NTA Lesson 2 Quiz
a
A unique name for each wireless cell or network is called a: a. Service Set Identifier (SSID). b. network interface card (NIC). c. wireless access point (AP). d. Basic Service Set Identifier (BSSID).
c
For which of the following is Category 5e twisted-pair cable used? a. 10-Gbps networks b. Low-speed serial communication c. Gigabit Ethernet and other high-speed networks d. 10BaseT and 100BaseTX networks
c
How many twisted-pair cable standards, or categories, are specified by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA) 568 Commercial Building Wiring standard? a. Five b. Two c. Six d. Four
c
In a virtualization environment, the virtual machine is known as: a. the seed. b. the tracker. c. the guest. d. the host.
d
In which type of data transmission do the access device and network device share a clock and transmission rate? a. Full duplex b. Half duplex c. Asynchronous d. Synchronous
a
Routers are conceptually similar to: a. bridges. b. firewalls. c. switches. d. hubs.
b
The IEEE 802 series of standards specifies which of the following? a. Various wireless technologies b. Various LAN technologies c. Various network protocols d. Various Ethernet technologies
d
The access method for the IEEE 802.11 specifications is: a. CSMA/CD b. MIMO c. MU-MIMO d. CSMA/CA
d
What are T-carrier systems usually used for? a. Connecting LANs to form a multi-LAN network b. Connecting individual computers to form a LAN c. Connecting an individual computer to the Internet d. Connecting a LAN to a WAN
b
What are the three methods of circuit operation for data transmissions? a. Ad-hoc, infrastructure and wireless b. Simplex, half duplex and full duplex c. Simplex, duplex and triplex d. Baseband, broadband and wireless
d
What do wireless systems use to communicate with one another that is similar to a standard hub or switch? a. Wireless cell b. Service Set Identifier (SSID) c. Basic Service Set Identifier (BSSID) d. Wireless access point (AP)
b
What is a hub? a. A device that forwards data from one network to another b. A device that connects computers in a star-configured network so they can exchange information c. A device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment d. A device that directs the flow of information from one node to another
a
What is a plenum? a. A space between floors in a building b. A high-capacity cable c. A tool that pushes the plugs from an RJ-45 connector into the cable d. A specialized cable that allows you to connect two computers directly without using a hub
d
What is a switch? a. A device that connects computers in a star-configured network so they can exchange information b. A device that forwards data from one network to another c. A device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment d. A device that directs the flow of information from one node to another
b
What is coaxial cable? a. Cable that is flexible and easy to handle around corners and objects b. A high-capacity cable used for video and communication networks c. A specialized cable that allows you to connect two computers directly without using a hub d. Cable that sends data as pulses of light over threads of glass
a
What is fiber-optic cable? a. Cable that sends data as pulses of light over threads of glass b. Cable that is flexible and easy to handle around corners and objects c. A specialized cable that allows you to connect two computers directly without using a hub d. Cable that is protected from external electromagnetic interference by a metal sheath wrapped around the wires
c
What is the data transfer rate of a T1 line? a. 2.048 Mbps b. 64 Kbps c. 1.544 Mbps d. 6.312 Mbps
d
What is the essential function of a virtual LAN (VLAN)? a. To filter frames in order to determine whether a specific frame belongs on a local segment or another LAN segment b. To forward traffic based on MAC addresses c. To establish a connection between two network segments just long enough to send a current packet d. To organize systems according to their logical function on the network, rather than their physical location
a
What is the function of a Channel Service Unit/Data Service Unit (CSU/DSU)? a. To convert data from digital telephony-based lines into data that a network connection used by traditional network equipment can recognize b. To direct the flow of information from one node to another c. To forward traffic based on MAC addresses d. To act as a barrier against potential malicious activity, while still allowing a "door" for people to communicate between a secured network and the open, unsecured network
d
What is the name for a device that transmits and receives digital or analog signals? a. Media Access Control (MAC) b. Universal Serial Bus (USB) c. Network interface card (NIC) d. Transceiver
d
What is the name for the Wi-Fi-related technique in which two separate non-overlapping channels can be used at the same time to transmit data? a. Packet aggregation b. Payload optimization c. Multiple-Input, Multiple-Output (MIMO) d. Channel bonding
a
What is the term for a collection of wireless clients around a specific wireless AP? a. Wireless cell b. Basic Service Set Identifier (BSSID) c. Service Set Identifier (SSID) d. Spread spectrum
c
What is the term for a device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment? a. Hub b. Router c. Bridge d. Switch
d
What is the term for a networking mode in which systems connect via a centralized access point? a. Wireless access point (AP) b. Ad-hoc c. Spread spectrum d. Infrastructure
a
What is the term for a specialized cable that allows you to connect two computers directly without using a hub? a. Crossover cable b. Shielded twisted-pair cable c. Coaxial cable d. Fiber-optic cable
d
What is the term for a technology in which a signal is generated by a system and then sent over a large number of frequencies to another system? a. Infrastructure b. Wideband c. Ad hoc d. Spread spectrum
d
What is the term for the weakening of a transmission signal as it travels farther from its source? a. Store-and-forward b. Crossover c. Wideband d. Attenuation
a
What is virtualization? a. Software technology that enables you to run multiple virtual operating systems and applications on a single physical computer b. A networking mode in which systems connect via a centralized access point c. A P2P protocol that can be used to download large files quickly, such as video games, movies or software applications d. A networking mode in which systems use only their NICs to connect with one another
a
Where is a network firewall most commonly placed? a. Between a corporate LAN and the Internet b. Between two NICs in the same computer c. Between an individual computer and the network d. Between a network device and a wall jack
d
Which IEEE standard supports the 1000BaseT wiring standard? a. Wireless Ethernet/IEEE 802.11 b. Fast Ethernet / IEEE 802.3u c. Ethernet / IEEE 802.3 d. Gigabit Ethernet / IEEE 802.3ab
d
Which category of twisted-pair cable has a bandwidth of 100 Mbps and is used in 10BaseT and 100BaseTX networks? a. Category 1 b. Category 4 c. Category 3 d. Category 5
c
Which of the following are established rules that enable data to flow from one network interface card (NIC) to another? a. Broadcasts b. Broadcast domains c. Network protocols d. Collision domains
a
Which of the following has a data transfer rate of 2.048 Mbps? a. E1 line b. T2 line c. E2 line d. T1 line
b
Which of the following is considered to be the de facto standard for wireless security? a. Wireless APs b. Wi-Fi Protected Access 2 (WPA2) c. MAC address filtering d. Wired Equivalent Privacy (WEP)
c
Which of the following is the interface between the computer and the network? a. Switch b. Firewall c. Network interface card (NIC) d. Router
a
Which of the following operates the fastest? a. Switches b. Routers c. Hubs d. Bridges
c
Which of the following statements is true about a virtualization environment? a. You will need to make backups of your virtual machine before you exit because virtualization software does not save state. b. Energy efficiency is reduced because the consumption of electricity is increased and more heat is generated. c. You can run software written for one operating system on another without the need to reboot your computer. d. You can run one additional operating system at a time on a single computer.
a
Which of the following use asynchronous transmissions? a. Dial-up modems b. Cable television systems c. Ethernet networks d. T1 lines
b
Which of the following wireless transmission technologies is considered a wideband networking method? a. Orthogonal Frequency Division Multiplexing (OFDM) b. Direct Sequence Spread Spectrum (DSSS) c. Wireless access point (AP) d. Multiple-Input, Multiple-Output (MIMO)
b
Which phrase reflects the growing movement of employees who use their personal smartphones and tablets at work? a. Mobile computing b. Bring Your Own Device (BYOD) c. Social networking d. Wireless networking
a
Which statement is true about MAC addresses on your system? a. MAC addresses are unique addresses that are burned into a NIC. b. MAC addresses use six hexadecimal digits to form a 24-bit address. c. In a routed network environment, the IP address, rather than the MAC address, is used to send a packet to its final destination. d. MAC addresses can be duplicated if network security is breached.
d
Which twisted-pair cable category is the only one that can support segments over 100 meters in length? a. Category 5 b. Category 5e c. Category 6E d. Class F
c
Wired Equivalent Privacy (WEP) encryption: a. is available in a 512-bit key. b. is more secure than WiFi Protected Access (WPA). c. is less secure than WiFi Protected Access (WPA). d. uses a 128-bit key that has never been cracked.