MC questions Flashcards
The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of both direction and efficiency of a transmission. Gain is commonly measured using the dBi unit of measure.(t/f)
true
When a wireless channel uses more than one frequency, the transmission method is called a ________ spectrum.
- broad
- multi
- long
- spread
spread
Which of the following is not a variation of spread-spectrum technology?
- DSSS
- FHSS
- DFSS
- OFDM
DFSS
WLANs use a technology called carrier sense multiple access collision detection (CSMA/CD).(t/f)
false
Which of the following wireless standards operate at a maximum bandwidth of less than 20 Mbps? (Choose two.)
- 802.11
- 802.11a
- 802.11b
- 802.11g
- 11
802. 11b
WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________.
- HBSS, BSS, ESS
- IBSS, BSS, RSS
- HBSS, BSS, IBSS
- IBSS, BSS, ESS
IBSS, BSS, RSS
What is the 802.11 2.4-GHz band channel width?
- 22 MHz
- 40 MHz
- 5 MHz
- 12 MHz
22 MHz
Which channel is not one of the non-overlapping channels when using the 802.11 2.4-GHz band?
- 1
- 5
- 6
- 11
5
An omnidirectional antenna radiates power at relatively unequal power levels in all directions (somewhat similar to the theoretical isotropic antenna).(t/f)
false
Which is not a security threat for WLANs? Warchalking - Rogue access point - Wardialing - WEP and WPA security - cracking
Wardialing
To protect WLAN traffic from eavesdroppers, a variety of security standards and practices have been developed, including all of the following except what?
- Enabling SSID broadcast
- MAC address filtering
- Preshared key
- IEEE 802.1X
Enabling SSID broadcast
Which of the following is not a WLAN security standard?
- WEP
- WAP
- WPA
- WPA2
WAP
WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Data Encryption Standard (DES) for encryption.(t/f)
false
WLAN security based on a PSK technology is called ________ mode.
- personal
- private
- home
- WEP
personal
Which of the following are broad categories of wireless antenna that are based on coverage? (Choose two.)
- WLAN
- SSID
- Omnidirectional
- Unidirectional
- Wired Equivalent Protocol (WEP)
Omnidirectional
Unidirectional
Which of the following is a variation of spread-spectrum technology use in wireless local-area networks? (Choose three.)
- WEP
- Wi-Fi
- WPA - 2
- Direct-sequence spread spectrum (DSSS)
- Frequency-hopping spread spectrum (FHSS)
- Orthogonal frequency-division multiplexing (OFDM)
- Direct-sequence spread spectrum (DSSS)
- Frequency-hopping spread spectrum (FHSS)
- Orthogonal frequency-division multiplexing (OFDM)
What transmission method is used with IEEE 802.11ac?
- DSSS
- FHSS
- OFDM
- FHDM
OFDM
Which IEEE standard is used to authenticate wireless clients?
- 802.11i
- 802.3ac
- 802.2af
- 802.1X
802.1X
What is the encryption mechanism that is used with the WPA2 security standard?
- AES
- RC4
- SHA-1
- MD5
AES
The data rate for a T3 link is ________.
- 45.736 Mbps to 51.84 Mbps
- 44.736 Mbps to 52.84 Mbps
- 44.736 Mbps
- 40 Mbps to 50 Mbps
44.736 Mbps
Which of the following are not examples of wireless media?
- Cellular phone
- LTE
- HSPA+
- DSL
DSL
If the bandwidth of an OC-1 link is 51.84 Mbps, what is the bandwidth of an OC-3 link?
- 155 Mbps
- 51.84 Mbps
- 155.52 Mbps
- 1.54 Mbps
155.52 Mbps
Asynchronous Transfer Mode (ATM), a cell-switched connection technology that uses 53-byte fixed-length cells, is often categorized as a packet-switched connection technology.(t/f)
true
Which of the following is a common Layer 2 protocol that could run over a dedicated leased line?
- Transmission Control Protocol (TCP)
- Point-to-Point Protocol (PPP)
- Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX)
- Routing Information Protocol (RIP)
Point-to-Point Protocol (PPP)
A service level agreement (SLA) is used to specify the specific performance metrics (for example, available bandwidth and maximum delay) that are guaranteed for a service over a certain percentage of time.(t/f)
true
Which type of ISDN circuit provides 23 B channels and 1 D channel?
- BRI
- IDSL
- PRI
- SDSL
PRI
What is the name of the digital modem device that is used to terminate a T1 circuit?
- SmartJack
- Network interface
- CSU/DSU
- ESU
CSU/DSU
What are the two different supported frame formats that are used when deploying a T1 leased line?
- Super Frame
- Extended Super Frame
- Multi Frame
- Distributed Frame
Extended Super Frame
Super Frame
A common Layer 2 protocol used on dedicated leased lines is ________.
