Chapter 6 - Networking Fundamentals Flashcards

1
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is immune to electromagnetic or radio-frequency interference.
A. Twisted-pair cabling
B. CSMA/CD
C. Broadband coaxial cabling
D. Fiber-optic cabling
A

D. Companies that want to ensure the safety and integrity of their data should use fiberoptic cable because it cannot be affected by electromagnetic or radio-frequency interference. Even though some copper cables have shielding, they are not immune to EMI or RFI. This eliminates twisted-pair and coaxial. CSMA/CD is an access method, not a cable type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which IEEE 802 standard defines a bus topology using coaxial baseband cable and is able to transmit at 10Mbps?
A. 802.1
B. 802.2
C. 802.3
D. 802.5
A

C. The IEEE 802.3 standard originally specified the use of a bus topology with coaxial baseband cable and can transmit data up to 10Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which OSI layer signals “all clear” by making sure the data segments are error free?
A. Application layer
B. Session layer
C. Transport layer
D. Network layer
A

C. It is the responsibility of the Transport layer to signal an “all clear” by making sure the data segments are error free. It also controls the data flow and troubleshoots any problems with transmitting or receiving data frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is the type of media access method used by NICs that listen to or sense the cable to check for traffic and send only when they hear that no one  else is transmitting.
A. Token passing
B. CSMA/CD
C. CSMA/CA
D. Demand priority
A

B. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) specifies that the NIC pause before transmitting a packet to ensure that the line is not being used. If no activity is detected, then it transmits the packet. If activity is detected, it waits until it is clear. In the case of two NICs transmitting at the same time (a collision), both NICs pause to detect and then retransmit the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
What model is used to provide a common way to describe network protocols?
A. OSI
B. ISO
C. IEEE
D. CSMA/CD
A

A. The Open Systems Interconnection (OSI) model is used to describe how network protocols should function. The OSI model was designed by the International Organization for Standardization (ISO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A physical star topology consists of several workstations that branch off a central device called a \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ .
A. NIC
B. Bridge
C. Router
D. Hub
A

D. At the center of a star topology is a hub or a switch. A NIC is a network card, which each computer must have to be on the network. Bridges and routers are higher-level connectivity devices that connect network segments or networks together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Of all network cabling options, \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ offers the longest possible segment length.
A. Unshielded twisted-pair
B. Coaxial
C. Fiber-optic
D. Shielded twisted-pair
A

C. Fiber-optic cable can span distances of several kilometers because it has much lower attenuation, crosstalk, and interference in comparison to copper cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
What devices transfer packets across multiple networks and use tables to store network addresses to determine the best destination?
A. Routers
B. Bridges
C. Hubs
D. Switches
A

A. Routers are designed to route (transfer) packets across networks. They are able to do this routing, and determine the best path to take, based on internal routing tables they
maintain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
In which network design do users access resources from other workstations rather than from a central location?
A. Client-server
B. Star
C. Ring
D. Peer-to-peer
A

D. A peer-to-peer network has no servers, so all of the resources are shared from the various workstations on which they reside. This is the opposite of a client-server network, in which the majority of resources are located on servers that are dedicated to responding to client requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following wireless communication standards is often described in terms of a wireless personal area network?
A. Bluetooth
B. Infrared
C. Cellular
D. Ethernet
A

A. Bluetooth networks are often called wireless personal area networks (WPANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements are not associated with a star network? (Choose all that apply.)
A. A single cable break can cause complete network disruption.
B. All devices connect to a central device.
C. It uses a single backbone computer to connect all network devices.
D. It uses a dual-ring configuration.

A

A, C, D. In a star network, all systems are connected using a central device such as a hub or a switch. The network is not disrupted for other users when more systems are added or removed. The star network design is used with today’s UTP-based networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
If you are going to run a network cable in the space above the drop ceiling in your office, which type of cable should you use?
A. Plenum
B. PVC
C. Coaxial
D. Fiber-optic
A

A. For areas where a cable must be fire retardant, such as in a drop ceiling, you must run plenum-grade cable. Plenum refers to the coating on the sleeve of the cable, not the media (copper or fiber) within the cable itself. PVC is the other type of coating typically found on network cables, but it produces poisonous gas when burned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
Which of the following connector types is an MFF connector?
A. BNC
B. ST
C. SC
D. LC
A

D. The local connector (LC) is a mini form factor (MFF) fiber-optic connector developed by Lucent Technologies. If it helps, think of LC as “Little Connector.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
What troubleshooting device would you use if you needed to trace a cable through a wall?
A. Toner probe
B. Cable tester
C. Multimeter
D. Loopback plug
A

A. A toner probe will allow you to check the physical path of a cable through something like a wall. Cable testers will test to see if the cable works. Multimeters can test voltage and see if a cable is operational as well. Loopback plugs are used to test network adapters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
You have been asked to configure a full mesh network with seven computers. How many connections will this require?
A. 6
B. 7
C. 21
D. 42
A

C. In a mesh network, the number of connections is determined by the formula n(n-1)/2. With seven computers, that means 21 connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which tool is used by technicians to connect an RJ-45 connector to the end of a cable?
A. Punch-down tool
B. Crimper
C. Cable tester
D. Loopback plug
A

B. A crimper can attach connectors to the end of a network cable. A punch-down tool will attach a cable to a wiring frame such as a 110 block. Cable testers will see if the cable works properly after you’ve created it. A loopback plug is for testing network cards.

17
Q
What type of device will block unwanted traffic from your network using a set of rules called an ACL?
A. Router
B. Firewall
C. Internet appliance
D. NAS
A

B. The job of a firewall is to block unwanted traffic. Firewalls do this by using a list of rules called an access control list (ACL). Routers connect networks to each other. Internet appliances give the user Internet access. A network attached storage (NAS) device is like a dedicated file server.

18
Q
What type of coaxial cable is recommended for digital television cable signals?
A. RG-6
B. RG-8
C. RG-58
D. RG-59
A

A. The two RG standards used for cable television are RG-6 and RG-59. Of the two, RG-6 is better and can handle digital signals. RG-59 is for analog signals only. RG-8 is thicknet coax, and RG-58 is thinnet coax.

19
Q
Which of the following devices work at Layer 2 of the OSI model? (Choose two.)
A. Hub
B. Router
C. Bridge
D. Switch
A

C, D. Bridges and switches are Layer 2 devices. Hubs work at Layer 1, and routers work at Layer 3. Note that some switches are called multilayer switches and will work at Layer 3 as well.

20
Q
Transmitting at 10Gbps, how far can signals on an MMF cable travel?
A. 100 meters
B. 550 meters
C. 1 kilometer
D. 40 kilometers
A

B. Multimode fiber (MMF) can transmit up to 550 meters, depending on the Ethernet specification. Other standards using MMF can transmit only up to 300 meters. If you need to transmit up to 40 kilometers, you will need to use single-mode fiber (SMF).