

Introduction to Networking Test Bank
Course Introduction
Introduction to Networking provides students with a foundational understanding of computer networks, including their architecture, components, and protocols. The course covers essential concepts such as network topologies, data transmission, TCP/IP models, addressing, and basic security principles. Through lectures and hands-on activities, students gain practical experience in designing, configuring, and troubleshooting local and wide area networks, preparing them for further study in networking technologies and certifications.
Recommended Textbook
Data Communications and Computer Networks A Business Users Approach 8th Edition by Curt
Available Study Resources on Quizplus
13 Chapters
1235 Verified Questions
1235 Flashcards
Source URL: https://quizplus.com/study-set/2373

Chapter 1: Introduction to Computer Networks and Data Communications
Available Study Resources on Quizplus for this Chatper
76 Verified Questions
76 Flashcards
Source URL: https://quizplus.com/quiz/47097
Sample Questions
Q1) The devices that usually connect two or more LANs are the switch,hub,and ____.
A) workstation
B) access point
C) server
D) router
Answer: D
Q2) The TCP/IP ____ layer supports network applications and may include presentation services.
A) transport
B) application
C) network
D) network access
Answer: B
Q3) The ____ in a network architecture define a model for the functions or services that need to be performed.
A) servers
B) workstations
C) routers
D) layers
Answer: D

Page 3
To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Fundamentals of Data and Signals
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/47098
Sample Questions
Q1) The ability to separate noise from a digital waveform is one of the great strengths of digital systems.
A)True
B)False
Answer: True
Q2) An inherent problem with the NRZ-L and NRZI digital encoding schemes is that long sequences of 0s in the data produce a signal that never changes.
A)True
B)False
Answer: True
Q3) ____________________ is a phenomenon that occurs when the frequencies of two or more signals mix together and create new frequencies.
Answer: Intermodulation distortion
Q4) With NRZ-L,the receiver has to check whether there is a change at the beginning of the bit to determine if it is a 0 or a 1.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 4
Chapter 3: Conducted and Wireless Media
Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/47099
Sample Questions
Q1) Data transmission speed is the number of bits per second that can be transmitted.
A)True
B)False
Answer: True
Q2) Briefly explain the characteristics of Category 5e twisted pair.
Answer: Approved at the end of 1999,the specification for Category 5e twisted pair is similar to Category 5's in that this wire is also recommended for transmissions of 100 Mbps (100 MHz)for 100 meters.Many companies are producing Category 5e wire at 125 MHz for 100 meters.While the specifications for the earlier Category 1 to 5 wires described only the individual wires,the Category 5e specification indicates exactly four pairs of wires and provides designations for the connectors on the ends of the wires,patch cords,and other possible components that connect directly with a cable.Thus,as a more detailed specification than Category 5,Category 5e can better support the higher speeds of 100-Mbps (and higher)local area networks.
Q3) Two major coaxial cable technologies exist and are distinguished by the type of signal each carries: baseband and ____________________.
Answer: broadband
To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Making Connections
Available Study Resources on Quizplus for this Chatper
76 Verified Questions
76 Flashcards
Source URL: https://quizplus.com/quiz/47100
Sample Questions
Q1) The ____________________ component of an interface describes the function of each pin that is used in a particular interface.
Q2) To define functional and procedural components,EIA-232F incorporates the ITU's ____ standard.
A) ISO 2110
B) V.28
C) RS-232
D) V.24
Q3) InfiniBand can address (interconnect)____ of devices,using both copper wire and fiber-optic cables.
A) tens
B) hundreds
C) thousands
D) millions
Q4) When using peripherals that are designed with a USB connector,it is also possible to connect one USB peripheral to another.
A)True
B)False
Q5) What are the advantages and disadvantages of an asynchronous connection?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Making Connections Efficient: Multiplexing and Compression
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/47101
Sample Questions
Q1) One of the more common and simpler examples of lossless compression is ____________________-length encoding.
Q2) The big advantage of frequency division multiplexing over synchronous TDM is the lower noise due to the use of digital signals during transmission.
A)True
B)False
Q3) SONET and SDH are able to multiplex varying speed streams of data onto one fiber connection.
A)True
B)False
Q4) ____________________ is the process of taking data and somehow packing more of it into the same space.
Q5) As with a simple connection between one sending device and one receiving device,maintaining synchronization across a multiplexed link is important.
A)True B)False
Q6) ____________________,transmits data only from active users and does not transmit empty time slots.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Errors, Error Detection, and Error Control
Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/47102
Sample Questions
Q1) Sliding window error control is based on the ____________________ protocol.
Q2) The CRC error-detection method treats the packet of data to be transmitted as a large polynomial.
A)True
B)False
Q3) Attenuation can be eliminated with the use of repeaters for analog systems.
A)True
B)False
Q4) Once an error in the received data transmission stream is detected,the action that the receiver takes is called ____________________.
Q5) List and briefly explain some error-prevention techniques.
Q6) When working with stop-and-wait error control,the amount of time a station waits before retransmitting a packet is called ____.
A) stop time
B) ACK time
C) NAK time
D) timeout
Q7) Simple parity comes in two basic forms: even parity and ____________________ parity.
8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Local Area Networks: Part I
Available Study Resources on Quizplus for this Chatper
99 Verified Questions
99 Flashcards
Source URL: https://quizplus.com/quiz/47103
Sample Questions
Q1) Switches can significantly decrease interconnection traffic and increase the throughput of the interconnected networks or segments.
A)True
B)False
Q2) A relatively new standard,IEEE ____,was designed to allow multiple devices to intercommunicate and work together to create a virtual LAN.
A) 802.1a
B) 802.1g
C) 802.1P
D) 802.1Q
Q3) The bus/tree topology was the first physical design used when local area networks became commercially available in the late 1970s.
A)True
B)False
Q4) Most switches are transparent,which means they learn by themselves.
A)True
B)False
Q5) Explain the cut-through architecture including its advantages and disadvantages.
Q6) What are some of the application areas where a LAN can be an effective tool?
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Local Area Networks: Part II
Available Study Resources on Quizplus for this Chatper
113 Verified Questions
113 Flashcards
Source URL: https://quizplus.com/quiz/47104
Sample Questions
Q1) A(n)____________________ is the computer that stores software resources such as the network operating system,computer applications,programs,data sets,and databases,and either allows or denies workstations connected to the network access to these resources.
Q2) An interesting feature shared by all versions of NetWare is that the ____ is virtually invisible to the user.
A) login process
B) logout process
C) user interface
D) loading process
Q3) A network operating system needs a host machine from which to operate.
A)True
B)False
Q4) ____ software is designed to detect and remove viruses that have infected your memory,disks,or operating system.
A) Antivirus
B) Remote access
C) Uninstall
D) Backup
Q5) What are the functions performed by a network operating system?
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Introduction to Metropolitan Area Networks and
Wide Area Networks
Available Study Resources on Quizplus for this Chatper
101 Verified Questions
101 Flashcards
Source URL: https://quizplus.com/quiz/47105
Sample Questions
Q1) Any network is as strong as its strongest link.
A)True
B)False
Q2) Many of the same technologies and communications protocols found in local area networks are used to create metropolitan area networks.
A)True
B)False
Q3) When routing tables adapt to network changes,the routing system is called ____.
A) fixed
B) local
C) adaptive
D) static
Q4) A network limit,called the ____,can be placed on how many times any packet is copied.
A) hop limit
B) hop count
C) time to live
D) time to hop
To view all questions and flashcards with answers, click on the resource link above. Page 11
Q5) A(n)____________________ is a collection of nodes and interconnecting telecommunications links.

Chapter 10: The Internet
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/47106
Sample Questions
Q1) ____ is a terminal emulation program for TCP/IP networks,such as the Internet,that allows users to log in to a remote computer.
A) Remote login
B) ARP
C) DNS
D) FTP
Q2) ____ is a protocol that converts telephone numbers to fully qualified domain name addresses.
A) H.323
B) ENUM
C) SIP
D) UDP
Q3) The ____ is a large,distributed database of Internet addresses and domain names.
A) Uniform Resource Locator (URL)
B) Domain Name System (DNS)
C) Hypertext Transfer Protocol (HTTP)
D) Hypertext Markup Language (HTML)
Q4) How does the Internet Protocol work?
Q5) IP ____________________ is essentially another name for a data packet.
Q6) What are the disadvantages of Voice over IP (VoIP)?
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Voice and Data Delivery Networks
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/47107
Sample Questions
Q1) As long as a telephone call remains within a LATA (a(n)____ call),the telephone call is local and is handled by a local telephone company.
A) intraLATA
B) extraLATA
C) outerLATA
D) outLATA
Q2) Typically,frame relay is a replacement for the leased lines that connect a business to other businesses or connect multiple offices of the same business.
A)True
B)False
Q3) A ____ service is an all-digital connection that can transfer either voice or data at speeds up to 1.544 Mbps.
A) T-1
B) T-2
C) T-3
D) T-4
Q4) The ______________________________ paved the way for anybody to offer a local telephone service to homes and businesses.
To view all questions and flashcards with answers, click on the resource link above.
Page 13

Chapter 12: Network Security
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/47108
Sample Questions
Q1) Controlling access to a computer network involves deciding and then limiting who can use the system and when the system can be used.
A)True
B)False
Q2) All certificates are issued by a certificate authority.
A)True
B)False
Q3) ____ may be considered a form of physical protection.
A) Router
B) Worms
C) Trojan horses
D) Surveillance
Q4) ____ cable represented a major improvement in the ability of transmission media to secure sensitive data.
A) Coaxial
B) Twisted
C) Fiber-optic
D) Copper
Q5) Public key cryptography is also called ____________________ encryption.
Q6) How does phishing work?
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Network Design and Management
Available Study Resources on Quizplus for this Chatper
99 Verified Questions
99 Flashcards
Source URL: https://quizplus.com/quiz/47109
Sample Questions
Q1) Analyzing and designing a new computer system can be time-consuming and expensive.
A)True
B)False
Q2) A(n)____________________ monitors a network 24 hours a day,seven days a week,and captures and records all transmitted packets.
Q3) The ____________________ feasibility of a system is the extent to which the system can be created and implemented using currently existing technology.
Q4) Setting up a benchmark test can be quite time-consuming.
A)True
B)False
Q5) The ____ includes the time needed to bring the system back up to normal operation.
A) mean time between failures
B) mean time to repair
C) availability
D) reliability
Q6) If only an overview of a local network is desired,then the analyst can create a(n)____________________ connectivity map.
Page 15
To view all questions and flashcards with answers, click on the resource link above.