100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

INFORMATION TECHNOLOGY EXAM 2025 UPDATED QUESTIONS, ANSWERS & MULTIPLE CHOICES.

Puntuación
-
Vendido
-
Páginas
14
Grado
A+
Subido en
19-01-2026
Escrito en
2025/2026

INFORMATION TECHNOLOGY EXAM 2025 UPDATED QUESTIONS, ANSWERS & MULTIPLE CHOICES. Which layer provides flow control and ensures data reliability from source to destination? a. network b. transport c. application d. data link b. transport In a mesh topology network, how many connections are needed for a one hundred node network? a. 4,950 b. 3,225 c. 1.435 d. 1,000 a. 4,950 One task of the ____ layer in a LAN is to handle error detection using a CRC. a. transport b. data link c. application d. session b. data link Which layer can route data on different paths by creating virtual circuits? a. data link b. transport c. network d. application c. network The smallest T-carrier service is T-1. True/False True The ____ topology consists of running cable from one PC or file server to the next, like links in a chain. a. mesh b. bus c. star d. tree b. bus A VPN, is another type of network, like LAN or WAN, and means Virtual Personal Network and is mostly used for short range communications. True/False False The term ____ refers to wrapping the information in one layer inside the information within the next layer. a. firewall b. encapsulates c. fault-tolerance d. full-duplex b. encapsulates The ____ topology is a continuous path for data with no logical beginning or ending point. a. mesh b. ring c. tree d. bus b. ring The ____ field in an Ethernet frame synchronizes frame transmission and consists of an alternating pattern of zeroes and ones. a. frame check sequence (FCS) b. preamble c. starts of frame delimiter (SFD) d. destination address b. preamble ____ is a process that scrambles the data so that it cannot be read if intercepted by unauthorized users. a. transport b. encryption c. analog d. beaconing b. encryption The Ethernet LAN transmission method can detect a collision has occurred by which of the following? a. broadcast storms b. half-duplex c. full-duplex d. the signal strength is two times the normal strength d. the signal strength is two times the normal strength A(n) ____ line is a dedicated telephone line that can be used for data communications to connect two different locations for continuous point-to-point communications. a. ethernet b. t-carrier c. twisted-pair d. transceiver b. t-carrier Which of the following allows you to configure Windows 7 as a host that allows client computers to access the Internet. a. IP b. HTTP c. ICS d. NAT c. ICS Which of the following is an example of a wireless PAN technology? a. Ethernet b. Bluetooth c. WIFI d. Vertical Cabling b. Bluetooth A ____ specifies how networked data is formatted into discrete units, such as packets or frames. a. topology b. wired path c. protocol d. HTTP c. protocol Which of the following commands can be used to test whether a peer node is reachable? a. ping b. tcpdump c. run d. beacon a. ping Analog signals are the basis of the most common signaling method used on LANs and high-speed WANs. True/False False If no broadcasts are detected from the active monitor or any one of the standby monitors, a ring goes into a ____ condition. a. roll-by b. terminating c. beaconing d. signaling c. beaconing Which layer is responsible for establishing and maintaining the communications link between nodes? a. Layer 1 b. Layer 3 c. Layer 4 d. Layer 5 d. Layer 5 A ____ is a workstation that accesses software and data through the network on another computer. a. node b. host c. client d. virtual machine c. client Which layer governs a user's access to network services? a. session b. application c. data link d. presentation b. application The ____ topology is the oldest communications design method, with roots in telephone switching systems. a. tree b. mesh c. star d. bus c. star The OSI model consists of ____ distinct layers stacked on one another. a. Five b. Six c. Seven d. Eight c. Seven Which of the following is an address associated with a NIC? a. HTTP b. MAC c. IP d. None of the Above b. MAC The term "____" refers to built-in protection against equipment or communications failure. a. Full-duplex b. Back-up c. Fault-Tolerance d. Half-Duplex c. Fault-Tolerance An enterprise network can consist of LANs that compose a MAN or CAN, but not a WAN. True/False False ____ used for protecting a network may be created using routers. a. Switch b. Fault-Tolerance c. Firewalls d. All of the above c. Firewalls Which of the following is NOT a field in an Ethernet frame? a. Length b. Preamble c. Port d. Frame Check Sequence c. Port Which of the following is NOT a common method of network communication? a. microwaves b. over copper wire c. over optical radio waves d. All are methods of communication c. over optical radio waves Which of the following attaches a network node to the communications media? a. bluetooth b. NIC c. vertical wiring d. wifi b. NIC The logical path followed by network packets or frames may not fully match the physical layout. True/False True Two-way alternate (TWA) mode for dialog control is used in ____ communications. a. full-duplex b. half-duplex c. analog d. None of the above b. half-duplex The token ring transport method uses a physical ____ topology along with the logic of a ring topology. a. bus b. mesh c. star d. ring c. star A(n)____ signal can vary continuously, as in a wave pattern with positive and negative voltage levels. a. half-duplex b. full-duplex c. analog d. None of the above c. analog A ____ is a high-capacity communications medium that joins networks and central network devices across long distances. a. router b. backbone c. switch d. repeater b. backbone Any device connected to a network is generically termed a(n) ____ or station. a. switch b. node c. client d. host b. node The information from one layer that is transferred to the next is called which of the following? a. HTTP b. PDU c. IP d. Packet b. PDU A ____ consists of interconnected computers, printers, and other computer equipment in close physical proximity. a. MAN b. CAN c. LAN d. PAN c. LAN A network ____ has two components: the physical layout of network cables, and devices and the logical path followed by the network packets or frames. a. topology b. protocol c. wired-path d. All of the above a. topology

Mostrar más Leer menos
Institución
Info Technology
Grado
Info Technology









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Info Technology
Grado
Info Technology

Información del documento

Subido en
19 de enero de 2026
Número de páginas
14
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

INFORMATION TECHNOLOGY EXAM 2025 UPDATED
QUESTIONS, ANSWERS & MULTIPLE CHOICES.
Which layer provides flow control and ensures data reliability from source to destination?



a. network

b. transport

c. application

d. data link

b. transport




In a mesh topology network, how many connections are needed for a one hundred node
network?



a. 4,950

b. 3,225

c. 1.435

d. 1,000

a. 4,950




1

, One task of the ____ layer in a LAN is to handle error detection using a CRC.



a. transport

b. data link

c. application

d. session

b. data link




Which layer can route data on different paths by creating virtual circuits?



a. data link

b. transport

c. network

d. application

c. network




The smallest T-carrier service is T-1.



True/False

True




2
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
richardrichy

Conoce al vendedor

Seller avatar
richardrichy EXAMS
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
Nuevo en Stuvia
Miembro desde
3 días
Número de seguidores
0
Documentos
5
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes