4.3-a : Quiz Physical Network Media (Doshi) Flashcards
An organization is considering type of transmission media which provide best security against unauthorized access. Which of the following provides best security?
A. Unshielded twisted pair
B. Shielded twisted pair
C. Fiber-optic cables
D.Coaxial cables
C. Fiber-optic cables
In fiber-optic cables, glass fibers are used to carry binary signals as flashes of light- Fiber-optic cables have proven to be more secure than the other media. They have very low transmission loss, not affected by EMI and preferred choice for high volumes and long distance calls
Which of the following transmission error can occur in wired as well as wireless communication?
A. Cross-talk
B. Attenuation
C. Sags, spikes and surges
D. Multipath interference
B. Attenuation
Attenuation is the weakening of signals during transmission. Attenuation can occur in both wired and wireless transmissions. Crosstalk can refer to electromagnetic interference from one unshielded twisted pair to another twisted pair, normally running in parallel. Cross-talk occurs only in wired communication. Multipath interference results in a direct signal coming with one or more reflected radio (wireless) signals.
Which of the following transmission error can be caused by the length of cable if UTP is more than 100 meters long?
A. Electromagnetic interference (EMI)
B. Cross-talk
C. Attenuation
D. Sags, spikes and surges
C. Attenuation
Attenuation is the weakening of signals during transmission. Attenuation exists in both wired and wireless transmissions. Length of wire impacts the severity of attenuation. Electromagnetic interference (EMI) is caused by outside disturbance which is not the case here. Sags spikes & surges and cross-talk has nothing to do with the length of the UTP cable.
To minimize the risk of data corruption, which of the following options can be effective?
A. Separate conduits for electrical and data cables.
B. Encryption
C.Check-digits
D. Hashing
A. Separate conduits for electrical and data cables.
Using separate conduits for data cables and electrical cables, minimizes the risk of data corruption due to an induced magnetic field created by electrical current. Other options will not prevent data from being corrupted. Data encryption minimizes the risk of data leakage & hashing ensures data integrity however they cannot prevent corruption. A check-digit will help detect the data corruption during communication, but will not prevent it.
Which transmission method would provide best security?
A. Dedicated lines
B.Wireless Network
C.Dial-up
D.Broadband network
A. Dedicated lines
In computer networks and telecommunications, a dedicated line is a communications cable or other facility dedicated to a specific application, in contrast with a shared resource such as the telephone network or the Internet. Dedicated lines are most secured amongst the above options. Since there are no sharing of lines, data security can be assured.