Final Exam - 1 Flashcards

1
Q

In a cable network environment, what is the name of the cable type that connects from the wall outlet to the modem?

USB

Lightning

None of these answers are correct.

Coaxial

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the benefits of a DSL network over the previous method known as dial-up?

  • Having much higher network speeds overall.
  • All of these answers are correct.
  • Much more stability in terms of network reliability.
  • Being able to talk on the phone and surf the web at the same time.
A

Being able to talk on the phone and surf the web at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In WANs, which of the following is NOT a characteristic of mesh topology?

  • Data transmissions are carried out via multiple routes
  • All sites are connected to each other
  • Implementation incurs high costs
  • Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
A

Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Watching a YouTube video on the web is an example of which video-over-IP service?

Video conferencing

IPTV

TCP/IP

Streaming video

A

Streaming video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of video-over-IP service relies on two-way communication?

TV broadcast

IPTV

Video conferencing

Streaming video

A

Video conferencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RTCP as a transport protocol doesn’t deliver any data. Instead, it focuses on _____.

Logistical transfer

Password acceptance

Wi-Fi controls

Quality control

A

Quality control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a standard Wi-Fi communications standard?

802.11x

802.11n

802.11ac

802.11g

A

802.11x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do signals travel between a GPS satellite and an on-the-ground GPS receiver?

  • From the satellite to the receiver and back, but through a ground station
  • Only from the satellite to the receiver
  • From the satellite to a ground station and then from the ground station to the receiver
  • From the satellite to the receiver and back
A

Only from the satellite to the receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which two protocols are NOT backward compatible?

802.11a and 802.11ac

802.11a and 802.11b

802.11g and 802.11b

802.11g and 802.11ac

A

802.11a and 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many servers does a typical client/server network have?

6
One for every three clients
At least one
As many as there are clients

A

At least one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a benefit of using three-tier network architecture relative to two-tier?

Increased security
All answers are correct
Increased performance
Greater flexibility

A

All answers are correct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what way is a peer-to-peer network different from client/server networks?

  • In peer-to-peer, tasks are allocated to only one member of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
  • In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, only one client requests resources or services from the network.
  • In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.
  • In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a very powerful computer does all of the processing.
  • In peer-to-peer,a very powerful computer does all of the processing while in a client/server network, a number of network clients or workstations request resources or services from the network.
A

In peer-to-peer, tasks are allocated among all the members of the network while in a client/server network, a number of network clients or workstations request resources or services from the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a backbone network?

a low capacity connectivity infrastructure that forms the backup link to the different sub networks connected to it

a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it

the parallel backup network incorporated into enterprise designs

the infrastructure designed as a backup to the main network infrastructure

A

a high capacity connectivity infrastructure that forms the main link to the different sub networks connected to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Padding data is required within an Ethernet frame to _____.

hold the Pad Mac Address

synchronize frame transmission

fulfill minimum field length requirement

initiate a transmission queue

A

fulfill minimum field length requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A wireless network for Internet access in a large building is typically connected in a _____ topology.

ring
mesh
logical
physical

A

mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CAT 3 and CAT 5 belong to which of the following cable categories?

Coaxial cable

Fiber optic cable

Unshielded twisted pair cable

Shielded twisted pair cable

A

Shielded twisted pair cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of these statements is true?

  • You can expect to get just as much throughput as you ask for
  • You should rarely expect delays when you ask for data
  • You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
  • Data always travels the same speed on the network
A

You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In reference to computers and the internet, what is bandwidth?

Bandwidth is how wide your data can get

Bandwidth is the actual speed of your data

Bandwidth is the theoretical speed of your data

Bandwidth is the speed of your data

A

Bandwidth is the theoretical speed of your data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IMAP is the vehicle by which _____.

  • compatibility updates are synchronized between Outlook and other email servers.
  • messages are moved, organized and manipulated between the mail server and the mail client application.
  • client applications are moved, organized and manipulated between the mail server and the mail client application
  • synchronization is achieved between email clients and ISPs.
A

messages are moved, organized and manipulated between the mail server and the mail client application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the SMTP server to server set up, the email clients serve to _____

  • authorize SMTP commands
  • generate protocol commands to the internet
  • Receive/Send and queue messages between SMTP servers and clients
  • authorize SMTP servers
A

Receive/Send and queue messages between SMTP servers and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IMAP can allow a user with multiple devices to _____.

access their emails simultaneously from any of the devices.

consolidate system updates on all devices.

access the protocol simultaneously from any of the devices.

synchronize playback of multimedia from all devices.

A

access their emails simultaneously from any of the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What will happen if you enter the IP address 142.250.191.206 into your web browser?

Nothing, it is not possible to enter numbers

Google.com

Your anti-virus will flash a warning

An error will occur

A

Google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following statements is true?

Recursive name servers respond to queries from TLD name servers

Local DNS cache respond to queries from root servers

Recursive name servers respond to queries from authoritative servers

Authoritative name servers respond to queries from recursive name servers

A

Authoritative name servers respond to queries from recursive name servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The organization that currently regulates and manages the Internet is _____.

IANA

ICANN

WTO

IETF

A

ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
**At the 'receiving' computer, the transport layer provides input to which OSI layer?** The physical layer The network layer The session layer The data link layer
The session layer
26
**The presentation layer of the OSI model is responsible for integrating all data formats into what type of form?** Generalized and complete Acceptable and compatible Slow and accurate Summarized and accurate
Acceptable and compatible
27
**The unique identifier applicable to a specific network computer or node is the Network _____.** processor address protocol tag
address
28
**Internet of Things (IoT) differs from the Internet in that _____.** it is the medium through which devices communicate while the Internet is the framework IoT uses hardware while the Internet uses software it is proprietary devices only which connect to the internet while the internet is the gateway It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect
It is the ability for every electronic device to connect via the internet while the Internet is the medium by which they connect
29
**A VLAN is defined as _____.** a very large Local Area Network a volatile LAN a logical implementation of a Wide area network a logical implementation of a LAN
a logical implementation of a LAN
30
**A specially designed server operating system can serve:** multiple power sources on its network multiple hard drives on its system multiple software to its systems numerous concurrent clients connections
numerous concurrent clients connections
31
**One example of network security is the usage of passwords to protect individual accounts and information. What common sense password rule is often ignored in this case?** * Making a password too short. * Making the password completely unique, not simply recycling the same password with a simple change. * Writing the password down and leaving it in the open. * Making a password hard to guess and not using easy things such as a pet name or a family member's birthday.
Writing the password down and leaving it in the open.
32
**Which of the following is an unintentional threat to the security of computer networks?** Denial of Service (DoS) attacks Computer viruses Computer failures Sabotage Theft of Data
Computer failures
33
**Which word below best describes a flaw in network security which permits an assault on network resources.** Instability Incompatibility Unreliability Vulnerability
Vulnerability
34
**_____ represents a standard IP address.** 10101000.01001010.0001001.11111111 10101000.01001010.00000101.11100111 1010000.01001010.00011001.11111111 10101000.01001010.00011001.1111111
10101000.01001010.00000101.11100111
35
**In terms of computer networking, what is a router?** * A computer networking device that allows for computers and other devices to be connected together in a general area. * A tool used to prevent computer viruses from accessing a computer. * A device that is used to assist electricians in routing wires and other cables through a wall. * A device that allows for several individual networks to be connected to each other.
A device that allows for several individual networks to be connected to each other.
36
**How could a non-routable device send or receive messages on the Internet?** Restrict IP range to 10.0.0.0 -> 10.255.255.255 Use Class D IP address values Use network address translation Non-routable devices are not allowed any Internet access
Use network address translation
37
**What makes Mosh an alternative to SSH?** Mosh is more secure than SSH. Mosh can reconnect if a wireless connection gets interrupted. Mosh is faster than SSH. Mosh is easier to set up than SSH.
Mosh can reconnect if a wireless connection gets interrupted
38
**What main use does Telnet have in modern IT?** Telnet is often used for embedded devices. Telnet offers remote access to Intranet resources. Telnet is used for secure access to remote computers. Telnet is used for fun things like games.
Telnet is often used for embedded devices.
39
**SSH client and server utilities are found on most operating systems by default, except _____.** Unix Linux Microsoft Windows MAC OS X
Microsoft Windows
40
41
**Of the options listed, which is the most used WAN (Wide Area Network) carrier?** Dark Fiber Dedicated Lines Frame Relay MPLS
MPLS
42
**In order for voice packets to be routed correctly through the Internet, they have to have detailed what?** Labels Zipcodes Dogtags Instruction sheets
Labels
43
**Which of the following technologies use microwaves?** None of these use microwaves Infrared FM Radio Cellular
Cellular
44
**What is the benefit of the client-server model?** Redundant resources It is faster than direct connection of clients Ease of management There are many servers to choose from
Ease of management
45
**In a _____ topology network, all the devices are connected back to a central hub or switch.** bus star mesh logical
star
46
**In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?** CAT7 CAT4 CAT5e CAT5
CAT5e
47
**POP is within what layer of the OSI Model?** layer 1 layer 3 layer 7 layer 2
layer 7
48
**An IPv4 address contains _____ digits in _____ sets separated by a _____.** 4; 3; comma 3, 4 ; comma 3; 4; period 4; 3; period
3; 4; period
49
**In the OSI physical layer, data is transmitted in the form of _____.** both optical and electromagnetic signals electromagnetic signals infrared rays optical signals
both optical and electromagnetic signals
50
**What is Ethernet?** A type of network card An early version of the Internet A standard for computer networking technologies A type of computer cable
A standard for computer networking technologies
51
**A good administrator _____ the needs of security in the organization and the capabilities of the employees in the organization.** talks about balances considers ignores
balances
52
**Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.** duplicate concurrent connections to the low level backbone routers duplicate concurrent connections to the high level backbone routers duplicate concurrent switches to the high level backbone routers single concurrent switches to the high level backbone routers
duplicate concurrent connections to the high level backbone routers
53
**Four types of backbone networks are _____.** Serial, Distributed, Collapsed and Parallel networks Serial, Collapsed, Distributed and Paramount networks Series, Collapsed, Distributed and Parallel networks Distributed, Collage, Series and Parallel networks
Serial, Distributed, Collapsed and Parallel networks
54
**Which of these statements is FALSE?** The network layer controls the conversations between different computers. The network layer does accounting. The network layer helps transmit data between hosts. The network layer is responsible for determining the shortest path for a packet of data.
The network layer controls the conversations between different computers..
55
**All of the following are functions of the Data Link Layer except** provide a well defined interface to the Network Layer regulate the flow of data deal with transmission errors stop all bad files from passing to the Physical Layer
stop all bad files from passing to the Physical Layer
56
**Which of the following is true about half-duplex mode?** Data is transmitted in both directions at the same time. Data is transmitted in one direction only. Data is not transmitted. Data is transmitted in both directions but not at the same time.
Data is transmitted in both directions but not at the same time.
57
**A data measurement unit that contains 8 bits of information is known as which of the following?** Byte Kilobyte Block Petabyte
Byte
58
**What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?** The cost per month of service is higher. None of these answers are correct. Surrounding neighbors can affect the network bandwidth during peak hours. Overall network stability and reliability are lower.
Surrounding neighbors can affect the network bandwidth during peak hours.
59
**Which type of network transmission mode transmits data in both directions simultaneously?** Full-Triplex Metachronous Asynchronous Synchronous
Synchronous
60
**Which component involves processes that are completed in a task-oriented manner?** Machine learning SD-WAN Automation AI
Automation
61
**Which computer network, built by a business, is used to interconnect its various company sites in order to share computer resources?** EPN PAN WAN MAN
EPN
62
**A computer network is a set of connected** cables routers computers topologies
computers
63
**In the VLAN configuration example, each department has their own set of user _____ that are required only for their specific jobs. This keeps each department from being able to access another departments data.** experiences routers permissions networks
permissions
64
**When two systems first connect using SSH they exchange their _____ keys with each other.** public decoder private car
public
65
**What are some of the tunneling protocols that VPNs use?** IPsec and L2TP AES and MD5 HTTP and FTP Blowfish and Twofish
IPsec and L2TP
66
**In a typical mail operation with POP, a message is pulled down from the remote server and:** The AOL voice says 'You've got mail!' A buzzer is activated in the mail client's Bluetooth headset The message is stored on the recipient's device and is deleted from the remote server A reply is automatically sent the to the sender
The message is stored on the recipient's device and is deleted from the remote server
67
**Which device provides access control functionality between networks?** A Network Interface Card A router A printer A switch
A router
68
**What entity is responsible for allowing access to the WAN?** The consumer None of the answers are correct The ISP The client
The ISP
69
**Which of these statements is NOT true about a NIC?** An Ethernet connection is the most common. A NIC only allows for either a wired or wireless connection, not both. Another term for it is LAN adapter. It is often built into a computer's motherboard.
A NIC only allows for either a wired or wireless connection, not both.
70
**What category of LAN card do laptops typically support?** A wireless card only. Laptops don't need LAN cards. A wired card only. Both wired and wireless cards.
Both wired and wireless cards.
71
**DNS servers use _____ servers to help resolve IP addresses to Domain Names** IP servers Authoritative servers Caching servers Authentication servers
Authoritative servers
72
**Which of these is not one of TCP/IP's five protocol layers?** Physical layer Application/process layer Network interface layer Transmission
Transmission
73
**Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?** A DNS query answer is returned from the authoritative servers The local DNS cache is queried A request is sent to an ISP recursive server A request is sent to the respective root nameservers
The local DNS cache is queried
74
**Which of the following statements is true?** MAC addresses can route data packets over the internet independent of IP addresses. MAC and IP addresses can both work independently depending on the environment. MAC and IP addresses need to work in parallel for effective communication. NICs are hardwired with IP and MAC addresses.
MAC and IP addresses need to work in parallel for effective communication.
75
**Why is it necessary for computer systems (hosts) to have a hostname or domain name?** * It is necessary because it is an international standard which must be followed. * It is necessary because it differentiates it from other people's computer systems. * It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed. * It is necessary because every device has a name and so this should not be different.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
76
**Of the multiple different addressing types mentioned, which is the odd one out that has no purpose in future IPv6 networking solutions?** Unicast Multicast Anycast Broadcast
Broadcast
77
**Which of the following is/are true?** Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity. Wireless Access points connect two different wired networks. Wireless Access Points are often referred to as WI-MAX. Wireless Access Points cannot be standalone.
Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.
78
**Which of the following is a feature of 5G?** Multiple device support Satellite uplink Latency Dead zones
Multiple device support
79
**An advantage of optical fiber over traditional copper wiring is:** You can pull it tighter Less bulk It can bend at greater angles than copper Lower cost
Less bulk
80
**What is the main purpose of having a twisted pair cable?** To make installation easier To cut down on costs To reduce electromagnetic interference from outside sources To double the transfer rate of data
To reduce electromagnetic interference from outside sources
81
**Which of the following media is comparatively cheaper, lighter and easier to install?** Twisted pair cable Fiber optic cable Wireless LAN Coaxial cable
Twisted pair cable
82
**Security in a network ensures all of the following about the information that is passed around EXCEPT:** affordability integrity usability safety
affordability
83
**The _____ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.** diagram logical physical electrical
physical
84
**The presentation layer of the OSI model translates data into an acceptable format usable by which layer?** The data link layer The session layer The application layer The network layer
The application layer
85
**What are two common WAN (Wide Area Network) design types?** Remote singular; Integrated topology Main input; Redundant Input MPLS; SD-WAN Hub and spoke; Full mesh topology
Hub and spoke; Full mesh topology
86
**Which command is used for identifying the MAC address of a system?** ifconfig getmac ipconfig ping
getmac
87
**The software or hardware used to connect two different networks is known as _____.** Giveaway Internet device Cloud Gateway
Gateway
88
**What is the primary use for UDP?** Post Office Protocol Version 3 File Transfer Protocol Telnet Streaming
Streaming
89
**What range of addresses can be issued to a class C network?** 172.10.0.0-191.255.255.255 10.0.0.0-126.0.0.0 192.0.0.0-223.255.255.255 0.0.0.0-255.255.255.255
192.0.0.0-223.255.255.255
90
**The 802.11n Protocol makes use of _____ technology:** Carrier Sense Multiple Access with Collision avoidance (CSMA/CA) Dual-band wireless Orthogonal Frequency-Division Multiplexing (OFDM) Multiple Input/Multiple Output (MIMO)
Multiple Input/Multiple Output (MIMO)
91
