1.2 Flashcards

1
Q

_____________ fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

A

Single-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____________ based surveillance is a cheaper means of monitoring than maintaining separate guards at each perimeter gateway or zone. These cameras can be easily connected to already available IP-based network.

A

Camera-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____________ cabling is a type of twisted pair cable that is less susceptible to interference and crosstalk because each pair is surrounded by a braided shield.

A

Shielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ethernet can use _____________ rated to a particular Cat standard. UTP is made of twisted pair wires that do not use shielding to prevent interference.

A

Unshielded Twisted Pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WEP’s encryption system (based on the ___________ encryption cipher) is flawed. Version 1 of WPA still uses the __________ cipher, but it adds a mechanism called the Temporal Key Integrity Protocol (TKIP) to make it stronger. AES replaced ___________

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___________ensures that voice or video communications are free from problems, such as dropped packets, delays, or jitter.

A

Quality of Service (QoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____GHz is better at propagating through solid surfaces, making it ideal for providing the longest signal range.

A

2.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Port 110 is _________________________ is an early example of a mailbox access protocol. Examples of ### client applications would be Microsoft Outlook or Mozilla Thunderbird.

A

POP3. The Post Office Protocol (POP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___________________ authenticate server machines when using Transport Layer Security (TLS). An administrator installs the certificates on a web or email server to validate its identity and establish a secure transmission channel.

A

Digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ___________________________ overlays a floor plan with graphics showing signal strength and channel utilization at different points in the building.

A

wireless site survey report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The __________________ step of the CompTIA Network+ troubleshooting methodology is identifying the problem, which includes approaching multiple problems individually and determining if anything has changed.

A

first

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____________________ and ____________________have gained some currency over the last few years. With a peer-to-peer PAN, one might establish close-range network links between a variety of devices, such as smartphones, tablets, headsets, and printers.

A

Personal area networks (PAN) and wireless PAN (WPAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The media access control (MAC) address of a wireless access point (AP) is used as the ______________.

A

Basic Service Set Identifier (BSSID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

At each router, the Time to Live (TTL) IP header field is decreased by at least 1. This prevents badly addressed packets from __________________ the network.

A

permanently circulating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The administrator is using __________________ where the active router is known as the master and all other backup routers monitor the status of the master.

A

Virtual Router Redundancy Protocol (VRRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly