Chapter 1 Quiz Questions 1. A _ network is confined to a relatively small space. a. MAN
b. c. d. 2.
LAN WAN NAN
A _ network connects clients and servers from multiple buildings. a. MAN
Often, separate LANs are interconnected and rely on s
_ is the process of reconstructing segmented data. a. Realigning b. Resegmenting c. Reassembly d. Reengineering Which OSI model layer generates and detects voltage so as to transmit and receive signals carrying data? a. Data Link layer b. Transport lay
Module 6 Quiz 1
In cut-through switching, which frame field does the switch never read?
Frame check sequence
To install a NIC, you must first install the _.
In general, a steady or blinking green LED, sometimes labeled _, indicates that
the NIC i
A common way of sharing resources on a peer-to-peer network is
by modifying the _ controls using the computers operating
Often, separate LANS are interconnected and rely on several
_running many different applications and managing re
Presented by Sherese Harrell, Rebecca Meinhold, and Brenden Tourelle
What is Active Directory?
Organizes the objects of a network
The Open Systems
Sherese Harrell, Rebecca Meinhold, Peter Mella, Brenden Tourelle
The Application Layer
Communication in the Application
The application layer
Transmission Basics and
Kari Walters Module 3 ISDS 4120 Networks+ Guide to Networks/Managing and Troubleshooting Networks
Kari Walters Module 3 ISDS 4120 Networks+ Guide to Networks/Managing a
What is Malware?
Malware, derived from the combination of
the words 'malicious' and 'software', refers
to any program or piece of code designed to
intrude upon or harm a system or its
According to a quarterly report conducted by
Module 11 Quiz 1
The use of certificate authorities to associate public keys with certain users is known as _.
The combination of a public key and a private key is known as a _.
_ is a method of encrypting TCP/IP transmissions above the netwo
Presented by Sherese Harrell, Rebecca Meinhold & Brenden Tourelle
What is a
Data Link Layer
Chapter 5 Project Questions
1. What was your IP address?
2. What was one of the remote IP addresses your computer was communicating with?
3. How many packets did you capture?
8229 (the number was always changing)
4. What was
Hands-On Chapter 1 & 2
1. What was the creation date of your Windows directory?
2. What was the largest file in that directory?
3. What was the smallest file in that directory?
4. What was t
Chapter 3 & 4
1. What was your IP address for this test (in the bottom left-hand corner)?
2. What was your download speed?
3. What was your upload speed?
4. Which foreign server did you use for th
1. What was your IP address for this project?
2. What was the first octet of your IP address in binary?
3. What was your birth year in binary?
4. What was the first octet of your schools IP a
Chapter 5 quiz questions 1. WANs typically send data over _ available communications networks. a. individually b. publicly c. privately d. serially 2. _ virtual computing allows a user on one computer, called the client, to control another computer, calle
1. _ is a subprotocol in the TCP/IP suite that operates at the Network layer and manages multicasting. a. IGMP (Internet Group Managment Protocol) b. RARP (Reverse Address Resolution Protocol) c. ARP (Address Resolution Protocol) d. ICMP (Internet Control
1. Which of the following is a potential drawback to using fiberoptic cable for LANs? a. It can carry transmissions using only TCP/IP. b. It cannot handle high-bandwidth transmissions. c. It is expensive. d. It is not yet an accepted standard for high-spe
E. J. Ourso College of Business Administration
Department of Information Systems & Decision Sciences
Baton Rouge Louisiana 70803-6316 225/578-2126 fax 225/578-2511
Andrew Schwarz, Ph.D. Professor of Information Systems