Question: An organization with a class B network address has 100 subnets. Each subnet in this organization can have at most _______ bits for the host ID

Answer Options:

8
9
7
6

Answer: 8

 

Question: An organization with a class B network address has 100 subnets. Each subnet in this organization can have at most _______ bits for the host ID

Answer Options:

8
9
7
6

Answer: 8

 

Question: An organization with a class B network address has 50 subnets. The most suitable subnet mask for the organization is

Answer Options:

255.255.252.0
255.255.255.0
255.255.254.0
255.255.248.0

Answer: 255.255.255.0

 

Question: The earliest wide area data networks were built using

Answer Options:

Phone lines
T-carriers
ATM
X.25

Answer: Phone lines

 

Question: The phone network offers a

Answer Options:

Point-to-point network service
Statistically multiplexed network service
FDM WAN service
None of the above

Answer: Point-to-point network service

 

Question: ISDN stands for

Answer Options:

Inter-state data network
Inter-state digital network
Improved speed digital network
Integrated services digital network

Answer: Integrated services digital network

 

Question: Compared to point-to-point links, statistically multiplexed WANs improve data link utilization by

Answer Options:

Increasing data link capacity
Increasing the number of data links available
Increasing the number of end users
Aggregating traffic

Answer: Aggregating traffic

 

Question: The statistically multiplexed WAN technology that is specifically designed to carry multiple kinds of traffic (data and voice) is

Answer Options:

Frame relay
ATM
T-3
X.25

Answer: ATM

 

Question: When traversing from the source to destination, data packets typically cross

Answer Options:

Multiple LANs and multiple WANs
Multiple LANs and one WAN
One LAN and multiple WANs
None of the above

Answer: Multiple LANs and multiple WANs

 

Question: The limitations of point-to-point technologies include all of the following except

Answer Options:

They provide very limited opportunities for traffic aggregation
They can be set up easily with phone lines using modems
A very large number of links may become necessary when networks grow in size
Average link utilization can be low

Answer: They can be set up easily with phone lines using modems

 

Question: When a device has data to be delivered over a WAN network

Answer Options:

It waits for the medium to become idle
It stops the existing traffic over the medium to send the data
The data is merged with the existing traffic
None of the above

Answer: The data is merged with the existing traffic

 

Question: When a phone line is used to carry data traffic, the highest data rate possible is

Answer Options:

32 kbps
1.544 mbps
128 kbps
64 kbps

Answer: 1.544 mbps

 

Question: Virtual circuit IDs are

Answer Options:

Global
Local

Answer: Local

 

Question: In network security, a firewall is a device which lies between two networks and

Answer Options:

Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network
Regulates the movement of network administrators from the external network to the internal network
Prevents fires in the external network from spreading to the internal network
None of the above

Answer: Regulates data traffic between the networks to prevent attacks originating from the external network to cause harm to the internal network

 

Question: _______ requires a manager to visit an earlier step in the strategic-management process in order to revise actions if necessary.

Answer Options:

(A) The organizational mission.
(B) Strategy formulation.
(C) The current reality assessment.
(D) The feedback loop.
(E) The planning process.

Answer: (D) The feedback loop.

 

Question: An organization’s vision statement needs to describe

Answer Options:

(A) the organization’s purpose or reason for being.
(B) what the company will market and its business plan.
(C) the organization’s purpose or reason for being and its strategic intent.
(D) the organization’s ethical and diversity standards.
(E) what the company wants to become and its long-term direction and strategic intent.

Answer: (E) what the company wants to become and its long-term direction and strategic intent.

 

Question: Access Office Equipment has shifted to sales and service of laptops, where it has the potential to triple the number of its customers. The company is no longer offering repairs on older types of office equipment because the demand for service on this equipment is low, and profits in that part of the business have dropped significantly. Access Office Equipment is implementing a _______ strategy.

Answer Options:

(A) growth.
(B) cutting-edge.
(C) stability.
(D) innovative.
(E) diverse.

Answer: (A) growth.

 

Question: Delux Technology has a reputation of reliability and winning customer service, qualities that helped to build this highly respected name brand over the last 15 years. Speaking at a recent business conference, Steve, the CEO of Delux, told his audience, “We have built our reputation by changing little over the last several years, but consistently helping customers with great, caring service and a reliable product.” Which type of strategy does Delux Technology use?

Answer Options:

(A) defensive strategy.
(B) merger approach.
(C) retrenchment strategy.
(D) growth strategy.
(E) stability strategy.

Answer: (E) stability strategy.