Deck 2: Network Topology

ملء الشاشة (f)
exit full mode
سؤال
The connections for the ____ of a network may be provided through dedicated phone lines, twisted pair cable, fiber optic cable line-of-sight microwave RF, ATM, or other form of electronic connection.

A) physical topology
B) virtual topology
C) physical infrastructure
D) virtual interconnection
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Companies that connect to a NAP enter into ____ agreements with each other that allow them to exchange traffic.

A) posting
B) partner
C) peering
D) polling
سؤال
The network cloud may comprise only the network found in a small laboratory, or it may represent an entire wide area network (WAN) such as the Internet.
سؤال
A ____ uses public network connections to establish private communication by encrypting the data transmitted between the two computers at each end of the connection.

A) NPV
B) VN
C) PVN
D) VPN
سؤال
A ____ is a portion of a network.

A) subnet
B) subunit
C) slice
D) subdivision
سؤال
____________________ is a logical, not physical, activity and is accomplished using a special subnet mask, such as 255.255.255.192.
سؤال
Token-ring networks, although logically viewed as rings, are connected using central ____.

A) media access units
B) multistation access units
C) station access units
D) access units
سؤال
Even if the encrypted traffic is intercepted, chances are very small that the contents can be decrypted if a suitably strong encryption method and key are used.
سؤال
In a bus network, if two or more nodes transmit data at the same time, a ____ occurs.

A) collision
B) compression
C) collusion
D) contention
سؤال
A(n) ____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.
سؤال
In a fully connected network, the number of connections at each node equals the total number of nodes plus one.
سؤال
A(n) ____________________ circuit is a prearranged path through the network that all packets will travel for a particular session between machines.
سؤال
With certain types of network communications, it is possible that duplicate packets of data are generated if an acknowledgement is not received by the source computer.
سؤال
In terms of security and reliability, we must concern ourselves with what is required to ____________________ our network.
سؤال
A ____ network uses a single shared common communication media that all nodes tap into.

A) ring
B) star
C) bus
D) string
سؤال
Seven fully connected nodes require ____ links.

A) 14
B) 21
C) 28
D) 35
سؤال
A(n) ____ is a 32-bit number used to locate and identify nodes on the Internet.

A) MAC address
B) TCP address
C) Ethernet address
D) IP address
سؤال
When a large amount of data must be sent between machines on a network, it is possible to set up a ____ between the machines.

A) permanent circuit
B) virtual circuit
C) virtual interface
D) physical interface
سؤال
In a star network, all nodes connect to a central communications ____________________.
سؤال
A network that can be partitioned is secure and reliable.
سؤال
Match between columns
Concerns the structure of the connections between the computers in a network
Topology
Concerns the structure of the connections between the computers in a network
Cloud
Concerns the structure of the connections between the computers in a network
Logical topology
Concerns the structure of the connections between the computers in a network
Tunnels
Concerns the structure of the connections between the computers in a network
NAPs
Logical connections between the nodes of the VPN
Topology
Logical connections between the nodes of the VPN
Cloud
Logical connections between the nodes of the VPN
Logical topology
Logical connections between the nodes of the VPN
Tunnels
Logical connections between the nodes of the VPN
NAPs
A graphical symbol used to describe a network without specifying the nature of the connections
Topology
A graphical symbol used to describe a network without specifying the nature of the connections
Cloud
A graphical symbol used to describe a network without specifying the nature of the connections
Logical topology
A graphical symbol used to describe a network without specifying the nature of the connections
Tunnels
A graphical symbol used to describe a network without specifying the nature of the connections
NAPs
Provide access to national and global network traffic
Topology
Provide access to national and global network traffic
Cloud
Provide access to national and global network traffic
Logical topology
Provide access to national and global network traffic
Tunnels
Provide access to national and global network traffic
NAPs
Has to do with the path a packet of data takes through the network
Topology
Has to do with the path a packet of data takes through the network
Cloud
Has to do with the path a packet of data takes through the network
Logical topology
Has to do with the path a packet of data takes through the network
Tunnels
Has to do with the path a packet of data takes through the network
NAPs
سؤال
Describe a private network.
سؤال
Describe a mesh network.
سؤال
Discuss subnetting.
سؤال
Describe a hybrid network.
سؤال
Discuss the difference between a hub and a switch.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/26
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Network Topology
1
The connections for the ____ of a network may be provided through dedicated phone lines, twisted pair cable, fiber optic cable line-of-sight microwave RF, ATM, or other form of electronic connection.

