FINAL 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

22. How many data streams are used in 802.11ac Wave 2 devices? a. 2 data streams b. 3 data streams c. 4 data streams d. 8 data streams

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

25. 802.11ac Wave 2 devices can theoretically support how much maximum throughput? a. 600 Mbps b. 1.3 Gbps c. 3.47 Gbps d. 6.93 Gbps

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

26. A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points? a. beacon frame b. association request c. probe frame d. ping frame

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

25. In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines? a. VoIP PBX b. VoIP MTA c. VoIP gateway d. VoIP translator

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

21. In an 802.11 data frame, what is the size of the frame check sequence field? a. 2 bytes b. 4 bytes c. 6 bytes d. 8 bytes

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

34. When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1? a. white/green, green, white/orange, blue, white/blue, orange, white/brown, brown b. blue, white/blue, green, white/green, orange, white/orange, brown, white/brown c. white/orange, orange, white/green, blue, white/blue, green, white/brown, brown d. white/brown, brown, white/green, blue, white/blue, green, orange, white/orange

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

35. You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? a. SRV record b. CNAME record c. TXT record d. PTR record

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

36. What does the MX record do in a forward DNS zone? a. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP. b. It identifies the authoritative name server for a domain. c. It identifies the e-mail server to be used for e-mail traffic for the domain. d. It holds the alternative names for a host.

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

8. The Transport layer header addresses a receiving application by a number called a MAC address. a. True b. False

False POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

10. The LLC sublayer is primarily concerned with managing MAC addresses in message frames. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: 802.11 WLAN Standards QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

3. Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

5. A 66 block is more suitable for data connections than the older 110 block. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

1. A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

4. In order to achieve 1000Base-T over CAT5e cable, 2 pairs of copper are needed. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

2. DNS follows a centralized database model, allowing for easier management of DNS records. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

3. ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

5. The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Fiber-Optic Cable QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

8. F5 Networks set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.2 - Create and analyze network diagrams DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

1. Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Models QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

46. How can a network switch be said to operate at Layer 4 of the OSI model?

A Layer 4 switch is capable of interpreting Layer 4 data. They operate anywhere between Layer 4 and Layer 7 and are also known as content switches or application switches. Among other things, the ability to interpret higher layer data enables switches to perform advanced filtering, keep statistics, and provide security functions. In general, however, a Layer 4 switch is still optimized for fast Layer 2 data handling. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

41. How does a time domain reflectometer (TDR) work?

A TDR issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR. Bad connectors, crimps, bends, short circuits, cable mismatches, bad wiring, or other defects modify the signal's amplitude before it returns to the TDR, thus changing the way it reflects. The TDR then accepts and analyzes the return signal, and based on its condition and the amount of time the signal took to return, determines cable imperfections. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Tools QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.4 - Select and use the appropriate tool to troubleshoot common cable problems DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

48. When deploying a VoIP solution in a network, what are some of the different types of equipment and devices you may encounter?

A VoIP network might contain devices such as VoIP gateways, which convert signals from analog phone equipment into IP data that can travel over the Internet, or vice versa. You might also encounter VoIP PBX equipment, which serves as a dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway. Internally, this equipment connects to VoIP endpoints, which might be telephones sitting at each user's location or applications hosted on a user's computer or other device. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

42. What are some of the typical elements that might be present in a fire suppression system, and what do they do?

A fire suppression system in a data center typically includes the following: * emergency alert system-These systems vary, but they typically generate loud noise and flashing lights. Some send text and voice message alerts to key personnel, and post alerts by email, network messages, and other means. * portable fire extinguishers-Note that electrical fires require a Class C fire extinguisher. * emergency power-off switch-Don't use a power-off switch unless you really need to; improper shutdowns are hard on computers and their data. * suppression agent-This can consist of a foaming chemical, gas, or water that sprays everywhere to put out the fire. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Safety Procedures and Policies QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

43. What is the difference between a WAN, MAN, CAN, and a PAN?

A group of LANs that spread over a wide geographical area is called a WAN (wide area network). A group of connected LANs in the same geographical area-for example, a handful of government offices surrounding a state capitol building-is known as a MAN (metropolitan area network) or CAN (campus area network). The smallest network is a PAN (personal area network), which is a network of personal devices, such as the network you use when you sync your smartphone and your computer. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Hardware QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

44. What are some of the tasks for which a network operating system is responsible?

A network operating system is typically responsible for the following: * Managing data and other resources for a number of clients * Ensuring that only authorized users access the network * Controlling which types of files a user can open and read * Restricting when and from where users can access the network * Dictating which rules computers will use to communicate * In some situations, supplying applications and data files to clients POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Models QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

45. What is the difference between a port and a socket?

A port is a number assigned to a process, such as an application or a service, that can receive data. Whereas an IP address is used to find a computer, a port is used to find a process running on that computer. TCP and UDP ports ensure that data is transmitted to the correct process among multiple processes running on the computer. A socket consists of both a host's IP address and a process's TCP or UDP port, with a colon separating the two values. For example, the standard port for the Telnet service is TCP 23. If a host has an IP address of 10.43.3.87, the socket address for Telnet running on that host is 10.43.3.87:23. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Ports and Sockets QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

45. What is a remote application, and how can remote applications be implemented on Windows Server?

A remote application is an application that is installed and executed on a server and is presented to a user working at a client computer. Windows Server 2008 and later versions include Remote Desktop Services to manage remote applications, and versions of Windows Server prior to 2008 provided Terminal Services. Both use RDP (Remote Desktop Protocol) to present the remote application and its data to the client. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Client-Server Applications QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

43. What is the difference between unicast, multicast, and anycast addresses?

A unicast address specifies a single node on a network. This differs from a multicast address, which is delivered to all nodes in a targeted, multicast group. An anycast address can identify multiple destinations, with packets delivered to the closest destination. For example, a DNS name server might send a DNS request to a group of DNS servers that have all been assigned the same anycast address. A router handling the request examines routes to all the DNS servers in the group and routes the request to the closest server. POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

48. ARP tables might contain two different types of entries. What are they, and how are they created?

ARP tables can contain two types of entries: dynamic and static. Dynamic ARP table entries are created when a client makes an ARP request for information that could not be satisfied by data already in the ARP table; once received, the new information is recorded in the table for future reference. Static ARP table entries are those that someone has entered manually using the ARP utility. This ARP utility, accessed via the arp command in both Windows and Linux, provides a way of obtaining information from and manipulating a device's ARP table. POINTS: 1 DIFFICULTY: Difficult REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

