Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C724 Unit 5 Test

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
30-03-2022
Written in
2021/2022

T/F: Coaxial cable is the required medium for telecommunication transmissions Correct answer- False- there are many other mediums for communications including fiber optics, ethernet, and radio frequency 2. What is a universal telecommunication network protocol that most operating systems can recognize? Correct answer- ICP/IP- it's the standard internet protocol that widely used and has replaced most other network protocols. 3. A router connects data links from a single network and transmits data packets between what? Correct answer- Different networks 4. Do switches connect single or different networks? Correct answer- Single networks 5. Are hypervisors or hypervisor applications necessary in small businesses with simple networks? Correct answer- No- a hyperviosr is a computer software that enables network virtualization and is not necessary 6. What are the two fundamental protocols that can describe modern telecom networks? Correct answer- Packet transmission and TCP/IP protocol 7. Packet switching refers to a computer network's ability to do what? Correct answer- Transmit information in discrete, parsed data encapsulated in packets 8. Why is it imperative that modern businesses have a social media marketing strategy? Correct answer- To capture this new community of users and to address issues of social care 9. The internet is organized as a client/server system. Which of the following statements is FALSE regarding the client/server architecture? - All the applications reside on the server - The client/server architecture maximizes traffic on the network - The client has control over the applications residing on the server - The client sends messages requesting services from the server on the network Correct answer- I have no idea 10. Economic communications has predominantly become the primary form of communications in first world countries. What protocol is used to manage and monitor the massive amount of emails that we receive every day? Correct answer- Single Mail Transfer Protocol (SMTP)- it is one of the several popular email protocols used today. Other popular mail protocols include IMAP and POP3 11. The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose? Correct answer- To increase the number of unique IP addresses 12. T/F: A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third party internet service provider. Correct answer- True- a VPN is a secure tunnel through the internet using a public infrastructure. 13. A reliable INTRAnet connection provides organizations and their suppliers and vendors with what kind of platform for internal use? Correct answer- a secure platform 14. T/F: Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone Correct answer- False- the telegraph led to the innovation of the telephone? 15. Cloud computing is becoming more popular because users Correct answer- have more flexibility than they do with VPN 16. What's the typical broadband data speed of a 4G network? Correct answer- 100,000 kbps 17. What is a denial of service attack? Correct answer- A hacker attempt to tie up network host resources making them unavailable 18. What's the primary difference between a 1G cellular network and the current 4G network? Correct answer- 1G enabled mobile voice telecommunication while 4G offers voice, data, and video 19. What's a radio frequency survey? Correct answer- a signal strength detection process to identify the best wireless access point locations 20. Why is Wi-Fi Protected Access (WPA) critical to wireless networks? Correct answer- it's a tunneling encryption protocol that secures wireless data transmissions 21. What does "WSN" stand for and what are they used for? Correct answer- Wireless Sensor Networks - used for monitoring environmental conditions 22. [True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals. Correct answer- False Wireless uses radio waves over the radio spectrum 23. When streaming data or voice, which type of switched network is used? a- analog switch b- packet switch c- circuit switch Correct answer- c- circuit switch 24. What is another name for a network host? a- data terminal equipment b- network server c- host computer Correct answer- a- data terminal equipment 25. What are peer-to-peer network topologies? a- peer-to-peer topologies connect each user in a network directly b- peer-to-peer topologies connect each user to the mainframe c- peer-to-peer topologies are hierarchial networks Correct answer- a- peer-to-peer topologies connect each user in a network directly 26. How many layers are in the standard OSI model? a- 5 b- 7 c- 6 Correct answer- b- 7 27. Which of the following is a characteristic of a legacy or old analog network? a- they carried continuous electronic waveforms b- they require packet switched networks c- they did not have capacity or bandwidth limitations Correct answer- a- they carried continuous electronic waveforms 28. [True/False] The internet of Things (IoT) will enable automated, just in time e- commerce transactions. Correct answer- True The IoT,through 24/7 connectivity of devices, will enable automatic response and transactions 29. Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network? a- 25 and 1 b- 212 and 1 c- 142 and 212 d- 142 and 25 Correct answer- a- 25 and 1 the last two bytes are assigned to and managed by the client (the first two bytes are assigned to and managed by the ISP) 30. Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop? a- iPod b- smartphone c- tablet d- netbook Correct answer- b- smartphone 31. Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following is a benefit of an extranet? a- store and share information b- interact with suppliers c- interact with customers d- interact with employees Correct answer- b- interact with suppliers 32. Which of the following application provided by the Internet allows an online retailer to conduct business? a- web forms b- fax machine c- web enabled storefront d- electronic communications Correct answer- c- web enabled storefront 33. The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what? a- less complexity due to the need for more systems and better improvements in their processing capabilities b- the need for less powerful systems due to cloud computing handling processing power c- more complexity due to the need for more systems and better improvements in their processing capabilities Correct answer- c- more complexity due to the need for more systems and better improvements in their processing capabilities 34. The term 'generations' is used to describe changes in which type of technology? a- cellular wireless standards b- telecommunications protocols c- network hardware devices Correct answer- a- cellular wireless standards 35. What information can be gained by sniffing a wireless network? a- passwords and login ids b- root level access to a computer c- VPN access to a corporate network Correct answer- a- passwords and login ids 36. What does PSDN stand for? a- Protocol Standard Data Network b- Packet Standard Data Node c- Packet Switched Data Networks Correct answer- c- Packet Switched Data Networks 37. Wireless LAN networks are a- more scalable and reliable than wired networks b- more reliable than wired networks c- more scalable than wired networks Correct answer- c- more scalable than wired networks 38. [True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises. Correct answer- True an advantage of a wireless LAN is that it allows visitors to access the internet 39. Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered? a- barcode b- RFID c- wireless sensor networks Correct answer- b- RFID 40. For an individual or business, data can be uploaded to the internet in many forms. Which of the following should NOT be communicated on the internet? a- data streaming b- web pages c- banking transactions d- personnel files Correct answer- c- banking transactions 41. A web browser is required to surf the internet. What other protocol is needed by a client computer to request a website via HTTP or HTTPS? a- DNS b- FTP c- URL d- Telnet Correct answer- c- URL 42. Which of the following is not an effective telecommunication medium? a- fiber optics cable b- CAT 5 cable c- copper building wire Correct answer- 43. What is QoS (Quality of Service)? a- QoS is used to ensure fiber optic network performance b- QoS is used to measure performance of data communications c- QoS is mostly used to measure data switched networks Correct answer- 44. What is the purpose of a network sniffer? a- to monitor network traffic b- to hack into networks c- to improve QoS Correct answer- 45. What is the best definition of a core router? a- core routers are used in fiber optics networks b- core routers connect large businesses to the internet backbone c- core routers have few protocol capabilities Correct answer- 46. [True/False] The virtual layer is the seventh layer of the OSI model. Correct answer- 47. Which of the following best defines a digital signal? a- a digital signal is a discrete, non-continuous electrical waveform b- a digital signal is a packet c- a digital signal is a frequency driven medium Correct answer- 48. ___________ will soon surpass desktop computers accessing the internet. a- servers b- laptops c- smartphones Correct answer- 49. While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which of the following Internet applications? a- bulletin board b- blog c- instant message d- email Correct answer- 50. Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. Which of the following is NOT one of the governing bodies that recommend and decides on telecommunications standards? a- IEEE b- IOS c- ARPANET d- IETF Correct answer- IEEE (Institute of Electrical and Electronics Engineers) 51. Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider? a- 142 and 212 b- 25 and 1 c- 212 and 1 d- 142 and 25 Correct answer- a- 142 and 212 52. Most people now use smartphones daily for every aspect of their lives, which includes work, communicating with friends and family, entertainment, shopping, and even health-related activities. Which of the following statements regarding smartphones is FALSE? a- it does not have an operating system like those on desktops and laptops b- it has ample processing power and electronic storage c- it has unique sensors and functions built for mobility d- it combines a cellular phone device with a mobile computer platform Correct answer- d- it combines a cellular phone device with a mobile computer platform 53. Among all the connections - Internet, intranet, and extranet - the Internet is _____________ a- a type of extranet for suppliers doing business b- the second most widely used channel for business c- the most widely used channel for business Correct answer- 54. Which of the following applications provided by the Internet allows a business to transfer documents automatically without human intervention? a- web forms b- electronic forms c- information repositiories d- electronic data interchange Correct answer- 55. Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN? a- secured access b- reduced expense Correct answer- 56. Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN? a- secured access b- reduced expense c- greater flexibility Correct answer- 57. Bluetooth is a wireless protocol that connects nearby devices with peripherals at: a- 64 kbps b- 2.4 MHz c- 2.4 GHz Correct answer- 58. Spoofing is effective to hackers because it solicits a network a- authentication b- denial of service c- response Correct answer- 59. [True/False] 4G networks provide IP based voice, data, and multimedia traffic. Correct answer- 60. When installing a wireless network, it is important to know the number of _________ and the best access point locations a- routers b- hubs c- users Correct answer- 61. ________________- is the ability of a network to to grow user and services without forklift upgrades. a- expandability b- portabiliby 62. cscalability Correct answer- _____________ is the ability of a network to to grow user and services without forklift upgrades. a- expandability b- portability c- scalability 63. RFID technology helps companies to be more _______________ with inventory management because they eliminate the need for physical handling of materials during cycle counting. a- effective b- smart c- productie Correct answer-

Show more Read less
Institution
Course

Content preview

WGU C724 Unit 5 Test

1. T/F: Coaxial cable is the required medium for telecommunication transmissions
Correct answer- False- there are many other mediums for communications
including fiber optics, ethernet, and radio frequency

2. What is a universal telecommunication network protocol that most operating
systems can recognize? Correct answer- ICP/IP- it's the standard internet
protocol that widely used and has replaced most other network protocols.

3. A router connects data links from a single network and transmits data packets
between what? Correct answer- Different networks

4. Do switches connect single or different networks? Correct answer- Single
networks

5. Are hypervisors or hypervisor applications necessary in small businesses with
simple networks? Correct answer- No- a hyperviosr is a computer software that
enables network virtualization and is not necessary

6. What are the two fundamental protocols that can describe modern telecom
networks? Correct answer- Packet transmission and TCP/IP protocol

7. Packet switching refers to a computer network's ability to do what? Correct
answer- Transmit information in discrete, parsed data encapsulated in packets

8. Why is it imperative that modern businesses have a social media marketing
strategy? Correct answer- To capture this new community of users and to
address issues of social care

9. The internet is organized as a client/server system. Which of the following
statements is FALSE regarding the client/server architecture?
- All the applications reside on the server
- The client/server architecture maximizes traffic on the network
- The client has control over the applications residing on the server
- The client sends messages requesting services from the server on the
network Correct answer- I have no idea

10. Economic communications has predominantly become the primary form of
communications in first world countries. What protocol is used to manage and
monitor the massive amount of emails that we receive every day? Correct
answer- Single Mail Transfer Protocol (SMTP)- it is one of the several popular

, email protocols used today. Other popular mail protocols include IMAP and
POP3

11. The IP version 6 (IPv6) addressing scheme was developed in 2006 for what
purpose? Correct answer- To increase the number of unique IP addresses

12. T/F: A virtual private network (VPN) provides a secure, encrypted, and remote
connection between employees and the company's server via a third party
internet service provider. Correct answer- True- a VPN is a secure tunnel through
the internet using a public infrastructure.

13. A reliable INTRAnet connection provides organizations and their suppliers and
vendors with what kind of platform for internal use? Correct answer- a secure
platform

14. T/F: Telegraph technology provided richer quality, more detailed, and a more
reliable form of communication than the telephone Correct answer- False- the
telegraph led to the innovation of the telephone?

15. Cloud computing is becoming more popular because users Correct answer- have
more flexibility than they do with VPN

16. What's the typical broadband data speed of a 4G network? Correct answer-
100,000 kbps

17. What is a denial of service attack? Correct answer- A hacker attempt to tie up
network host resources making them unavailable

18. What's the primary difference between a 1G cellular network and the current 4G
network? Correct answer- 1G enabled mobile voice telecommunication while 4G
offers voice, data, and video

19. What's a radio frequency survey? Correct answer- a signal strength detection
process to identify the best wireless access point locations

20. Why is Wi-Fi Protected Access (WPA) critical to wireless networks? Correct
answer- it's a tunneling encryption protocol that secures wireless data
transmissions

21. What does "WSN" stand for and what are they used for? Correct answer-
Wireless Sensor Networks - used for monitoring environmental conditions

22. [True/False] Wireless communication uses radio waves over the optical spectrum
to send and receive signals. Correct answer- False
Wireless uses radio waves over the radio spectrum

Written for

Course

Document information

Uploaded on
March 30, 2022
Number of pages
8
Written in
2021/2022
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5153
Member since
4 year
Number of followers
3566
Documents
54380
Last sold
1 hour ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.9

939 reviews

5
448
4
166
3
170
2
47
1
108

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions