You are on page 1of 8

Network+ Guide to Networks 5th

Edition Dean Test Bank


Visit to download the full and correct content document: https://testbankdeal.com/dow
nload/network-guide-to-networks-5th-edition-dean-test-bank/
Chapter 7:WANs and Remote Connectivity

TRUE/FALSE

1. In a star topology, a single connection failure will halt all traffic between all sites.

ANS: F PTS: 1 REF: 303

2. Dial-up ISDN does not convert a computer’s digital signals to analog before transmitting them over
the PSTN.

ANS: T PTS: 1 REF: 311

3. ATM is a WAN technology that functions in the Data Link layer.

ANS: T PTS: 1 REF: 324

4. SONET specifies framing and multiplexing techniques at the Physical layer.

ANS: T PTS: 1 REF: 325

5. The PPTP VPN tunneling protocol is based on technology developed by Cisco.

ANS: F PTS: 1 REF: 338

MULTIPLE CHOICE

1. WANs typically send data over ____ available communications networks.


a. privately c. individually
b. publicly d. serially
ANS: B PTS: 1 REF: 300

2. The individual geographic locations connected by a WAN are known as ____.


a. WAN sites c. network service providers
b. WAN links d. central offices
ANS: A PTS: 1 REF: 300

3. Because WAN connections require routers or other Layer 3 devices to connect locations, their links are
not capable of carrying ____ protocols.
a. open c. routable
b. standard d. nonroutable
ANS: D PTS: 1 REF: 301

4. On most modern WANs, a ring topology relies on ____ rings to carry data.
a. flexible c. serial
b. open d. redundant
ANS: D PTS: 1 REF: 302
5. The portion of the PSTN that connects any residence or business to the nearest CO is known as the
____.
a. demarcation point c. local loop
b. NIU (Network Interface Unit) d. central office
ANS: C PTS: 1 REF: 308

6. A PSTN offers ____ security.


a. exceptional c. expanded
b. marginal d. dedicated
ANS: B PTS: 1 REF: 308

7. ____ is an updated, digital version of X.25 that also relies on packet switching.
a. DSL c. Frame relay
b. ISDN d. ATM
ANS: C PTS: 1 REF: 309

8. In a process called ____, two 64-Kbps ISDN B channels can be combined to achieve an effective
throughput of 128 Kbps.
a. slicing c. merging
b. linking d. bonding
ANS: D PTS: 1 REF: 311

9. A ____ converts digital signals into analog signals for use with ISDN phones and other analog devices.
a. terminal adapter c. smart jack
b. DSLAM d. terminator
ANS: A PTS: 1 REF: 311

10. ISDN PRI uses ____ B channels and one 64-Kbps D channel.
a. 10 c. 23
b. 12 d. 32
ANS: C PTS: 1 REF: 312

11. The speed of a T-carrier depends on its ____ level.


a. signal c. channel
b. hierarchy d. traffic
ANS: A PTS: 1 REF: 314

12. At the customer’s demarcation point, either inside or outside the building, T-carrier wire pairs
terminate with a ____.
a. terminal adapter c. CSU/DSU
b. smart jack d. switch
ANS: B PTS: 1 REF: 315

13. A ____ aggregates multiple DSL subscriber lines and connects them to the carrier’s CO.
a. terminal adapter c. smart jack
b. DSLAM d. terminator
ANS: B PTS: 1 REF: 320
14. Broadband cable requires many subscribers to share the same local line, thus raising concerns about
____ and actual (versus theoretical) throughput.
a. access c. noise
b. costs d. security
ANS: D PTS: 1 REF: 322

15. What sets ATM apart from Ethernet is its ____ size.
a. channel c. variable packet
b. frame d. fixed packet
ANS: D PTS: 1 REF: 324

16. SONET’s extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
a. throughput c. fault tolerance
b. low cost d. latency
ANS: C PTS: 1 REF: 325

17. The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally
recognized by networking professionals and standards organizations.
a. OC (Optical Carrier) level c. BRI (Basic Rate Interface)
b. CIR (committed information rate) d. DS0 (digital signal, level 0)
ANS: A PTS: 1 REF: 326

