1. According to the textbook, data centers are normally not very expensive to build and maintain, which explains the current trend for all organizations to create them.
  2. Using a HomePlug standard Powerline adapter, devices can connect to the LAN wherever there is an electrical outlet.
  3. Which devices on a network will hear an ARP request?
  4. Which protocol enables reliable communication between processes running on separate hosts and has reliable, acknowledged transmissions.
  5. According to the textbook, real-time applications require more planning and dedicated services (relative to other types of data) to ensure priority delivery of voice and video traffic.
  6. Which of the following connections runs over a telephone line with the line split into three channels?
  7. IEEE rates UTP cabling according to its performance, thereby placing cables into categories according to their ability to carry higher-bandwidth rates.  Of the following categories, which one is the recommended type for data networking in new building installations?
  8. The need for a single, reserved circuit from end to end exists in a packet-switched network.
  9. What is true of Tier 3 ISPs?
  10. What is the decimal equivalent of the binary number 11111000?
  11. According to the textbook, which of the following is a way in which network infrastructures can vary?
  12. Which of the following is not one of the three primary collaboration questions that organizations must ask to achieve effective collaboration?
  13. Like IPv4, IPv6 uses both the prefix length and the dotted-decimal subnet mask notation for indicate the network portion of an IPv6 address.
  14. The ____ provides communications between the hardware and software of the computer system as well as manages hardware resources.
  15. Which IPv4 block of addresses is reserved for multi-cast groups?
  16. What is a fault-tolerant network?
  17. According to the textbook, switch devices and wireless access points cannot be separate dedicated devices within a network implementation.
  18. What type of physical topology involves end systems connected to their respective neighbor, forming a circle?
  19. _______________ is the most common type of networking cable.  It is commonly used to interconnect a host to a switch and a switch to a router.
  20. __ are pages that are easy to update and edit and give anyone a means to communicate their thoughts to a global audience without technical knowledge of web design.  They are like an individual, personal journal.
  21. What are two types of network security concerns that must be addressed with respect to security?
  22. What is the result of the binary number 00000000 ANDed with 00101010?
  23. In the textbook, which of the following is not listed among the most common external threats to networks?
  24. The seven OSI model layers are more often referred to by number rather than by name.  Which layer number is the session layer in the OSI model?
  25. UDP is a reliable protocol, whereas TCP does not provide reliability.
  26. Which type of traffic must receive the highest priority from QoS?
  27. To identify a target application in a data stream, the transport layer assigns each application an identifier known as a(n) _______.
  28. According to the textbook, a __________ network is one that limits the impact of a failure so that the fewest number of devices are affected by it.
  29. A scalable network can expand quickly to support new users and applications without impacting the performance of the service being delivered to existing users.
  30. ____ is the name given to the clock signal that occurs evenly spaced time durations during which data signals are sent in synchronous transmissions.
  31. What is the IPv6 DHCP message that corresponds to the IPv4 DHCPACK message?
  32. Which of the following is not a characteristic of single-mode fiber?
  33. Which of the following is not a factor that needs to be considered when designing a small network?
  34. Just above the physical layer is the _____ layer.
  35. What is the hexadecimal equivalent of the decimal number 68?
  36. Which field in an Ethernet frame is used for error detection?
  37. When a host sends messages using a one-to-many delivery option, it is known as a ________.
  38. Global configuration mode and interface configuration modes can only be reached from the User EXEC mode.
  39. What is the binary equivalent of the decimal number 128?
  40. Which protocol enables clients to retrieve email from a mail server and downloads email from the mail server to the desktop?
  41. What is the binary equivalent of the decimal number 119?
  42. How many hosts per network can you have with a subnet mask of
  43. Which of the following is not a way of ensuring confidentiality in a network?
  44. The local routing table of a host typically contains a route to the loopback interface (  This address is known as a __________.
  45. The further a device is from a wireless access point, the stronger the wireless signal it receives.
  46. The function of the _ layer is to facilitate the transport of data from one network to another.
  47. Which of the following is a characteristic of Cat7 cable?
  48. ____________ is technology that is integrated into everyday appliances, allowing them to interconnect with other devices, making them more automated.
  49. According to the textbook, throughput usually does not match the specified bandwidth in physical layer implementations.
  50. According to the textbook, when a banner is used on an IOS device, it should always welcome someone to the device as its first statement.
  51. You are given an IPv4 network address of by your ISP.  You need to subnet this network.  You know that the subnet mask will be What is the last usable host address of the first subnet (i.e. subnet[0])?
  52. The _ command is used to verify the internal IP configuration on a local host.
  53. Which Wi-Fi standard operates in the 2.4-GHz frequency band and offers speeds of up to 11 Mbps?
  54. Which of the following data communications standards apply to wireless media?
  55. What command(s) is(are) used to take a device from privileged EXEC mode to the global configuration mode?
  56. You have been assigned an IP address for your network of / 24.  Each subnet needs to accommodate 12 hosts.  What is the subnet mask?
  57. The term ____ refers to a private connection of LANs and WANs that belongs to an organization and is designed to be accessible only by the organization’s members, employees, or others with authorization.
  58. A(n) __ firewall consists of a firewall application that runs on a network operating system such as UNIX or Windows.
  59. What is the decimal equivalent of the hexadecimal number AA?
  60. A(n) ___________ transmission exists when data signals are transmitted without an associated clock signal.
  61. _____ is a protocol that governs the way that a web server and a web client interact.
  62. What is the decimal equivalent of the hexadecimal number EA?
  63. Controlled access is also known as __.
  64. When data travels from a source node to a destination node, the user data is first segmented by the layer, placed into packets by the layer, and further encapsulated as frames by the _ layer.
  65. Which of the following firewall techniques blocks unsolicited packets unless permitted specifically?
  66. Shining a bright flashlight into one end of a fiber cable while observing the visible light at the other end of the fiber ensures the performance of the fiber.
  67. When a sender does not receive an acknowledgement from a TCP transmission within a certain period of time, what happens?
  68. Which IPv4 block of addresses is reserved for future use and is currently being used for research and experimentation purposes?
  69. _____________________________occurs in fiber-optic media when the media do not completely touch at the splice or connection.
  70. Which of the following organizations developed standard ISO 8877, which officially adopted the RJ connections such as RJ-11 and RJ-45?
  71. ___________ communication relies on unidirectional data flow, where sending and receiving data are not performed at the same time.
  72. __ enables the automatic assignment of addressing information such as IP address, subnet mask, default gateway, and other configuration information.
  73. What is the IPv6 DHCP message that corresponds to the IPv4 DHCPOFFER message?
  74. In Ethernet technology, IP addresses are used to identify the frame source and destination.
  75. When an incoming data frame is received by a switch and the destination MAC address is not found in the MAC address table, the switch forwards the frame out all ports, except for the port on which it was received.