A) physical topology
B) virtual topology
C) physical infrastructure
D) virtual interconnection
A
2
Companies that connect to a NAP enter into ____ agreements with each other that allow them to exchange traffic.

A) posting
B) partner
C) peering
D) polling
C
3
The network cloud may comprise only the network found in a small laboratory, or it may represent an entire wide area network (WAN) such as the Internet.
True
4
A ____ uses public network connections to establish private communication by encrypting the data transmitted between the two computers at each end of the connection.

A) NPV
B) VN
C) PVN
D) VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
5
A ____ is a portion of a network.

A) subnet
B) subunit
C) slice
D) subdivision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
6
____________________ is a logical, not physical, activity and is accomplished using a special subnet mask, such as 255.255.255.192.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
7
Token-ring networks, although logically viewed as rings, are connected using central ____.

A) media access units
B) multistation access units
C) station access units
D) access units
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
8
Even if the encrypted traffic is intercepted, chances are very small that the contents can be decrypted if a suitably strong encryption method and key are used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
9
In a bus network, if two or more nodes transmit data at the same time, a ____ occurs.

A) collision
B) compression
C) collusion
D) contention
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
10
A(n) ____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
11
In a fully connected network, the number of connections at each node equals the total number of nodes plus one.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
12
A(n) ____________________ circuit is a prearranged path through the network that all packets will travel for a particular session between machines.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
13
With certain types of network communications, it is possible that duplicate packets of data are generated if an acknowledgement is not received by the source computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
14
In terms of security and reliability, we must concern ourselves with what is required to ____________________ our network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
15
A ____ network uses a single shared common communication media that all nodes tap into.

A) ring
B) star
C) bus
D) string
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
16
Seven fully connected nodes require ____ links.

A) 14
B) 21
C) 28
D) 35
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
17
A(n) ____ is a 32-bit number used to locate and identify nodes on the Internet.

A) MAC address
B) TCP address
C) Ethernet address
D) IP address
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
18
When a large amount of data must be sent between machines on a network, it is possible to set up a ____ between the machines.

A) permanent circuit
B) virtual circuit
C) virtual interface
D) physical interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
19
In a star network, all nodes connect to a central communications ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
20
A network that can be partitioned is secure and reliable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
Concerns the structure of the connections between the computers in a network
Topology
Concerns the structure of the connections between the computers in a network
Cloud
Concerns the structure of the connections between the computers in a network
Logical topology
Concerns the structure of the connections between the computers in a network
Tunnels
Concerns the structure of the connections between the computers in a network
NAPs
Logical connections between the nodes of the VPN
Topology
Logical connections between the nodes of the VPN
Cloud
Logical connections between the nodes of the VPN
Logical topology
Logical connections between the nodes of the VPN
Tunnels
Logical connections between the nodes of the VPN
NAPs
A graphical symbol used to describe a network without specifying the nature of the connections
Topology
A graphical symbol used to describe a network without specifying the nature of the connections
Cloud
A graphical symbol used to describe a network without specifying the nature of the connections
Logical topology
A graphical symbol used to describe a network without specifying the nature of the connections
Tunnels
A graphical symbol used to describe a network without specifying the nature of the connections
NAPs
Provide access to national and global network traffic
Topology
Provide access to national and global network traffic
Cloud
Provide access to national and global network traffic
Logical topology
Provide access to national and global network traffic
Tunnels
Provide access to national and global network traffic
NAPs
Has to do with the path a packet of data takes through the network
Topology
Has to do with the path a packet of data takes through the network
Cloud
Has to do with the path a packet of data takes through the network
Logical topology
Has to do with the path a packet of data takes through the network
Tunnels
Has to do with the path a packet of data takes through the network
NAPs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
22
Describe a private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe a mesh network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
24
Discuss subnetting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe a hybrid network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
26
Discuss the difference between a hub and a switch.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 26 في هذه المجموعة.