18. ____ networking refers to dialing directly into a private network’s or ISP’s remote access server to log
on to a network.
a. Remote c. Dial-up
b. Direct d. Virtual
ANS: C PTS: 1 REF: 329

19. ____ is the preferred communications protocol for remote access communications.
a. SLIP c. PPP
b. IP d. TCP/IP
ANS: C PTS: 1 REF: 332

20. ____ is the standard for connecting home computers to an ISP via DSL or broadband cable.
a. SLIP c. PPP
b. SLIPoE d. PPPoE
ANS: D PTS: 1 REF: 332

21. ____ virtual computing allows a user on one computer, called the client, to control another computer,
called the host or server, across a network connection.
a. Random c. Open
b. Network d. Remote
ANS: D PTS: 1 REF: 333

COMPLETION

1. ____________________ are connections between network nodes that, although based on potentially
disparate physical links, logically appear to be direct, dedicated links between those nodes.
ANS: Virtual circuits

PTS: 1 REF: 309

2. A(n) ____________________ uses TDM (time division multiplexing) over two wire to divide a single
channel into multiple channels.

ANS: T-carrier

PTS: 1 REF: 313

3. ____________________ encapsulates incoming Ethernet or token ring frames, then converts them into
ATM cells for transmission over an ATM network.

ANS:
LANE (LAN Emulation)
LAN Emulation
LANE

PTS: 1 REF: 324

4. ____________________ is the remote virtual computing software that comes with Windows client
and server operating systems.

ANS: Remote Desktop

PTS: 1 REF: 333

5. ___________________________________ is an open source system designed to allow one


workstation to remotely manipulate and receive screen updates from another workstation.

ANS:
VNC (virtual network computing)
Virtual network computing
VNC

PTS: 1 REF: 336

MATCHING

Match each item with a statement below:


a. bus topology WAN f. upstream
b. star topology WAN g. asymmetrical communications
c. mesh topology WAN h. symmetrical technology
d. tiered topology WAN i. signal level
e. downstream
1. Contain sites that are connected in star or ring formations are interconnected at different levels, with
the interconnection points being organized into layers to form hierarchical groupings.
2. Occurs when data travels from the carrier’s switching facility to the customer.
3. Contains a single site acting as the central connection point for several other points.
4. Occurs when downstream throughput is higher than upstream throughput.
5. Refers to the T-carrier’s Physical layer electrical signaling characteristics as defined by ANSI
standards in the early 1980s.
6. Occurs when data travels from the customer to the carrier’s switching facility.
7. Occurs when each site is directly connected to no more than two other sites in a serial fashion.
8. Provides equal capacity for data traveling both upstream and downstream.
9. Incorporates many directly interconnected sites.

1. ANS: D PTS: 1 REF: 304


2. ANS: E PTS: 1 REF: 318
3. ANS: B PTS: 1 REF: 303
4. ANS: G PTS: 1 REF: 318
5. ANS: I PTS: 1 REF: 314
6. ANS: F PTS: 1 REF: 318
7. ANS: A PTS: 1 REF: 301
8. ANS: H PTS: 1 REF: 318
9. ANS: C PTS: 1 REF: 304

SHORT ANSWER

1. Describe the fundamental properties WANs and LANs have in common.

ANS:
WANs and LANs have several fundamental properties in common. Both are designed to enable
communication between clients and hosts for resource sharing. In general, both use the same protocols
from Layers 3 and higher of the OSI model. And both networks typically carry digitized data via
packet-switched connections.

PTS: 1 REF: 300

2. Define and describe a PSTN.

ANS:
PSTN, which stands for Public Switched Telephone Network, refers to the network of lines and carrier
equipment that provides telephone service to most homes and businesses. PSTN may also be called
POTS (plain old telephone service). The PSTN encompasses the entire telephone system, from the
wires that enter homes and businesses to the network centers that connect different regions of a
country.

PTS: 1 REF: 305

3. Describe an important difference between frame relay and X.25.

ANS:
An important difference between frame relay and X.25 is that frame relay does not guarantee reliable
delivery of data. X.25 checks for errors and, in the case of an error, either corrects the damaged data or
retransmits the original data. Frame relay, on the other hand, simply checks for errors. It leaves the
error correction up to higher-layer protocols.

PTS: 1 REF: 309

4. Define a fractional T1 and explain why an organization might implement it.


ANS:
A fractional T1 lease allows organizations to use only some of the channels on a T1 line and be
charged according to the number of channels they use. Thus, fractional T1 bandwidth can be leased in
multiples of 64 Kbps. A fractional T1 is best suited to businesses that expect their traffic to grow and
that may require a full T1 eventually, but can’t currently justify leasing a full T1.

PTS: 1 REF: 314

5. Define the term xDSL and name the better known DSL varieties.

ANS:
The term xDSL refers to all DSL varieties, of which at least eight currently exist. The better known
DSL varieties include ADSL (Asymmetric DSL), G.Lite (a version of ADSL), HDSL (High Bit-Rate
DSL), SDSL (Symmetric or Single-Line DSL), VDSL (Very High Bit-Rate DSL), and SHDSL
(Single-Line High Bit-Rate DSL) - the x in xDSL is replaced by the variety name.

PTS: 1 REF: 318

6. Explain how a cable modem is utilized in broadband cable connections.

ANS:
Broadband cable connections require that the customer use a special cable modem, a device that
modulates and demodulates signals for transmission and reception via cable wiring. Cable modems
operate at the Physical and Data Link layer of the OSI model, and, therefore, do not manipulate
higher-layer protocols, such as IP. The cable modem then connects to a customer’s PC via an RJ-45,
USB, or wireless interface to a NIC. Alternately, the cable modem could connect to a connectivity
device, such as a hub, switch, or router, thereby supplying bandwidth to a LAN rather than to just one
computer. It’s also possible to use a device that combines cable modem functionality with a router; this
single device can then provide both the broadband cable connection and the capability of sharing the
bandwidth between multiple nodes.

PTS: 1 REF: 321 | 322

7. Explain how ATM relies on virtual circuits.

ANS:
Like X.25 and frame relay, ATM relies on virtual circuits. On an ATM network, switches determine
the optimal path between the sender and receiver, then establish this path before the network transmits
data. Because ATM packages data into cells before transmission, each of which travels separately to
its destination, ATM is typically considered a packet-switching technology. At the same time, the use
of virtual circuits means that ATM provides the main advantage of circuit switching - that is, a
point-to-point connection that remains reliably available to the transmission until it completes, making
ATM a connection-oriented technology.

PTS: 1 REF: 324

8. Describe the most important advantage of SONET.

ANS:
Perhaps the most important SONET advantage is that it provides interoperability. Before SONET,
telecommunications carriers that used different signaling techniques (or even the same technique but
different equipment) could not be assured that their networks could communicate. Now, SONET is
often used to aggregate multiple T1s, T3s, or ISDN lines. SONET is also used as the underlying
technology for ATM transmission. Furthermore, because it can work directly with the different
standards used in different countries, SONET has emerged as the best choice for linking WANs
between North America, Europe, and Asia. Internationally, SONET is known as SDH (Synchronous
Digital Hierarchy).

PTS: 1 REF: 325

9. Define and describe RRAS.

ANS:
RRAS (Routing and Remote Access Service) is Microsoft’s remote access software available with the
Windows Server 2003 and Server 2008 network operating systems and the Windows XP and Vista
client operating systems. RRAS enables a computer to accept multiple remote client connections over
any type of transmission path. It also enables the server to act as a router, determining where to direct
incoming packets across the network. Further, RRAS incorporates multiple security provisions to
ensure that data cannot be intercepted and interpreted by anyone other than the intended recipient and
to ensure that only authorized clients can connect to the remote access server.

PTS: 1 REF: 331

10. Describe two important considerations when designing a VPN.

ANS:
Two important considerations when designing a VPN are interoperability and security. To ensure a
VPN can carry all types of data in a private manner over any kind of connection, special VPN
protocols encapsulate higher-layer protocols in a process known as tunneling. You can say that these
protocols create the virtual connection, or tunnel, between two VPN nodes. One endpoint of the tunnel
is the client. The other endpoint may be a connectivity device (for example, a router, firewall, or
gateway) or a remote access server that allows clients to log on to the network.

PTS: 1 REF: 338

You might also like