**A computer can be a web server if it:** has a domain name has large storage space for websites offers services to other computers it is connected to services web page requests by clients connecting to it
services web page requests by clients connecting to it
92
**Which of the following are valid configurations of a Wireless Access Point?** Firewall alone IP address, NAT MAC address, NAT, Firewall IP address, NAT and Firewall
IP address, NAT and Firewall
93
**In the OSI model, all of the following are protocols of the application layer except:** IMAP ICANN POP3 HTTP
ICANN
94
**Which option contains the name of the layer responsible for translating, encrypting and compressing data within the OSI model?** Physical Presentation Session Network None of the answers is correct
Presentation
95
**Which of the following is not an application layer protocol?** SSH TCP Telnet BOOTP
TCP
96
**In reference to internet domain names, a registrar is _____.** A company that sells web templates A company that designs web pages An institution that registers student enrollments A company that sells domain names
A company that sells domain names
97
**Given the following information, identify the network address. IP: 192.155.1.2 Subnet mask: 255.255.0.0** 255.255. 155.1. 192.155. 255.0.0
192.155.
98
**IP Addresses operate within the _____ layer of the TCP/IP protocol.** Data Link Layer Application Layer Network Layer Physical Layer
Network Layer
99
**Live threat-intelligence helps the firewall to identify and stop _____.** * Nothing. Threat-intelligence is not used to determine what the firewall may stop or allow. * Threats that the firewall may have never seen before. * Threats that are explicitly listed in the firewall's access policy. * Threats the firewall administrator may be thinking of but for which the administrator has yet to add rules to the access policy.
Threats that the firewall may have never seen before.
100
**The OSI Model is used to:** describe how communications happen across a network rate Internet Service Provides on their service measure speed across the Internet boost Internet bandwidth
describe how communications happen across a network
101
**What is the purpose of load balancing in a network?** It eliminates jitter. It increases network processes allowing for a network to grow. It distributes traffic to allow for a balance in the network keeping services available. It assures network services by measuring the quality of the transmissions.
It distributes traffic to allow for a balance in the network keeping services available.
102
**What could Wi-Fi 7 provide support for?** Reduced QAM Send data on multiple frequencies Machine learning Radio updates
Send data on multiple frequencies
103
**Which of the following is NOT a basic component of a telecommunication network?** Protocols Remote control unit Control software Input and output devices Telecommunication channels
Remote control unit
104
**The label in multi-protocol label switching contains _____.** the ingress and exit router information the routers ingress and egress routing information information on the predefined path for the packets to reach their destination complete routing table information
information on the predefined path for the packets to reach their destination
105
**What unit of data measurement is used with synchronous transmissions?** Byte Brick Block Nibble
Block
106
**If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?** A star design. A full mesh design. A bus design. A hub and spoke design.
A full mesh design.
107
**An advantage of VLAN over LAN is _____.** that VLANs increases implementation costs over time but is more cost effective overall VLANs require more network administration when compared to LANs increasing efficiency nodes within the same VLAN need not be in the same physical location that VLANs increased latency will reduce broadcast domains
nodes within the same VLAN need not be in the same physical location
108
**In which part of the OSI Model is the physical layer?** Bottom Layer Middle Layer Top layer It does not belong to the OSI Model as a layer.
Bottom layer
109
**Which of the following is NOT a component of a network switch?** Switch Fabric CPU Replication Engine Bypass Engine
Bypass Engine
110
**The secure logical connection to which IMAP is bound to connect to the internet is _____.** Part 143 Logic 993 Port 143 Port 993
Port 933
111
**Which of the following is the most accurate description of clients in client/server architecture?** * All devices connected to a network * Desktop computers with a wired connection and laptop computers with a wireless connection * Hardware devices which provide end users with access to data and services on the server * Computers connected to a network used for downloading data from a server
Hardware devices which provide end users with access to data and services on the server
112
**Although security is important, why is there a need to use Wireless Access Point as a pass-through set-up which allows any server to get connected to the network?** To enable the peer devices to exchange data without much difficulty
To enable the peer devices to exchange data without much difficulty
113
**What type of bit is used with an asynchronous transmission to signal the beginning and end of a byte of data?** Control Integer ASCII Double
Control
114
**What makes the symmetric DSL network type so different from the asymmetric type?** It has an equal balance between download and upload speeds. None of these answers are correct. It has higher upload speeds. It has higher download speeds.
It has an equal balance between download and upload speeds.
115
**What Ethernet Standard Specification is suitable for a network requiring 100 Mbps speed and 2000 max cable distance?** 10 GBase - LX4 100 Base - TX 100 Base - FX 10 GBase - SW
100 Base - FX
116
**Which network topology would be used to directly connect every computer in an office to every other computer in the office, using a one-to-one cabling method?** Tree Ring Star Mesh Bus
Mesh
117
**What are two types of VPNs?** IPSec and SSL Remote and site Site-to-site and remote access Local area network and wide area network
Site-to-site and remote access
118
**SSH uses _____ cryptography to ensure authentication and security.** white-box round-robin twin-key public-key
public-key
119
**A VLAN is created by multiple _____ that forwards all network traffic to other locations.** All of these answers are correct. modems switches routers
switches
120
**The two main operational differences between the 802.11a protocol and the 802.11b protocol are:** 802.11a protocol operates at 54Mbps within a 5GHz frequency range while 802.11b operates at 11Mbps within a 2.4GHz frequency range 802.11a protocol uses CSMA/CA at 1300Mbps while 802.11b protocol uses (OFDM) at 300Mbps 802.11b protocol operates at 54Mbps within a 5GHz frequency range while 802.11a operates at 11Mbps within a 2.4GHz frequency range 802.11a protocol uses CSMA/CA at 11Mbps while 802.11b protocol uses (OFDM) at 11Mbps
802.11a protocol operates at 54Mbps within a 5GHz frequency range while 802.11b operates at 11Mbps within a 2.4GHz frequency range
120
**Which internet protocol is responsible for re transmitting lost or erroneous data packets?** TPC TCP IP OSI
TCP
121
**What are WLAN Protocols?** WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN). WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN). WLAN Protocols are network protocols which govern data transmissions over wide area connectivity. WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
122
**The frequency range of a channel is 4000hz to 6500hz. What is the bandwidth?** 4000 hz 10,500 hz 6500 hz 2500 hz
2500 hz
123
**Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?** CAT2 Unshielded twisted pair Fiber optic Coaxial
Coaxial
124
**Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?** IP/NetBIOS TCP/IP OSI NetBIOS
TCP/IP
125
**In the OSI model, the application layer is:** the fifth layer the seventh layer the first layer the third layer
the seventh layer
126
**What does layer five of the OSI model do?** Moves packets from source to destination providing internetworking capabilities. Establishes, manages and terminates communicative sessions. Organizes bits into frames providing node-to-node delivery. Provides access to available network resources.
Establishes, manages and terminates communicative sessions.
127
**_____ is a simplified setup procedure available on some wireless routers and access points.** AES WPA WPA2 WPS
WPS
128
**Which of the following is the purpose of a firewall access policy?** It determines the number of zones your firewall will have. It gives your firewall threat-intelligence. It provides a set of rules that determine who gets in or out of your network and who doesn't. It determines the operational state (on/off) of the firewall.
It provides a set of rules that determine who gets in or out of your network and who doesn't.
129
**Which of the following devices can be used to interface computer networks that use different communication protocols?** Gateway Router Repeater Hub
Gateway
130
**What is a network client?** A computer that receives data but does not send it A computer that sends data but does not receive it A computer that connects to a server in order to use and share resources with it A computer that provides communications with other clients without an intermediary computer
A computer that connects to a server in order to use and share resources with it
131
**SMTP server A initiates communication with SMTP server B. SMTP server B responds with a _____** 202 READY FOR MAIL 250 requested mail action 220 READY FOR MAIL 550 NO such users
220 READY FOR MAIL
132
**Which device provides access control functionality between networks?** A router A printer A Network Interface Card A switch
A router
133
**Which network topology uses concentration routers to interconnect star network WANs?** Tiered topology Mesh topology Ring topology Bus topology
Tiered topology
134
**Parallel backbone networks differ from collapsed backbone networks in that parallel backbone components are implemented with _____.** single concurrent switches to the high level backbone routers duplicate concurrent switches to the high level backbone routers duplicate concurrent connections to the low level backbone routers duplicate concurrent connections to the high level backbone routers
duplicate concurrent connections to the high level backbone routers
135
**What access method works best over mobile connections?** SSH. VPN. Telnet. Mosh.
Mosh
136
**What criteria do EGPs use to determine data packet routes?** domain names, cost metrics, and optimal paths locations, cost metrics, and bandwidth locations, cost metrics, and optimal paths locations, external addresses, and optimal paths
locations, cost metrics, and optimal paths
137
**All of the following are characteristics of UDP EXCEPT:** Multicast Datagrams Reliable Connectionless
Reliable
138
**Which layer is the network layer in the OSI 7 layer model?** 2 3 5 1
3
139
**Which is the oldest, least secure method of wireless security?** WPA2 WEP WPA TKIP
WEP
140
**Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?** Gateway Router Hub Switch
Switch
141
**What is a server?** A satellite computer that requests data from a central computer in a network A computer that hosts data and other resources for clients A computer that does all of the work for another computer, serving its every need A network where data is hosted and pulled by clients
A network where data is hosted and pulled by clients
142
**The _____ mail command starts the process of sending sequential lines of texts with the message** 354 220 250 550
354
143
**A client plans to have a network to connect many computers in one room and at the same time allow access to the Internet from these computers. What are the devices that the client is going to need?** A switch and a router. A switch only. A gateway only. A router only.
A switch and a router.
144
**What is the result of entering nslookup command in the command prompt?** MAC address of the system MAC address of the host server IP address of the system IP address of the host server
IP address of the host server
145
**Which two components enable a switch fabric to operate?** ROM and RAM CPU and Controller Controller and Buffers Forwarding and Replication Engines
Controller and Buffers
146
**Which of the following is NOT a component of a router?** NVRAM Ports Graphics card RAM
Graphics card
147
**Which of the following types of routing do NOT carry a subnet mask?** None of these Classful routing Classless routing Routing tables
Classful routing
148
**The label in multi-protocol label switching contains _____.** * the routers ingress and egress routing information * information on the predefined path for the packets to reach their destination * the ingress and exit router information * complete routing table information
information on the predefined path for the packets to reach their destination
149
**One of the main disadvantages of the collapsed backbone is the _____.** * susceptibility of complete system failure if the sub network fails * susceptibility to complete system failure if the backbone router fails * failure of duplicate connections * system easily collapses under data transmission congestion
susceptibility to complete system failure if the backbone router fails
150
**The _____ of a network describes how the connections appear to the end user or how signals are passed across the network.** protocol suite logical topology signal pattern physical topology
logical topology
151
**Which of the following is the most accurate description of clients in client/server architecture?** * Computers connected to a network used for downloading data from a server * All devices connected to a network * Desktop computers with a wired connection and laptop computers with a wireless connection * Hardware devices which provide end users with access to data and services on the server
Hardware devices which provide end users with access to data and services on the server
152
**A URL consists of different levels. What level is .com in the web address www.google.com?** Host name Domain name Very high level domain Web address Top-level domain name
Top-level domain name
153
**Which of the following best describes the connection tool for a new smartphone that can connect to Wi-Fi?** Wireless card Integrated Wi-Fi Access Point Hotspot
Integrated Wi-Fi
154
**The wireless access points have a _____ that help share connections** bridge switch cable hub
switch
155
**The transport layer performs data packet creation and what other types of services?** Error checking Information display Media connection Descending layer
Error checking
156
**An NIC is used for which of the following?** Connecting a computer to a network. Securing a computer in a network. Connecting a telephone to the network. Using as a telephone wire.
Connecting a computer to a network.
157
**Which layer is the network layer in the OSI 7 layer model?** 2 5 1 3
3
158
**What is a WAN topology?** * WAN topology describes the arrangement concentration routers monitoring the LANs * WAN topology describes the arrangement by which components within the WAN are organized * WAN topology describes the arrangement by which the mesh components within the WAN are distributed * WAN topology describes a system by which the components within the WAN are named
WAN topology describes the arrangement by which components within the WAN are organized
159
**Many family members using the network connection at the same time reduces:** Throughput Delays Bandwidth Theoretical speed
Throughput
160
**Which of the following statements about a VLAN environment is TRUE?** * Access link connections can handle multiple VLAN connections * Computers or nodes by default are not VLAN aware * A LAN is a logical setup of a VLAN within a network system * Trunking is the ability for a port to curtail the number of broadcast packets
Computers or nodes by default are not VLAN aware
161
**How does the use of a router differ from a bridge in telecommunication?** * Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network. * A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic. * A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level. * A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.
A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
162
**A specially built server:** * is a desktop computer with advanced applications * is built with redundant power supplies to maintain constant availability * can only serve a limited number of connections on its network * is more robust with fewer clients connected to it
is built with redundant power supplies to maintain constant availability
163
**Why is the role of RTCP important in VoIP communications?** It connects the VoIP service to the local area network. It allows the sender to select what type of message to send. It allows adjustments to be made to fine-tune transmissions. It allows video packets to be sent between multiple devices.
It allows adjustments to be made to fine-tune transmissions.
164
**What is the primary use for UDP?** Post Office Protocol Version 3 File Transfer Protocol Telnet Streaming
Streaming
165
**What is the purpose of FTP?** To open a web site. To transfer a file in a network. To establish remote connection. To start a chat process.
To transfer a file in a network.
166
**MIME not only helped move the email standard forward but helped to make __________ a more enjoyable experience as well.** web browsing downloading files texting logging online
web browsing
167
**One characteristic of MPLS switching is that it _____.** has little control on network traffic is very inefficient prevent multiple network hops prevents network congestion
prevents network congestion
168
**Computers on a network are called:** servers clients nodes switches
nodes
169
**Which acronym refers to the network name that your router broadcasts so you can find it?** WEP SSID TKIP WPA
SSID
170
**What are WLAN Protocols?** * WLAN Protocols are network protocols which govern data transmissions over wide area connectivity. * WLAN Protocols are network protocols which govern data transmissions over wireless connectivity. * WLAN Protocols are 802.11 protocols which control the speed and frequency coverage over a Wide Area Network (WAN). * WLAN Protocols are 802.11n/g protocols which control the obstruction and interference over a Wide Area Network (WAN).
WLAN Protocols are network protocols which govern data transmissions over wireless connectivity.
171
**The network layer converts:** Logical addresses into physical addresses Physical addresses into logical addresses MAC addresses into layers Layers into MAC addresses
Logical addresses into physical addresses
172
**What kind of channel does broadband transmission use?** Medium pass channel Bandpass channel High pass channel Low pass channel
Bandpass channel
173
**The Internet is defined as _____.** the network of things the access by individuals to orbital Clouds the network of networks consisting of millions of devices communicating globally the internal network connecting two nodes
the network of networks consisting of millions of devices communicating globally
174
**Which of the following is not an application layer protocol?** BOOTP Telnet SSH TCP
TCP
175
**Which device provides access control functionality between networks?** A router A Network Interface Card A switch A printer
A router
176
Which of the following terms refers to defining the rules for communication between two computers to prevent overload?
flow control
177
A hardware device that has a built-in network adapter, antenna and radio for Wi-Fi is a(n) _____.
access point
178
What are the benefits of a DSL network over the previous method known as dial-up?
All answers
179
The internet is an example of a _____ _____ Network.
wide area
180
Crosstalk and attenuation are NOT a problem in which of the following media?
fiber optic cable
181
One of the other protocols that works along with POP is SMTP, which stands for:
simple mail transfer ptotocol
182
In order to check the nodes that are connected to a system, one can use the command
netstat
183
Ethernet is an example of which kind of signal topology?
sharedv media access
184
Which option below best completes this sentence: Among other communicative tasks, the session layer also terminates:
sessions between software process
185
DNS is an acronym for:
domain name system
186
Which of the following devices can be used to interface computer networks that use different communication protocols?
gateway
187
Select the correct definition for a gateway.
the router through which a device can access on external networks
188
What is Address Translation(AT)?
AT is mappinh private IP addresses to public IP addresses