- PPP
- CHAP
- TCP/IP
- IPsec
PPP
Which is not a primary feature offered by Link Control Protocol (LCP)?
- Looped-link detection
- Error detection
- Authentication
- Packet detection
- Packet detection
A demarc is the point in a telephone network where the maintenance responsibility passes from a telephone company to the subscriber (unless the subscriber has purchased inside wiring maintenance).
(t/f)
true
MPLS inserts a 32-bit header between Layer 2 and Layer 3 headers. Because this header is ________ between the Layer 2 and Layer 3 headers, it is sometimes referred to as a(n) ________ header.
- inserted, insert
- added, addon
- inserted, proxy
- shimmed, shim
shimmed, shim
What are the two commonly available PPP authentication mechanisms?
- PAP
- RADIUS
- TACACS+
- CHAP
CHAP
What is the name of the protocol that is commonly used to authenticate devices that connect via DSL?
- SLIP
- PPPoE
- PPP
- ROAM
- PPPoE
What is the maximum distance that an ADSL modem (client) can be from a provider’s DSLAM?
- 14,000 feet
- 15,000 feet
- 18,000 feet
- 22,000 feet
- 18,000 feet
What is the theoretical maximum downstream speed of ADSL?
- 4 Mbps
- 1.544 Mbps
- 52 Mbps
- 8 Mbps
8 Mbps
What is the name of the specification that indicates the frequencies that are dedicated for data transmission over cable lines?
- DOCSIS
- EIA/TIA 568a
- SONET
- IEEE 802.6
DOCSIS
What is the purpose of a default gateway?
- ARP resolves the MAC address to a NetBIOS name.
- ARP resolves an IP address to a hostname.
- ARP locates the default gateway of the network.
- ARP resolves the IP address of a Host to its MAC address.
ARP resolves the IP address of a Host to its MAC address.
At the moment, PC1 cannot reach the Internet. You add a static default route to R1 that sends all traffic to an unknown destination out S1/1 and add a static default route to R2 that sends all traffic to unknown destination out S1/0. Can a user on PC1 access the Internet?
- Yes, PC1 has Internet access.
- No, packets will not make it past R1.
- No, packets can make it to the Internet, but they will never make it back to PC1.
- No, packets will stop at R2.
No, packets can make it to the Internet, but they will never make it back to PC1.
What is the administrative distance of a directly connected network?
0
What is the administrative distance for an internal EIGRP route?
- 1
- 90
- 110
- 170
90
What are the two methods used to prevent loops in a distance vector routing protocol?
- Split horizon and hold-down timer
- Split horizon and poison reverse
- Poison reverse and hop count
- Split horizon and hop count
Split horizon and poison reverse
Which of the following is an exterior gateway protocol?
- BGP
- RIP
- OSPF
- EIGRP
BGP
Which of the following is a distance vector routing protocol that uses a metric of hops?
- IS-IS
- OSPF
- EIGRP
- RIP
RIP
For static NAT to work, how many inside global addresses are needed for inside local addresses?
- One inside global addresses for unlimited inside local addresses
- Two inside global addresses for every inside local address
- Ten inside global addresses for unlimited inside local addresses
- One inside global address for every inside local address
One inside global address for every inside local address
R1 is using both NAT and PAT. What is the purpose of the port numbers in the translation table?
- Basic NAT uses the port numbers to track separate communication flows.
- PAT uses the port numbers to track separate communication flows.
- The port numbers are not used.
- PAT only uses the destination port to track separate communication flows.
PAT uses the port numbers to track separate communication flows.
Which of the following is a multicast routing protocol?
- PIM
- IGMP
- IS-IS
- OSPF
PIM
What is the hop count that is used by RIP to indicate an unreachable metric?
- 16
- 0
- 15
- 255
16
What factors are used to calculate the OSPF cost?
- Bandwidth, delay
- Bandwidth
- Delay
- Bandwidth, MTU
Bandwidth
What factors are used in the calculation of the default EIGRP metric?
- Delay
- Bandwidth
- Bandwidth, delay
- Bandwidth, MTU
Bandwidth, delay
Which message type was added with IGMP Version 2?
- Join
- Prune
- Combine
- Leave
Leave
Which feature was added with IGMPv3 that allowed a client to specify the joining of a group and a specific source server?
- SSM
- SRM
- SME
- SMJ
SSM
Which mode of PIM uses a source distribution tree?
- Sparse mode
- Dense mode
- Broadcast mode
- Source mode
- Dense mode
Which mode of PIM uses a rendezvous point (RP)?
- Broadcast mode
- Dense mode
- Sparse mode
- Source mode
Sparse mode