3-a : Quiz Physical Network Media Flashcards
(1)An organization is considering type of transmission media which provide best security against
unauthorized access. Which of the following provides best security?
A. Unshielded twisted pair
B. Shielded twisted pair
C. Fiber-optic cables
D.Coaxial cables
Answer: C. Fiber-optic cables
Explanation:
In fiber-optic cables, glass fibers are used to carry binary signals as flashes of light- Fiber-optic cables have proven to be more secure than the other media. They have very low transmission loss, not affected by EMI and preferred choice for high volumes and long distance calls
(2)Which of the following transmission error can occur in wired as well as wireless communication?
A. Cross-talk
B. Attenuation
C. Sags, spikes and surges
D. Multipath interference
Answer: B. Attenuation
Explanation:
Attenuation is the weakening of signals during transmission. Attenuation can occur in both wired
and wireless transmissions. Crosstalk can refer to electromagnetic interference from one unshielded twisted pair to another twisted pair, normally running in parallel. Cross-talk occurs only in wired communication. Multipath interference results in a direct signal coming with one or more reflected radio (wireless) signals.
(3)Which of the following transmission error can be caused by the length of cable if UTP is more than 100 meters long?
A. Electromagnetic interference (EMI)
B. Cross-talk
C. Attenuation
D. Sags, spikes and surges
Answer: C. Attenuation
Explanation:
Attenuation is the weakening of signals during transmission. Attenuation exists in both wired and
wireless transmissions. Length of wire impacts the severity of attenuation. Electromagnetic interference (EMI) is caused by outside disturbance which is not the case here. Sags spikes & surges and cross-talk has nothing to do with the length of the UTP cable.
(4)To minimize the risk of data corruption, which of the following options can be effective?
A. Separate conduits for electrical and data cables.
B. Encryption
C.Check-digits
D. Hashing
Answer: A. Separate conduits for electrical and data cables.
Explanation:
Using separate conduits for data cables and electrical cables, minimizes the risk of data corruption
due to an induced magnetic field created by electrical current. Other options will not prevent data
from being corrupted. Data encryption minimizes the risk of data leakage & hashing ensures data integrity however they cannot prevent corruption. A check-digit will help detect the data corruption during communication, but will not prevent it.
(5)Which transmission method would provide best security?
A. Dedicated lines
B.Wireless Network
C.Dial-up
D.Broadband network
Answer: A. Dedicated lines
Explanation:
In computer networks and telecommunications, a dedicated line is a communications cable or
other facility dedicated to a specific application, in contrast with a shared resource such as the
telephone network or the Internet. Dedicated lines are most secured amongst the above options.
Since there are no sharing of lines, data security can be assured.