100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

INFORMATION TECHNOLOGY EXAM 2025 UPDATED QUESTIONS, ANSWERS & MULTIPLE CHOICES.

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
19-01-2026
Written in
2025/2026

INFORMATION TECHNOLOGY EXAM 2025 UPDATED QUESTIONS, ANSWERS & MULTIPLE CHOICES. Which layer provides flow control and ensures data reliability from source to destination? a. network b. transport c. application d. data link b. transport In a mesh topology network, how many connections are needed for a one hundred node network? a. 4,950 b. 3,225 c. 1.435 d. 1,000 a. 4,950 One task of the ____ layer in a LAN is to handle error detection using a CRC. a. transport b. data link c. application d. session b. data link Which layer can route data on different paths by creating virtual circuits? a. data link b. transport c. network d. application c. network The smallest T-carrier service is T-1. True/False True The ____ topology consists of running cable from one PC or file server to the next, like links in a chain. a. mesh b. bus c. star d. tree b. bus A VPN, is another type of network, like LAN or WAN, and means Virtual Personal Network and is mostly used for short range communications. True/False False The term ____ refers to wrapping the information in one layer inside the information within the next layer. a. firewall b. encapsulates c. fault-tolerance d. full-duplex b. encapsulates The ____ topology is a continuous path for data with no logical beginning or ending point. a. mesh b. ring c. tree d. bus b. ring The ____ field in an Ethernet frame synchronizes frame transmission and consists of an alternating pattern of zeroes and ones. a. frame check sequence (FCS) b. preamble c. starts of frame delimiter (SFD) d. destination address b. preamble ____ is a process that scrambles the data so that it cannot be read if intercepted by unauthorized users. a. transport b. encryption c. analog d. beaconing b. encryption The Ethernet LAN transmission method can detect a collision has occurred by which of the following? a. broadcast storms b. half-duplex c. full-duplex d. the signal strength is two times the normal strength d. the signal strength is two times the normal strength A(n) ____ line is a dedicated telephone line that can be used for data communications to connect two different locations for continuous point-to-point communications. a. ethernet b. t-carrier c. twisted-pair d. transceiver b. t-carrier Which of the following allows you to configure Windows 7 as a host that allows client computers to access the Internet. a. IP b. HTTP c. ICS d. NAT c. ICS Which of the following is an example of a wireless PAN technology? a. Ethernet b. Bluetooth c. WIFI d. Vertical Cabling b. Bluetooth A ____ specifies how networked data is formatted into discrete units, such as packets or frames. a. topology b. wired path c. protocol d. HTTP c. protocol Which of the following commands can be used to test whether a peer node is reachable? a. ping b. tcpdump c. run d. beacon a. ping Analog signals are the basis of the most common signaling method used on LANs and high-speed WANs. True/False False If no broadcasts are detected from the active monitor or any one of the standby monitors, a ring goes into a ____ condition. a. roll-by b. terminating c. beaconing d. signaling c. beaconing Which layer is responsible for establishing and maintaining the communications link between nodes? a. Layer 1 b. Layer 3 c. Layer 4 d. Layer 5 d. Layer 5 A ____ is a workstation that accesses software and data through the network on another computer. a. node b. host c. client d. virtual machine c. client Which layer governs a user's access to network services? a. session b. application c. data link d. presentation b. application The ____ topology is the oldest communications design method, with roots in telephone switching systems. a. tree b. mesh c. star d. bus c. star The OSI model consists of ____ distinct layers stacked on one another. a. Five b. Six c. Seven d. Eight c. Seven Which of the following is an address associated with a NIC? a. HTTP b. MAC c. IP d. None of the Above b. MAC The term "____" refers to built-in protection against equipment or communications failure. a. Full-duplex b. Back-up c. Fault-Tolerance d. Half-Duplex c. Fault-Tolerance An enterprise network can consist of LANs that compose a MAN or CAN, but not a WAN. True/False False ____ used for protecting a network may be created using routers. a. Switch b. Fault-Tolerance c. Firewalls d. All of the above c. Firewalls Which of the following is NOT a field in an Ethernet frame? a. Length b. Preamble c. Port d. Frame Check Sequence c. Port Which of the following is NOT a common method of network communication? a. microwaves b. over copper wire c. over optical radio waves d. All are methods of communication c. over optical radio waves Which of the following attaches a network node to the communications media? a. bluetooth b. NIC c. vertical wiring d. wifi b. NIC The logical path followed by network packets or frames may not fully match the physical layout. True/False True Two-way alternate (TWA) mode for dialog control is used in ____ communications. a. full-duplex b. half-duplex c. analog d. None of the above b. half-duplex The token ring transport method uses a physical ____ topology along with the logic of a ring topology. a. bus b. mesh c. star d. ring c. star A(n)____ signal can vary continuously, as in a wave pattern with positive and negative voltage levels. a. half-duplex b. full-duplex c. analog d. None of the above c. analog A ____ is a high-capacity communications medium that joins networks and central network devices across long distances. a. router b. backbone c. switch d. repeater b. backbone Any device connected to a network is generically termed a(n) ____ or station. a. switch b. node c. client d. host b. node The information from one layer that is transferred to the next is called which of the following? a. HTTP b. PDU c. IP d. Packet b. PDU A ____ consists of interconnected computers, printers, and other computer equipment in close physical proximity. a. MAN b. CAN c. LAN d. PAN c. LAN A network ____ has two components: the physical layout of network cables, and devices and the logical path followed by the network packets or frames. a. topology b. protocol c. wired-path d. All of the above a. topology

Show more Read less
Institution
Info Technology
Course
Info Technology









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Info Technology
Course
Info Technology

Document information

Uploaded on
January 19, 2026
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

INFORMATION TECHNOLOGY EXAM 2025 UPDATED
QUESTIONS, ANSWERS & MULTIPLE CHOICES.
Which layer provides flow control and ensures data reliability from source to destination?



a. network

b. transport

c. application

d. data link

b. transport




In a mesh topology network, how many connections are needed for a one hundred node
network?



a. 4,950

b. 3,225

c. 1.435

d. 1,000

a. 4,950




1

, One task of the ____ layer in a LAN is to handle error detection using a CRC.



a. transport

b. data link

c. application

d. session

b. data link




Which layer can route data on different paths by creating virtual circuits?



a. data link

b. transport

c. network

d. application

c. network




The smallest T-carrier service is T-1.



True/False

True




2
$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
richardrichy

Get to know the seller

Seller avatar
richardrichy EXAMS
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
3 days
Number of followers
0
Documents
5
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions