chapter 1 & 2 checkup network+ guide to networks, fourth edition

7
Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

Upload: hilary-wiggins

Post on 27-Dec-2015

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

Chapter 1 & 2

Checkup

Network+ Guide to Networks, Fourth Edition

Page 2: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

True or False

1. A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system.

2. Resource sharing is controlled by a central computer or authority.3. Clients on a client/server network share their resources directly with each other.4. Networks are usually only arranged in a ring, bus, or star formation and hybrid

combinations of these patterns are not possible.5. Protocols ensure that data are transferred whole, in sequence, and without error from

one node on the network to another.6. Every process that occurs during network communications can be associated with a

layer of the OSI Model.7. Among the Session layer’s functions are establishing and keeping alive the

communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications.

8. The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.

9. Addressing is a system for assigning unique identification numbers to devices on a network.

10. Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.

Page 3: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

True or False

1. A common way to share resources on a peer-to-peer network is by modifying the file-sharing controls via the computer’s operating system.

2. Resource sharing is controlled by a central computer or authority.3. Clients on a client/server network share their resources directly with each other.4. Networks are usually only arranged in a ring, bus, or star formation and hybrid

combinations of these patterns are not possible.5. Protocols ensure that data are transferred whole, in sequence, and without error from

one node on the network to another.6. Every process that occurs during network communications can be associated with a

layer of the OSI Model.7. Among the Session layer’s functions are establishing and keeping alive the

communications link for the duration of the session, keeping the communication secure, synchronizing the dialogue between the two nodes, determining whether communications have been cut off, and, if so, figuring out where to restart transmission, and terminating communications.

8. The primary function of protocols at the session layer is to translate network addresses into their physical counterparts and decide how to route data from the sender to the receiver.

9. Addressing is a system for assigning unique identification numbers to devices on a network.

10. Connectivity devices such as hubs and repeaters operate at the Presentation layer of the OSI Model.

Page 4: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

Multiple Choice

1. A(n) ____ is a group of computers and other devices that are connected by some type of transmission media.a. access server c. NOSb. network d. NIC

2. In a(n) ____ network, every computer can communicate directly with every other computer.a. LAN c. WANb. client/server d. peer-to-peer

3. The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.a. NIC c. Web serverb. network operating system d. WAN

4. A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address.a. host c. segmentb. node d. connectivity device

5. The physical layout of a computer network is known as its ____.a. protocol c. connectivityb. topology d. addressing

Page 5: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

Multiple Choice

6. The scheme used to assign a unique identifying number to every node on a network is known as ____.a. addressing c. securityb. transmission d. protocol

7. Another term for a remote access server is ____.a. client/server c. data serverb. mail server d. communications server

8. A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.a. Web server c. WANb. node d. LAN

9. Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network.a. Session c. Data linkb. Application d. Transport

10. ____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.a. Flow control c. Segmentationb. Routing d. Virtual addressing

Page 6: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

Multiple Choice

1. A(n) ____ is a group of computers and other devices that are connected by some type of transmission media.a. access server c. NOSb. network d. NIC

2. In a(n) ____ network, every computer can communicate directly with every other computer.a. LAN c. WANb. client/server d. peer-to-peer

3. The ____ is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions.a. NIC c. Web serverb. network operating system d. WAN

4. A(n) ____ is a client, server, or other device that can communicate over a network and is identified by a unique number, known as its network address.a. host c. segmentb. node d. connectivity device

5. The physical layout of a computer network is known as its ____.a. protocol c. connectivityb. topology d. addressing

Page 7: Chapter 1 & 2 Checkup Network+ Guide to Networks, Fourth Edition

Multiple Choice

6. The scheme used to assign a unique identifying number to every node on a network is known as ____.a. addressing c. securityb. transmission d. protocol

7. Another term for a remote access server is ____.a. client/server c. data serverb. mail server d. communications server

8. A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.a. Web server c. WANb. node d. LAN

9. Through ____ layer protocols, software applications negotiate their formatting, procedural, security, synchronization, and other requirements with the network.a. Session c. Data linkb. Application d. Transport

10. ____ is the process of gauging the appropriate rate of transmission based on how fast the recipient can accept data.a. Flow control c. Segmentationb. Routing d. Virtual addressing