts. What is the subnet mask? • Question 57 1 out of 1 points The term ________________ refers to a private connection of LANs and WANs that belongs to an organization and is designed to be accessible only by the organization’s members, employees, or others with authorization. • Question 58 1 out of 1 points A(n) ______ firewall consists of a firewall application that runs on a network operating system such as UNIX or Windows. • Question 59 1 out of 1 points What is the decimal equivalent of the hexadecimal number AA? • Question 60 1 out of 1 points A(n) _______________________ transmission exists when data signals are transmitted without an associated clock signal. • Question 61 1 out of 1 points _________________ is a protocol that governs the way that a web server and a web client interact. • Question 62 1 out of 1 points What is the decimal equivalent of the hexadecimal number EA? • Question 63 1 out of 1 points Controlled access is also known as ______. • Question 64 1 out of 1 points When data travels from a source node to a destination node, the user data is first segmented by the _________ layer, placed into packets by the _________ layer, and further encapsulated as frames by the _____________ layer. • Question 65 1 out of 1 points Which of the following firewall techniques blocks unsolicited packets unless permitted specifically? • Question 66 1 out of 1 points Shining a bright flashlight into one end of a fiber cable while observing the visible light at the other end of the fiber ensures the performance of the fiber. • Question 67 1 out of 1 points When a sender does not receive an acknowledgement from a TCP transmission within a certain period of time, what happens? • Question 68 1 out of 1 points Which IPv4 block of addresses is reserved for future use and is currently being used for research and experimentation purposes? • Question 69 1 out of 1 points _____________________________occurs in fiber-optic media when the media do not completely touch at the splice or connection. • Question 70 1 out of 1 points Which of the following organizations developed standard ISO 8877, which officially adopted the RJ connections such as RJ-11 and RJ-45? • Question 71 1 out of 1 points _______________________ communication relies on unidirectional data flow, where sending and receiving data are not performed at the same time. • Question 72 1 out of 1 points __________ enables the automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information. • Question 73 1 out of 1 points What is the IPv6 DHCP message that corresponds to the IPv4 DHCPOFFER message? ADVERTISE • Question 74 1 out of 1 points In Ethernet technology, IP addresses are used to identify the frame source and destination. • Question 75 1 out of 1 points When an incoming data frame is received by a switch and the destination MAC address is not found in the MAC address table, the switch forwards the frame out all ports, except for the port on which it was received.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CSIS 330 Final Exam, Liberty University


• Question 1
1 out of 1 points

According to the textbook, data centers are normally not very expensive
to build and maintain, which explains the current trend for all
organizations to create them.
Selected Answer: False
Correct Answer: False



• Question 2
1 out of 1 points

Using a HomePlug standard Powerline adapter, devices can connect to
the LAN wherever there is an electrical outlet.
Selected Answer: True
Correct Answer: True



• Question 3
1 out of 1 points

Which devices on a network will hear an ARP request?
Selected Answer:
All devices in the broadcast domain
Correct Answer:
All devices in the broadcast domain

,• Question 4
1 out of 1 points

Which protocol enables reliable communication between processes
running on separate hosts and has reliable, acknowledged transmissions.
Selected Answer:
TCP
Correct Answer:
TCP



• Question 5
1 out of 1 points

According to the textbook, real-time applications require more planning
and dedicated services (relative to other types of data) to ensure priority
delivery of voice and video traffic.
Selected Answer:
True
Correct Answer:
True



• Question 6
1 out of 1 points

Which of the following connections runs over a telephone line with the
line split into three channels?
Selected Answer:
DSL

, Correct Answer:
DSL

• Question 7
1 out of 1 points

IEEE rates UTP cabling according to its performance, thereby placing
cables into categories according to their ability to carry higher-
bandwidth rates. Of the following categories, which one is the
recommended type for data networking in new building installations?
Selected Answer:
Cat6
Correct Answer:
Cat6

• Question 8
1 out of 1 points

The need for a single, reserved circuit from end to end exists in a packet-
switched network.
Selected Answer: False
Correct Answer: False

• Question 9
1 out of 1 points

What is true of Tier 3 ISPs?
Selected Answer:
They act as local providers of service directly to end users.

Correct Answer:
They act as local providers of service directly to end users.

• Question 10
1 out of 1 points

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
20 september 2020
Aantal pagina's
22
Geschreven in
2020/2021
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$20.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
bettergrades NIT,IIM
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
237
Lid sinds
8 jaar
Aantal volgers
203
Documenten
1432
Laatst verkocht
2 jaar geleden

5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen