REM B LVL 2 Flashcards
ISDN is based on the concept of ______.
A. ARDIS
B. SS7
C. CDPD
D. CCS
D. CCS
ISDN is a complete network net framework designed around the concept of common channel signaling. While telephone users throughout the world rely on the PSTN to carry conventional voice traffic, new end-user data and signaling services can be provided with a parallel, dedicated signaling network.
ISDN provides integrated end user access to only packet switched networks.
A. False
B. True
C. Partly true
D. Partly false
A. False
ISDN provides integrated end-user access to both circuit switched and packet switched networks with digital end-to-end connectivity.
Which component of the Local Area Network (LAN) usually in the form of hardware card inside the user station, implements the non- physical protocols?
A. Protocol Stack
B. User Station
C. Physical Medium
D. Physical Interface Unit
A. Protocol Stack
PRI interface in ISDN serves small capacity terminals.
A. False
B. True
C. Partly false
D. Partly true
A. False
ISDN end users may select between two different interfaces. The BRI (basic rate interface) is intended to serve small capacity terminals while the PRI (primary rate interface) is intended for large capacity terminals.
Signalling component that supports traffic between the end- user and network is called:
A. Access signalling
B. Subscriber system signalling
C. Network signalling
D. Digital subscriber signalling
A. Access signalling
Access signalling supports traffic between the end user and the network. It defines how end users obtain access to the PSTN and the ISDN for communication or services.
ISDN is based on the concept of _____.
A. SS7
B. ARDIS
C. CDPD
D. CCS
D. CCS
ISDN is a complete network framework designed around the concept of common channel signalling. While telephone users throughout the world rely on the PSTN to carry conventional voice traffic, new end-user data, and signalling services can be provided with a parallel, dedicated signalling network.
What network is usually the size of a military base?
A. Wide area network
B. Local area network
C. Office area network
D. Campus area network
D. Campus area network
Which network is suitable for a building?
A. LAN
B. MAN
C. PAN
D. WAN
A. LAN
LAN network is used to connect computers in a small area such as school, office, residence, etc. It is less expensive and very secure.
The SSH Connection Protocol runs on top of the SSH Transport Layer Protocol and assumes that a secure authentication connection is in use.
A. Partly true
B. Partly false
C. False
D. True
D. True
The statement is true. The SSH Connection Protocol does run on top of the SSH Transport Layer Protocol.
ISM frequency load as infrared IEEE 802.11 legacy standard
A. 5.1 GHz
B. 2.4 GHz
C. 1.2 GHz
D. 1.5 GHz
B. 2.4 GHz
In the OSI model, when data is transmitted from device A to device B, the header from A’s layer 5 is read by B’s ______ layer.
A. transport
B. session
C. physical
D. presentation
B. session
Under the Open System Interconnection hierarchical model, which of the 7 layers are responsible in allowing interoperability among unrelated software systems?
A. Layers 3 - 4
B. Layers 4-6
C. Layers 1-3
D. Layers 5-7
D. Layers 5-7
What type of network architecture would be the easiest to setup and maintain?
A. Wide area network
B. Local area network
C. Peer-to-peer network
D. Metropolitan network
C. Peer-to-peer network
As the data packet moves from the lower to the upper layers, headers are ________.
A. Rearranged
B. Added
C. Modified
D. Subtracted
D. Subtracted
What is the main function of the transport layer?
A. Updating and maintenance of routing tables
B. Synchronization
C. Process-to-process delivery
D. Node-to-node delivery
C. Process-to-process delivery
The physical layer is concerned with the transmission of ________ over the physical medium.
A. Programs
B. Bits
C. Protocols
D. Dialogs
B. Bits
The ________ protocol transmission begins with a start-of-header (SOH) character followed by a length (LEN) character, which tells how long the block of data is.
A. SDLC
B. Kermit
C. Bisync
D. Xmodem
B. Kermit
Which layer functions as a liaison between user support layers and network support layers?
A. Physical layer
B. Transport layer
C. Application layer
D. Network layer
B. Transport layer
Which type of bridge builds and updates its tables from address information in frames?
A. Simple
B. Transparent
C. Simple and Transparent
D. None of these choices
B. Transparent
Which address is used on the internet for employing the TCP/IP protocols?
A. specific address
B. port address
C. all of these choices
D. physical address and logical address
C. all of these choices
The physical, logical, port and specific addresses are used in TCP/IP protocol. All the addressing schemes, that is physical (MAC) and logical address, port address and specific address are employed in both TCP/IP model and OSI model. In TCP/IP, the addresses are more focused on the internet implementation of these addresses.
According to the PPP (Point-to- Point Protocol) transition state diagram, options are negotiated in the _______ state.
A. Authenticating
B. Networking
C. Terminating
D. Establishing
D. Establishing
According to the PPP (Point-to- Point Protocol) transition state diagram, verification of user identification occurs in the _______ state.
A. Networking
B. Authenticating
C. Terminating
D. Establishing
B. Authenticating
TCP/IP model was developed _______ the OSI model.
A. After
B. Simultaneous to
C. With no link to
D. Prior to
D. Prior to
Several TCP/IP prototypes were developed at multiple research centers between 1978 and 1983, whereas OSI reference model was developed in the year 1984. TCP/IP was developed with the intention to create a model for the Internet while OSI was intended to be a general network model.
“A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network.” Which type of Wireless network threat would you classify this under?
A. Accidental Association
B. Denial of Service
C. Malicious Threat
D. Network Injection
A. Accidental Association
This threat falls under Accidental Association.
When several processes access the same data concurrently and the outcome of the execution depends on the particular order in which the access takes place is called ______.
A. dynamic condition
B. race condition
C. essential condition
D. critical condition
B. race condition
When several processes access the same data concurrently and the outcome of the execution depends on the particular order in which access takes place is called race condition.
Cable modems use 64-QAM for ______.
A. Either upstream or downstream
B. Both upstream and downstream
C. Downstream
D. Upstream
C. Downstream
Unipolar, bipolar, and polar encoding are types of ______ encoding.
A. line
B. NRZ
C. block
D. Manchester
A. line
The modem will automatically adjust itself to the highest speed possible but will drop back to a lower speed or different mode if the receiving modem cannot handle the highest speed. Most modems is use today are the V.90 or V.92 type and are capable of speeds up to _____.
A. 64 kbps
B. 128 kbps
C. 24 kbps
D. 56 kbps
D. 56 kbps
In cyclic redundancy checking, what is the CRC?
A. The quotient
B. The dividend
C. The remainder
D. The divisor
C. The remainder
What modular connector attaches the modem to the telephone line?
A. An N-type
B. An RJ-45
C. A BNC
D. An RJ-11
D. An Rj-11
Lossy techniques provide _______ when compared to lossless techniques.
A. none of the mentioned
B. lower compression ratios
C. much higher compression ratios
D. similar compression ratios
C. much higher compression ratios
Cryptography, a word with Greek origin, means:
A. Secret coding
B. Secret writing
C. Secret message
D. None of these choices
B. Secret writing
Cryptography, a word with Greek origins, means “secret writing.” However, we use the term to refer to the science and art of transforming messages to make them secure and immune to attacks.
In asynchronous transmission, the gap time between bytes is _______.
A. Fixed
B. A function of the data rate
C. Variable
D. Zero
C. Variable
In a two-wire circuit, data transmission and reception occur:
A. Only in one direction at a time
B. Simultaneously on the same wires
C. Using separate pairs of wires
D. Without the need for wires
A. Only in one direction at a time
In a two-wire circuit, data transmission and reception occur in only one direction at a time, typically in half-duplex mode.
A walkie-talkie operates in ________.
A. full duplex
B. half duplex
C. simplex
D. semi-duplex
B. half duplex
A walkie-talkie operates in half duplex mode. It can only send or receive a transmission at any given time.
Which circuit configuration is suitable for full-duplex communication?
A. Simplex circuit
B. Two-wire circuit
C. Four-wire circuit
D. Half-duplex circuit
C. Four-wire circuit
Four-wire circuits support full- duplex communication, allowing devices to transmit and receive data simultaneously without interference.
Which circuit configuration is more susceptible to signal interference and crosstalk?
A. Half-duplex circuit
B. Two-wire circuit
C. Simplex circuit
D. Four-wire circuit
B. Two-wire circuit
Two-wire circuits are more susceptible to signal interference and crosstalk due to the shared use of the same wires for transmission and reception.
A technique of transmitting data or images or videos (information) using a continuous signal.
A. network
B. multiple
C. analog
D. direct
C. analog
Analog is a technique of transmitting data or images or videos (information) using a continuous signal, which varies in amplitude, phase or some other property.
It is an undesired shift or width change in digital bits of data due to circuitry action which causes bits to arrive at different times.
A. impulse
B. Jitter
C. parity
D. allas
B. Jitter
Telephone networks operate in this mode.
A. semi-duplex
B. simplex
C. half duplex
D. full duplex
D. full duplex
Telephone networks operate in full duplex mode. It can transmit data in both the directions.