49. What is the purpose of a main distribution frame or main distribution facility?

Also known as the MC (main cross connect), the MDF is the centralized point of interconnection for an organization's LAN or WAN. In practice, the term MDF can refer either to the racks holding the network equipment or the room that houses both the racks and the equipment. The MDF and the entrance facility might be in the same data room, or they could be in separate rooms, depending on the layout of the building. Connections branching out from the MDF include Ethernet cables connecting to nearby work areas, large cables to running to IDFs in other buildings or on other floors of the same building, and the incoming connection from the service provider's facility. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

47. What are some of the basic functions of a network router?

Although any one router can be specialized for a variety of tasks, all routers can do the following: * Connect dissimilar networks, such as a LAN and a WAN, which use different types of routing protocols. * Interpret Layer 3 and often Layer 4 addressing and other information (such as quality of service indicators). * Determine the best path for data to follow from point A to point B. The best path is the most efficient route to the message's destination calculated by the router, based upon the information the router has available to it. * Reroute traffic if the path of first choice is down but another path is available. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

42. Describe the 802.11a standard, and detail some of its history and advantages / disadvantages versus other 802.11 standards.

Although the 802.11a task group began its standards work before the 802.11b group, 802.11a was released after 802.11b. The higher throughput of 802.11a, as compared with 802.11b, is attributable to its use of higher frequencies, its unique method of modulating data, and more available bandwidth. Perhaps most significant is that the 5-GHz band is not as congested as the 2.4-GHz band. Thus, 802.11a signals are less likely to suffer interference from microwave ovens, cordless phones, motors, and other (incompatible) wireless LAN signals. However, higher-frequency signals require more power to transmit, and they travel shorter distances than lower-frequency signals. As a result, 802.11a networks require a greater density of access points between the wired LAN and wireless clients to cover the same distance that 802.11b networks cover. The additional access points, as well as the nature of 802.11a equipment, make this standard more expensive than either 802.11b or 802.11g. For this and other reasons, 802.11a is rarely preferred. POINTS: 1 DIFFICULTY: Difficult REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

50. How is a memorandum of understanding document utilized?

An MOU (memorandum of understanding) documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts. The MOU can be helpful in pushing along contract negotiations and in defining specific concerns of each party, but it is usually not a legally binding document, does not grant extensive rights to either party, provides no legal recourse, and is not intended to provide thorough coverage of the agreement to come. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Network Documentation QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

47. How might an organization configure a DNS server for use on their network?

An organization might utilize these four common types of DNS server configurations: * primary DNS server-The authoritative name server for the organization, which holds the authoritative DNS database for the organization's zones. This server is contacted by clients, both local and over the Internet, to resolve DNS queries for the organization's domains. * secondary DNS server-The backup authoritative name server for the organization. When a secondary DNS server needs to update its database, it makes the request to the primary server for the update; this process is called a zone transfer. * caching DNS server-A server that accesses public DNS data and caches the DNS information it collects. This server receives DNS queries from local network clients and works to resolve them by contacting other DNS servers for information. Caching DNS servers do not store zone files (which is why they must rely on their caches and resolution efforts), and therefore do not participate in zone transfers. * forwarding DNS server-An optional server that receives queries from local clients but doesn't work to resolve the queries. Typically, a forwarding server will maintain its own DNS cache from previous queries, and so it might already have the information the client needs. If not, the forwarding server forwards the query to another server to resolve. Several forwarding servers might be strategically placed throughout the organization's network to reduce network traffic on slow links. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

50. Explain the two different categories of Application layer protocols, and then detail the PDU used at this layer.

Application layer protocols are used by programs that fall into two categories: *Application programs that provide services to a user, such as a browser and Web server using the HTTP Application layer protocol *Utility programs that provide services to the system, such as SNMP (Simple Network Management Protocol) programs that monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention. Data that is passed between applications or utility programs and the operating system is called a payload and includes control information. The two end-system computers that initiate sending and receiving data are called hosts. POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

42. What is the difference between bandwidth and throughput?

Bandwidth is the amount of data that could theoretically be transmitted during a given period of time. In an analogy, the bandwidth of a three-lane freeway is the number of vehicles that can pass a checkpoint in one minute when traffic is bumper-to-bumper and traveling at the maximum speed limit. In practice, that bandwidth never happens. Still, we could increase potential bandwidth by adding more lanes to the freeway. At the same time, consider that adding too many lanes for the amount of anticipated traffic, so that some lanes are never used, would be a waste of resources. Throughput is the measure of how much data is actually transmitted during a given period of time. In our analogy, throughput measures the actual traffic on the three-lane freeway that passes in one minute. Using all the available bandwidth results in more accidents and traffic jams than if bandwidth exceeds actual throughput by a little. However, this beneficial effect is limited-providing a lot more potential bandwidth than actual throughput does not achieve additional improvement in performance unless you need to account for regular spikes in traffic. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Transmission Basics QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

48. How can you prevent damage to a component prior to touching it?

Before touching a component, first ground yourself using one of these methods: *Wear an ESD strap around your wrist that clips onto the chassis or computer case, which eliminates any ESD between you and the chassis and its components. *If you don't have an ESD strap handy, be sure to at least touch the case before you touch any component inside the case. This is not as effective as wearing an ESD strap, but can reduce the risk of ESD. *To protect a sensitive component, always store it inside an antistatic bag when it's not in use. In addition to protecting against ESD, always shut down and unplug a computer before working inside it. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

50. Why are the Class D and Class E IPv4 address ranges not available for general use?

Class D addresses begin with octets 224 through 239 and are used for multicast transmissions, in which one host sends messages to multiple hosts. An example of this is when a host transmits a videoconference over the Internet to multiple participants. Class E addresses, which begin with 240 through 254, are reserved for research. POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

46. Why should an access point not always utilize all the power it has for broadcasting wireless signals?

Each access point's power level, or the strength of the signal the access point emits, should be optimized for the geographic area covered by that AP. Power levels that are too low will result in dropped signals as clients roam to the peripheral areas of the AP's range. However, maxed out power levels will result in too much overlap between AP coverage areas, causing clients from other coverage areas to attempt to connect with APs that are farther away but transmitting the stronger signal. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Wi-Fi Networks QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

47. What is electromagnetic interference, and how do you avoid its effects?

Electromagnetic interference is interference that is caused by motors, power lines, televisions, copiers, fluorescent lights, or other sources of electrical activity. In order to reduce the possibility of noise that can affect your network's signals, you should install cable at least 3 feet away from any EMI sources. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

10. The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Ports and Sockets QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

7. The 1024 - 65535 range of ports is also known as the "well-known" range. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Ports and Sockets QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

4. Static electricity is an electrical charge in motion. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

1. UDP provides error checking, but not sequencing. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

3. IPv4 and IPv6 use the same packet format. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

4. TCP uses a four-step process called a four-way handshake to establish a TCP connection. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

5. The protocol data unit for the Physical layer of the OSI model is payload, or data. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

7. The Data Link layer attaches a trailer to the end of a packet, and does not include a header. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

9. The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

10. The CTRL + S key combination can be used to stop an actively running command. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Route Issues QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

9. The pathping utility sends 10 pings per hop by default. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Route Issues QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

9. A short circuit is one where needed connections are missing, such as when a wire breaks. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Tools QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

6. Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Wi-Fi Network Security QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

2. NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

4. Infrared technology utilizes an LED that emits light with shorter wavelengths than red light. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

8. Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters. a. True b. False

False POINTS: 1 DIFFICULTY: Easy REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

7. In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack. a. True b. False

False POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

8. RG-59 is more expensive than RG-6, but has better resistance to attenuation. a. True b. False

False POINTS: 1 DIFFICULTY: Moderate REFERENCES: Copper Cable QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

5. An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. a. True b. False

False POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

7. Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. a. True b. False

False POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

42. What steps should be taken to manage documentation at a cabling plant?

Follow these guidelines to manage documentation at your cabling plant: *Keep your cable plant documentation in a centrally accessible location. Make sure it includes locations, installation dates, lengths, and grades of installed cable. *Label every data jack or port, patch panel or punch-down block, and connector or circuit. *Use color-coded cables for different purposes and record the color schemes in your documentation. Cables can be purchased in a variety of sheath colors. For example, you might want to use pink for patch cables, green for horizontal wiring, purple for DMZ lines, and gray for vertical (backbone) wiring. *Be certain to update your documentation as you make changes to the network. The more you document, the easier it will be to move or add cable segments in the future. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.4 - Track the progress of changes made to a network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

42. How is an IPv6 address written and displayed?

IPv6 addresses are written and displayed as follows: * An IPv6 address has 128 bits that are written as eight blocks (also called quartets) of hexadecimal numbers separated by colons, like this: 2001:0000:0B80:0000:0000:00D3:9C5A:00CC. * Each block is 16 bits. For example, the first block in the preceding IP address is the hexadecimal number 2001, which can be written as 0010 0000 0000 0001 in binary. * Leading zeroes in a four-character hex block can be eliminated. This means our sample IP address can be written as 2001:0000:B80:0000:0000:D3:9C5A:CC. * If blocks contain all zeroes, they can be eliminated and replaced by double colons (::). To avoid confusion, only one set of double colons is used in an IP address. This means our sample IP address can be written two ways: 2001::B80:0000:0000:D3:9C5A:CC or 2001:0000:B80::D3:9C5A:CC POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

41. How does IPv6 utilize Neighbor Discovery Protocol to detect neighboring devices?

IPv6 devices use NDP (Neighbor Discovery Protocol) in ICMPv6 messages to automatically detect neighboring devices, and to automatically adjust when neighboring nodes fail or are removed from the network. NDP eliminates the need for ARP and some ICMP functions in IPv6 networks, and is much more resistant to hacking attempts than ARP. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

49. IPv6 has two different types of unicast addresses. How do these two types differ from each other?

IPv6 unicast addresses come in two types: * global addresses-Can be routed on the Internet and is similar to public IPv4 addresses. Most begin with the prefix 2000::/3, although other prefixes are being released. The /3 indicates that the first three bits are fixed and are always 001. * link local addresses-Can be used for communicating with nodes in the same link, and is similar to an autoconfigured APIPA address in IPv4. It begins with FE80::/10. The first 10 bits of the reserved prefix are fixed (1111 1110 10), and the remaining 54 bits in the 64-bit prefix are all zeroes. Therefore, a link local address prefix is sometimes written as FE80::/64. Link local addresses are not allowed past the local link or on the Internet. POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

49. How does configuration of wireless clients for wireless access in an enterprise environment differ from normal setup?

In an enterprise environment, configuring clients for wireless access to the network can entail a much more involved, two-part process: * on-boarding-Users or network technicians install a specific app, called an agent, on a user's device, whether the device is a smartphone, laptop, or tablet. This gives the device trusted access to certain portions of the network. Access to email services, file-sharing services, and certain network administrative features might all be controlled by the device's permission levels enabled by on-boarding that device. * off-boarding-The reverse procedure involves removing the agent. For security purposes, network administrators need a feature that allows them to do this remotely, in case a device is lost or stolen. This feature, called a remote wipe, clears a device of all important information, permissions, and apps without having physical access to the device. It might even allow you to completely disable the device, making any network or data access impossible. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Implementing a Wi-Fi Network QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.4 - Implement a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

45. In considering a telecommunications service provider's network, what is the demarc, and where is it located?

In general, the device that marks where a telecommunications service provider's network ends and the organization's network begins is the demarc, or demarcation point. For example, an ISP (Internet service provider) might be responsible for fiber-optic cabling to your building to connect to your LAN. The device where the WAN ends and the LAN begins is the demarc. The service provider is responsible for its network beyond the demarc, and, in most cases, the organization is responsible for devices and services on the campus side of the demarc. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

48. What is the difference between war driving and war chalking?

In war driving, a hacker searches for unprotected wireless networks by driving around with a laptop or smartphone configured to receive and capture wireless data transmissions. (The term is derived from the term war dialing, which is a similar tactic involving old, dial-up modems.) War driving is surprisingly effective for obtaining private information. War chalking occurs when a hacker discovers vulnerable access points, and makes this information public by drawing symbols with chalk on the sidewalk or wall within range of a wireless network. The symbols, patterned after marks that hobos devised to indicate hospitable places for food or rest, indicate the access point's SSID and whether it's secured. Alternatively, many websites offer maps of these open networks, as reported by war drivers. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Wi-Fi Network Security QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

41. What is a subnet mask, and how is it used?

It is a 32-bit number that helps one computer find another. The 32 bits are used to indicate what portion of an IP address is the network portion, called the network ID or network address, and what part is the host portion, called the host ID or node ID. Using this information, a computer can determine if another computer with a given IP address is on its own or a different network. POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

48. What is a fiber distribution panel, and how is it used?

It is usually a case on a rack where fiber cables converge, connect with each other, and connect with fiber optic terminal equipment from the ISP. Splices at the FDP (or elsewhere on the network) might be accomplished by joining two fiber cables in a permanent bond, or various connectors might be used to create temporary splices. The transition between single mode fiber and multimode fiber cabling might also occur at an FDP. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

50. What is MAC address spoofing?

MAC address spoofing is the impersonation of an MAC address by an attacker. On a network where access is limited to certain devices based on their MAC address, an attacker can spoof an approved device's MAC address and gain access to the network. This is a relatively easy attack to carry out, which is why MAC address filtering is not considered a reliable way to control access to a network. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

45. How does modal bandwidth affect the performance of a multimode fiber segment?

Modal bandwidth is a measure of the highest frequency of signal a multimode fiber can support over a specific distance and is measured in MHz-km. It is related to the distortion that occurs when multiple pulses of light, although issued at the same time, arrive at the end of a fiber at slightly different times. The higher the modal bandwidth, the longer a multimode fiber can carry a signal reliably. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

50. What are the different transceiver types that have made the GBIC obsolete?

Newer transceivers that have made the GBIC obsolete include: * SFP (small form-factor pluggable)-Provides the same function as GBICs and is more compact, allowing more ports per linear inch. Also known as mini GBICs or SFP GBICs. Typically used for 1 Gbps connections, but theoretically capable of 5 Gbps. * XFP (10 Gigabit small form-factor pluggable)-Supports up to 10 Gbps and is slightly larger than SFP with lower power consumption than SFP+. * SFP+-Developed later than XFP and is the same module size as SFP; theoretical maximum transmission speed is 16 Gbps. * QSFP (quad small form-factor pluggable)-Complies with the 802.3ba standard, squeezing four channels in a single transceiver and supporting data rates up to 40 Gbps (4 x 10 Gbps). * QSFP+-Generally the same technology as QSFP while supporting data rates over 40 Gbps. Highest speed format currently is QSFP28 with a total theoretical maximum data rate of 112 Gbps (4 x 28 Gbps). * CFP (centum form-factor pluggable)-Intended for 100-Gbps network connections, with each succeeding generation (CFP, CFP2, CFP4) becoming smaller and more energy-efficient. Centum is Latin for 100. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

43. How should a company deal with the documentation of passwords?

Password documentation must be kept secure, but also must be available for access by multiple people. Otherwise, if the network admin is suddenly incapacitated, you might be unable to retrieve high-security passwords. A password manager, such as KeePass or LastPass, should be utilized to secure passwords. POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

46. When tracing a wire, how do you utilize a toner and probe kit?

Place the tone generator at one end of a wire using the appropriate connector. Swipe the tone locator over each of the terminations you suspect to be the other end of that wire. You can verify the location of the wire's termination when you hear the tone. Work by trial and error, guessing which termination corresponds to the wire over which you've generated a signal until the tone locator indicates the correct choice. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Tools QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.4 - Select and use the appropriate tool to troubleshoot common cable problems DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

44. What is plenum, and what must you do to be able to run cable through plenum space?

Plenum is the area above the ceiling tile or below the subflooring. If you run cable in this space, the cable sheath must be plenum-rated. You should also consult with local electric installation codes to be certain you are installing it correctly. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

46. What are the three different types of port number ranges as defined by IANA?

Port numbers range from 0 to 65535 and are divided by IANA into three types: * well-known ports-Range from 0 to 1023 and are assigned by IANA to widely used and well-known utilities and applications, such as Telnet, FTP, and HTTP. * registered ports-Range from 1024 to 49151 and can be used temporarily by processes for nonstandard assignments for increased security. Default assignments of these registered ports must be registered with IANA. * dynamic and private ports-Range from 49152 to 65535 and are open for use without restriction. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Ports and Sockets QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

43. How are routing paths determined?

Routing paths are determined in one of two ways: * static routing-A network administrator configures a routing table to direct messages along specific paths between networks. For example, it's common to see a static route between a small business and its ISP. However, static routes can't account for occasional network congestion, failed connections, or device moves, and they require human intervention. * dynamic routing-A router automatically calculates the best path between two networks and accumulates this information in its routing table. If congestion or failures affect the network, a router using dynamic routing can detect the problems and reroute messages through a different path. When a router is added to a network, dynamic routing ensures that the new router's routing tables are updated. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

47. What is the difference between single mode fiber and multimode fiber, and how do they compare?

SMF (single mode fiber) consists of a narrow core of 8 to 10 microns in diameter. Laser-generated light travels a single path over the core, reflecting very little. Because it reflects little, the light does not disperse as the signal travels along the fiber. This continuity allows SMF to accommodate the highest bandwidths and longest distances (without requiring repeaters) of all network transmission media. MMF (multimode fiber) contains a core with a larger diameter than SMF, usually 50 or 62.5 microns, over which many pulses of light generated by a laser or LED light source travel at various angles. Signals traveling over multimode fiber experience greater attenuation than those traversing single mode fiber. Therefore, MMF is not suited to distances longer than a few kilometers. On the other hand, MMF is less expensive to install and, therefore, typically used to connect routers, switches, and servers on the backbone of a network or to connect a desktop workstation to the network. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.3 - Compare the benefits and limitations of various networking media DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

49. Describe the two different shapes and polishes currently used on SMF ferrules to reduce back reflection.

Shapes and polishes currently used on SMF ferrules to reduce back reflection include: * UPC (Ultra Polished Connector)-Extensive polishing of the tips creates a rounded surface on a UPC (Ultra Polished Connector), which allows the two internal fibers to meet and increases efficiency over older types of connections. * APC (Angle Polished Connector)-The latest advancement in ferrule technology uses the principles of reflection to its advantage. The APC (Angle Polished Connector) still uses a polished curved surface, but the end faces are placed at an angle to each other. The industry standard for this angle is 8 degrees. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

44. What are some examples of routing metrics that can be used to determine the best path for a network?

Some examples of routing metrics used to determine the best path may include: * Hop count, which is the number of network segments crossed * Theoretical bandwidth and actual throughput on a potential path * Delay, or latency, on a potential path, which results in slower performance * Load, which is the traffic or processing burden sustained by a router in the path * MTU, which is the largest IP packet size in bytes allowed by routers in the path without fragmentation (excludes the frame size on the local network) * Routing cost, which is a value assigned to a particular route as judged by the network administrator; the more desirable the path, the lower its cost * Reliability of a potential path, based on historical performance * A network's topology POINTS: 1 DIFFICULTY: Difficult REFERENCES: Routers and How They Work QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

49. What are some general OSHA guidelines to use when using power (electric) tools or other hand tools in the workplace?

Some general OSHA guidelines for using power tools or other hand tools in the workplace are as follows: *Wear personal protective equipment (PPE) to protect yourself as you work. For example, wear eye protection where dust or fumes are generated by power tools. *Keep all tools in good condition and properly store tools not in use. Examine a tool for damage before you use it. *Use the right tool for the job and operate the tool according to the manufacturer's instructions and guidelines. Don't work with a tool unless you are trained and authorized to use it. *Watch out for trip hazards, so you and others don't stumble on a tool or cord. For example, keep power tool electrical extension cords out from underfoot, and don't leave hand tools lying around unattended. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

42. What are the different categories of routers, and how do they compare?

Some of the different categories of routers are as follows: * Core routers, also called interior routers, are located inside networks within the same autonomous system. An AS (autonomous system) is a group of networks, often on the same domain, that are operated by the same organization. An AS is sometimes referred to as a trusted network because the entire domain is under the organization's control. Core routers communicate only with routers within the same AS. * Edge routers, or border routers, connect an autonomous system with an outside network, also called an untrusted network. For example, the router that connects a business with its ISP is an edge router. * Exterior router refers to any router outside the organization's AS, such as a router on the Internet backbone. Sometimes a technician might refer to her own edge router as an exterior router because it communicates with routers outside the AS. But keep in mind that every router communicating over the Internet is an edge router for some organization's AS, even if that organization is a large telecommunications company managing a portion of the Internet backbone. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Routers and How They Work QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

41. What are some of the different types of wireless topologies that can be created?

Some of the different types of wireless topologies are as follows: * ad hoc-A small number of nodes closely positioned transmit directly to each other without an intervening connectivity device. * infrastructure-An intervening connectivity device, a WAP (wireless access point) or AP (access point), accepts wireless signals from multiple nodes and retransmits them to the rest of the network. To cover its intended range, an access point must have sufficient power and be strategically placed so that all connected nodes can communicate with it. * mesh-Several access points work as peer devices on the same network, where the AP devices cooperate to provide more fault tolerant network access to clients. A wireless controller might be used only initially to configure the APs, or the APs might remain connected to the wireless controller for continued management. POINTS: 1 DIFFICULTY: Moderate REFERENCES: Implementing a Wi-Fi Network QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.4 - Implement a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

46. What are some of the different types of software changes?

Some of the software changes that you might be called upon to implement include: * patch-A software patch is a correction, improvement, or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to only part of the software, leaving most of the code untouched. * upgrade-A software upgrade is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. * rollback-A software rollback is the process of reverting to a previous version of software after attempting to patch or upgrade it. * installation-New software, such as CRM (customer relationship management) software for sales reps or a financial software package for accountants, must be installed on the relevant devices and incorporated with network resources. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Change Management QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.4 - Track the progress of changes made to a network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

41. What are the three different types of cabling recognized by TIA/EIA as acceptable for horizontal wiring?

TIA/EIA recognizes three possible cabling types for horizontal wiring: UTP, STP, or fiber optic cable. UTP (unshielded twisted pair) cable is a type of copper-based cable that consists of one or more insulated twisted-wire pairs encased in a plastic sheath. STP (shielded twisted pair) cable is a type of copper-based cable containing twisted-wire pairs that are not only individually insulated, but also surrounded by a shielding made of a metallic substance such as foil. Fiber-optic cable is a form of cable that contains one or several glass or plastic fibers in its core and comes in two types: single-mode fiber (SMF) or multimode fiber (MMF). Copper-based cable transmits data via electric signals, and fiber-optic cable transmits data via pulsing light sent from a laser or light-emitting diode (LED). POINTS: 1 DIFFICULTY: Difficult REFERENCES: Components of Structured Cabling QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

45. There are several interior gateway protocols, but only one current exterior gateway protocol. What is this protocol, and what characteristics does it have?

The Border Gateway Protocol (BGP) is the only current exterior gateway protocol, and has been dubbed the "protocol of the Internet." Whereas OSPF and IS-IS scouting parties only scout out their home territory, a BGP scouting party can go cross-country. BGP spans multiple autonomous systems and is used by edge and exterior routers on the Internet. Here are some special characteristics of BGP: * path-vector routing protocol-Communicates via BGP-specific messages that travel between routers over TCP sessions. * efficient-Determines best paths based on many different factors. * customizable-Can be configured to follow policies that might, for example, avoid a certain router, or instruct a group of routers to prefer one particular route over other available routes. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Routers and How They Work QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

49. How is the TTL (Time to Live) field utilized in IPv4?

The TTL field indicates the maximum duration that the packet can remain on the network before it is discarded. Although this field was originally meant to represent units of time, on modern networks it represents the number of times a packet can still be forwarded by a router, or the maximum number of router hops it has remaining.The TTL for packets varies and can be configured; it is usually set at 32 or 64. Each time a packet passes through a router, its TTL is reduced by 1. When a router receives a packet with a TTL equal to 0, it discards that packet and sends a TTL expired message via ICMP back to the source host. POINTS: 1 DIFFICULTY: Difficult REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

44. What is the biggest limiting factor on fiber-optic cable length?

The maximum length limitation is due primarily to optical loss, or the degradation of the light signal after it travels a certain distance away from its source (just as the light of a flashlight dims after a certain number of feet). Optical loss accrues over long distances and grows with every connection point in the fiber network. Dust or oil in a connection (for example, from people handling the fiber while splicing it) can further exacerbate optical loss. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

47. Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.

The Transmission Control Protocol (TCP) makes a connection with the end host, checks whether the data is received, and resends it if it is not. TCP is, therefore, called a connection-oriented protocol. TCP is used by applications such as Web browsers and email. Guaranteed delivery takes longer and is used when it is important to know that the data reached its destination. The User Datagram Protocol (UDP) does not guarantee delivery by first connecting and checking whether data is received; thus, UDP is called a connectionless protocol or best-effort protocol. UDP is used for broadcasting, such as streaming video or audio over the Web, where guaranteed delivery is not as important as fast transmission. UDP is also used to monitor network traffic. POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

43. What is the hidden node problem, and how can it be mitigated?

The hidden node problem occurs where a node is not visible to other nodes on the other side of a coverage area. One way to ensure that packets are not inhibited by other transmissions is to reserve the medium for one station's use. In 802.11, this can be accomplished through the optional RTS/CTS (Request to Send/Clear to Send) protocol. RTS/CTS enables a source node to issue an RTS signal to an access point requesting the exclusive opportunity to transmit. If the access point agrees by responding with a CTS signal, the access point temporarily suspends communication with all stations in its range and waits for the source node to complete its transmission. POINTS: 1 DIFFICULTY: Difficult REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

46. Explain the differences between a physical topology and a logical topology.

The term physical topology, or network topology, mostly applies to hardware and describes how computers, other devices, and cables fit together to form the physical network. The term logical topology has to do with software and describes how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network. POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Models QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

45. Radiation patterns can be used to classify antennas into what two basic categories?

The two basic categories that antennas can be classified under are: * unidirectional antenna (also called a directional antenna)-Issues wireless signals along a single direction. This type is used when the source needs to communicate with one destination, as in a point-to-point link, or in a specific area. A satellite downlink (for example, the kind used to receive digital TV signals) uses directional antennas * omnidirectional antenna-Issues and receives wireless signals with equal strength and clarity in all directions. This type is used when many different receivers must be able to pick up the signal in many directions, or when the receiver's location is highly mobile. TV and radio stations use omnidirectional antennas, as do most towers that transmit cellular signals. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Characteristics of Wireless Transmissions QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

44. Most wireless devices use one of two technologies to avoid interference. What are these technologies?

The two technologies used are as follows: * FHSS (frequency hopping spread spectrum)-Short bursts of data are transmitted on a particular frequency within the band and the next burst goes to the next frequency in the sequence. Frequency hopping can happen hundreds of times a second. FHSS is cheaper to implement than DSSS and performs better than DSSS in crowded, indoor environments. * DSSS (direct sequence spread spectrum)-Data streams are divided and encoded into small chunks, called chips, which are spread over all available frequencies within one of three, wide channels, all at the same time. The process of dividing and encoding the data is called chipping, and the spreading ratio used to transform the data is called the chipping code, which is unique to each device. DSSS uses the available bandwidth more efficiently than FHSS and tends to have a higher throughput. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Characteristics of Wireless Transmissions QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

44. What are the two different variations of network address translation (NAT)?

The two variations of NAT are: * SNAT-Using SNAT (Static Network Address Translation or Source Network Address Translation), the gateway assigns the same public IP address to a host each time it makes a request to access the Internet. Small home networks with only a single public IP address provided by its ISP use SNAT. * DNAT or Destination NAT-Using DNAT (Destination Network Address Translation), hosts outside the network address a computer inside the network by a predefined public IP address. When a message sent to the public IP address reaches the router managing DNAT, the destination IP address is changed to the private IP address of the host inside the network. The router must maintain a translation table of public IP addresses mapped to various hosts inside the network. POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

48. What are the two different types of DNS requests?

There are two types of DNS requests: * recursive query-A query that demands a resolution or the answer "It can't be found." For example, the initial request the resolver makes to the local server is a recursive query. The local server must provide the information requested by the resolver, as in "The buck stops here." * iterative query-A query that does not demand resolution. For example, when the local server issues queries to other servers, the other servers only provide information if they have it. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

6. At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. a. True b. False

True POINTS: 1 DIFFICULTY: Difficult REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

9. An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: 802.11 WLAN Standards QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

1. A hexadecimal number is a number written in the base 16 number system. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Addressing Overview QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.1 - Find the MAC address of a computer and explain its function in network communications DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

1. All wireless signals are carried through the air by electromagnetic waves. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Characteristics of Wireless Transmissions QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

1. Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

2. The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

4. The industry standard height for a rack in rack units is 42U. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

6. Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF). a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

4. Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

10. A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Fiber-Optic Cable QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

2. Multimode fiber contains a core that is larger than a single mode fiber core. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Fiber-Optic Cable QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

9. When using IPv6, two or more nodes on the same link are said to be neighbors. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: IP Addresses QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

8. The Border Gateway Protocol is considered to be a hybrid routing protocol. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

10. The process of designing, implementing, and maintaining an entire network is called the system life cycle. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

6. In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

2. IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

5. The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

6. The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

7. Latency on data networks is based on a calculation of a packet's round trip time (RTT). a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Transmission Basics QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

3. After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Network Problems QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.6 - Describe the seven-step troubleshooting model for solving a networking problem DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

3. A continuity tester should not be used on a live network segment. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Tools QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.4 - Select and use the appropriate tool to troubleshoot common cable problems DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

3. The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Wi-Fi Network Security QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

5. The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Wi-Fi Network Security QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

7. The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard. a. True b. False

True POINTS: 1 DIFFICULTY: Easy REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

9. A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Documentation QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

2. The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Hardware QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 1:06 PM

8. UDP port 123 is utilized by the Network Time Protocol service. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: Ports and Sockets QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

10. In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

6. A time domain reflectometer sends a signal and analyzes the return signal's change in amplitude to determine where cable imperfections may exist. a. True b. False

True POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Tools QUESTION TYPE: True / False HAS VARIABLES: False LEARNING OBJECTIVES: 5.4 - Select and use the appropriate tool to troubleshoot common cable problems DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

43. Noise can degrade or distort a signal on a network; what are some of its causes?

Two common sources of noise are: * EMI (electromagnetic interference)-Caused by motors, power lines, televisions, copiers, fluorescent lights, microwave ovens, manufacturing machinery, and other sources of electrical activity (including a severe thunderstorm). One type of EMI is RFI (radio frequency interference), or electromagnetic interference caused by radio waves. (Often, you'll see EMI referred to as EMI/RFI.) Strong broadcast signals from radio or TV antennas can generate RFI. * crosstalk-Occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable. The resulting noise, or crosstalk, is equal to a portion of the second line's signal. If you've ever been on a traditional, landline phone and heard the conversation on a second line in the background, you have heard the effects of crosstalk. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Transmission Basics QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

41. What are the differences between the POP3 and IMAP4 protocols?

Using the POP3 (Post Office Protocol, version 3), email is downloaded to the client computer. When using IMAP4 however, the client application manages the email while it's stored on the server. POINTS: 1 DIFFICULTY: Easy REFERENCES: Client-Server Applications QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

13. PoE+ devices are defined by what IEEE standard? a. 802.3at b. 802.3af c. 802.3fc d. 802.3c

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

50. Why should the WPS PIN feature be avoided if possible?

WPS (Wi-Fi Protected Setup) is a user-friendly but not very secure-security setting available on some consumer-grade APs. Part of the security involves requiring a PIN (personal identification number) in order to access the AP's settings or to associate a new device with the network. The problem is that the PIN can be easily cracked through a brute force attack, which means simply trying numerous possible character combinations to find the correct combination. This gives the attacker access to the network's WPA2 key. POINTS: 1 DIFFICULTY: Difficult REFERENCES: Wi-Fi Network Security QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

33. Why should you terminate coaxial cable with connectors that are rated for the exact cable type? a. A mismatched connector will have different impedance ratings, causing data errors. b. A mismatched connector will not fit the coaxial cable for termination. c. A mismatched connector will work fine, but breaks cabling standards. d. A mismatched connector will destroy the equipment it is connected to.

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

47. When deciding antenna types, why might the use of an omnidirectional antenna be inadvisable?

You might think that omnidirectional antennas would nearly always be the best choice when setting up Wi-Fi coverage. The idea is to place the AP in the center of its coverage area, then send the signal out in all directions. However, in many situations, installing unidirectional antennas instead will enhance a signal's availability, directing the signal right where you need it while not wasting a signal in areas where you don't. For example, suppose a company installs an omnidirectional antenna near a factory's 30-foot high ceiling. Because the antenna's signal is broadcast in all directions from its location, distributing its signal strength in a spherical shape, the best possible signal would only be available to workers who could walk on the ceiling-obviously, that's not a viable situation. To be useful, the signal needs to be directed down to the floor. A unidirectional antenna, in this case, can be positioned up high and pointed down to create a dome-shaped coverage that spreads out as it nears the plant floor POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Wi-Fi Networks QUESTION TYPE: Subjective Short Answer HAS VARIABLES: False LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 2/2/2018 2:56 PM

33. What is the purpose of the Layer 2 LLC sublayer? a. It is used to handle multiplexing, flow and error control, and reliability. b. It is used to manage MAC addresses in message frames. c. It performs management of the physical layer's modulation techniques. d. It is used to manage low-level encryption on a network.

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

23. The wireless spectrum, as defined by the FCC, spans between which two frequencies? a. 9 kHz and 300 GHz b. 125 kHz and 150 GHz c. 3 kHz and 500 GHz d. 3 MHz and 300 GHz

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: Characteristics of Wireless Transmissions QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

13. What statement accurately describes what a cable bend radius determines? a. A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data. b. A cable bend radius is the radius of the minimum arc into which you can loop the cable without impairing data. c. A cable bend radius determines the total number of bends that can exist in an overall cable before data is impaired. d. A cable bend radius defines the twist rate of the cable inside of the insulation.

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

22. You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use? a. TIA/EIA 568A b. TIA/EIA 568B c. TIA/EIA 568F d. TIA/EIA rollover

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

13. How can you determine the manufacturer of a NIC card based on the MAC address? a. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. b. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. d. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier.

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: MAC Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.1 - Find the MAC address of a computer and explain its function in network communications DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

27. What does a statement of work document do? a. It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline. b. It documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts. c. It is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP. d. It is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

32. You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? a. The MTU for the network can be as high as 9198 bytes. b. The network is not based on the Ethernet standard. c. Fragmented frames will be consolidated into whole frames before being sent. d. The MTU for the network is set at 65,535 bytes.

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

37. Bidirectional transceivers utilize what technology to separate the data in each direction? a. wavelength division multiplexing b. time division multiplexing c. frequency division multiplexing d. statistical time division multiplexing

a POINTS: 1 DIFFICULTY: Difficult REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

14. At what layer of the OSI model do the 802.11 standards vary? a. Physical layer b. Network layer c. Data link layer d. Transport layer

a POINTS: 1 DIFFICULTY: Easy REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

26. A change coordinator functions as what type of manager? a. project manager b. inventory manager c. human resources manager d. time manager

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Change Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.4 - Track the progress of changes made to a network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

15. What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling? a. RG-6 Coaxial b. unshielded twisted pair (UTP) c. shielded twisted pair (STP) d. fiber-optic

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

37. Equipment data racks most commonly are a standard width of what measurement? a. 19 inches b. 20 inches c. 25 inches d. 30 inches

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

35. Telephone connections follow what registered jack standard? a. registered jack 11 (RJ-11) b. registered jack 12 (RJ-12) c. registered jack 45 (RJ-45) d. registered jack 100 (RJ-100)

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

35. What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages? a. wiki b. spreadsheet c. workgroup d. co-op

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.4 - Track the progress of changes made to a network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

18. A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-open b. fail-close c. fail-tolerant d. fail-oriented

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

17. Which of the following is not a task handled by a router? a. A router forwards broadcasts over the network. b. A router can reroute traffic if the path of first choice is down but a second path is available. c. A router can interpret Layer 3 and often Layer 4 addressing. d. A router can connect dissimilar networks.

a POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

20. At what layer of the OSI model does a network switch normally operate? a. Layer 2 b. Layer 3 c. Layer 4 d. Layer 5

a POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

28. The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? a. MAC (Media Access Control) address b. DAC (Data Access Control) address c. DAC (Digital Access Control) address d. PAC (Packet Access Control) address

a POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

14. What utility is the equivalent to the pathping command on a Linux system? a. mtr b. tracepath c. traceroute d. hping

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

28. What scenario describes an evil twin attack? a. A malicious access point is configured with the SSID of a non-malicious public access point. b. An attacker is actively attempting to brute force the PIN of a WPS enabled access point. c. A hacker is actively sending wireless probes to discover available wireless networks. d. A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Wi-Fi Network Security QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

29. Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m? a. Class 1 b. Class 2 c. Class A d. Class X

a POINTS: 1 DIFFICULTY: Easy REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

17. What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? a. management frames b. control frames c. data frames d. extended frames

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

20. The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation? a. multiple input-multiple output (MIMO) b. channel bonding c. frame aggregation d. spread spectrum frequency hopping

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

24. The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions? a. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) b. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) c. Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM) d. Carrier Sense Single Access with Collision Adaptation (CSSA/CA)

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

34. What optional protocol can be used in 802.11 to reserve the medium for one node's use? a. RTS/CTS (Request to Send/Clear to Send) b. RAR/CTU (Reserve Airtime Request/Clear to Use) c. HA/RA (Hold Airtime/Reserved Airtime) d. RT/FT (Request Time/Fair Time)

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

20. What statement correctly identifies the purpose of a software patch? a. A software patch is a correction, improvement, or enhancement to software. b. A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. c. A software patch involves the process of reverting to a previous version of software after attempting to upgrade it. d. A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Change Management QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.4 - Track the progress of changes made to a network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

12. How does refraction affect the propagation of a wireless transmission? a. It distorts the signal as it travels into and through a different transmission medium. b. It splits the signal into secondary waves that continue in the direction in which they split. c. It causes the signal to be returned back towards the source of the origin. d. It causes the signal to be absorbed by the refracting material.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Characteristics of Wireless Transmissions QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

17. Where is a demarc located in relation to the structured cabling of an enterprise environment? a. in the Main Distribution Frame (MDF) b. at the Intermediate Distribution Frame (IDF) c. in the work area d. between the MDF and the IDF

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

19. During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a. No more than 1 inch of the cable should be exposed. b. No less than 1 inch of the cable should be exposed. c. Each pair should be stripped of insulation so that it doesn't get caught in the jack. d. Each pair should be twisted around another pair to reduce cross talk.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

28. What is the industry standard angle for an Angle Polished Connector (APC)? a. 8 degrees b. 12 degrees c. 14 degrees d. 16 degrees

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

30. If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EUI-64 b. IEEE 802.36 c. UUID-128 d. MACin6

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

31. When creating network diagrams, what icon description typically represents a network router? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.2 - Create and analyze network diagrams DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

24. What is routing protocol convergence time defined as? a. It is the time it takes for the protocol to recognize the best path in the event of a network change. b. It is the time it takes for the protocol to recognize that a change has occurred. c. It is the amount of time it takes after initial configuration of the protocol for all routes to become known. d. It is the amount of time involved in configuration of the routing protocol.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

30. What federal agency is charged with safety and health in the workplace? a. Occupational Safety and Health Administration (OSHA) b. Workplace Safety and Hazard Administration (WSHA) c. Office Safety and Standards Department (OSSD) d. Hazardous Materials and Safety Management (HMSM)

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

12. What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet? a. Differentiated Services (DiffServ) b. Internet header length (IHL) c. Time to Live (TTL) d. Padding

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

22. What happens when a router receives a packet with a TTL of 0? a. The router drops the packet and sends an ICMP TTL expired message back to the host. b. The router attempts to forward the traffic on a local network. c. The router resets the TTL to 128. d. The router marks the packet as corrupted and forwards it to the next hop.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

24. Which of the following is an example of encapsulation? a. The addition of a header to data inherited from the layer above in the OSI model. b. The subtraction of a header from data inherited from the layer below in the OSI model. c. The modification of headers from a higher layer in the OSI model. d. The addition of a trailer to data inherited from the layer above in the OSI model.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

33. In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Application b. Internet c. Transport d. Link

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

15. Which statement accurately describes what near end crosstalk (NEXT) is? a. NEXT is crosstalk that occurs between wire pairs near the source of a signal. b. NEXT is crosstalk that occurs near the opposite end of a signal source. c. NEXT is crosstalk that occurs when an EMI source is near the data signal source. d. NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

19. What statement describes a transmission flaw that is occurring due to attenuation? a. A customer modem is continuously losing signal due to large distance from the transmitting device. b. A network switch interface is dropping due to a powerful radio transmitter in the adjacent room. c. A customer's video conferencing application is experiencing delay in audio and video that comes and goes. d. Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

39. What statement correctly describes "jitter"? a. Jitter is what happens when packets experience varying amounts of delay and arrive out of order. b. Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter. c. Jitter is the fluctuation of a signal's strength as it travels away from its source. d. Jitter is the transmission of signal onto unintended pairs in a copper cable.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

28. What tcpdump command can be used to filter out all traffic except SSH traffic? a. tcpdump port 22 b. tcpdump -p 22 c. tcpdump only ssh d. tcpdump -f +ssh

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

37. You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network? a. The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID. b. The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g. c. The client is using a network adapter with outdated firmware. d. The client is only able to get line of sight with an omnidirectional antenna.

a POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Wi-Fi Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

12. In general, how much can a twisted-pair's cable be bent before data transmission may be impeded? a. No more than two times the diameter of the cable. b. No more than four times the diameter of the cable. c. No more than ten times the diameter of the cable. d. Twisted pair cable has a near infinite bend radius.

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

24. When terminating an Ethernet cable, about how far should the cable sheath extend into the plug? a. 1/2 inch b. 3/8 inch c. 4/5 inch d. 1/5 inch

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

26. Which of the following statements about fiber-optic cabling is accurate? a. Fiber-optic cabling has a low resistance to signal noise. b. Light experiences virtually no resistance when traveling through glass. c. Fiber-optic cable is cheaper than shielded twisted pair cabling. d. The maximum length for a fiber segment is 20km.

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.3 - Compare the benefits and limitations of various networking media DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

18. Which of the following IPv6 addresses represents a global unicast address? a. FE80::10 b. 2000::/3 c. FC00::/7 d. FD00::/8

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

29. What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. global address b. link local address c. multicast address d. anycast address

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

19. An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-open b. fail-close c. fail-tolerant d. fail-dynamic

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

23. In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer describes the interface between two applications, each on separate computers. b. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. c. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. d. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

39. What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate? a. Only tracert can send UDP messages for tracing a path. b. By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages. c. The Windows tracert utility does not place limits on the TTL of repeated trial messages. d. The tracert utility expects an ICMP port unreachable error message as the final reply to a trace.

b POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

15. What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP? a. broadcast frame b. beacon frame c. announcement packet d. alert message

b POINTS: 1 DIFFICULTY: Easy REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

11. At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. IP addresses b. port numbers c. domain names d. MAC addresses

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Addressing Overview QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

14. In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting? a. at least 3 inches b. at least 3 feet c. at least 6 feet d. at least 12 feet

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

32. Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination? a. Exposing more cable than necessary can cause corrosion of the copper wire. b. The exposure of the cable can cause transmission interference between wires. c. The cable will lose its conductive properties. d. The termination will fail over time due to oxidation.

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

38. What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system? a. IEEE 802.3 b. TIA/EIA-568 c. ITU 922 d. ISO 9001

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

39. A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term? a. VoIP router b. VoIP PBX (private branch exchange) c. VoIP LEC (local exchange carrier) d. VoIP ATB (analog telephone branch)

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

40. Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable? a. RG-59 b. RG-6 c. RG-20 d. LRG-50

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

34. In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. A record b. AAAA record c. PTR record d. TXT record

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

40. In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. In the hosts file on the local machine. b. On the DNS root servers. c. On DNS caching-only servers. d. In the organization's forward lookup zone.

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

25. In the classful addressing scheme, what range of network addresses is considered a Class B? a. 1.x.y.z to 126.x.y.z b. 128.0.x.y to 191.255.x.y c. 192.0.0.x to 223.255.255.x d. 224.x.y.z to 255.x.y.z

b POINTS: 1 DIFFICULTY: Easy REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

13. In Linux, what command can be used for viewing and setting wireless interface parameters? a. ifconfig b. iwconfig c. wlanconf d. wifid

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Implementing a Wi-Fi Network QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.4 - Implement a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

24. What part of a MAC address serves as the extension identifier, or device ID? a. The first 24 bits of the MAC address. b. The last 24 bits of the MAC address. c. The first 12 bits of the MAC address. d. The last 12 bits of the MAC address.

b POINTS: 1 DIFFICULTY: Easy REFERENCES: MAC Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.1 - Find the MAC address of a computer and explain its function in network communications DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

21. What type of diagram is a graphical representation of a network's wired infrastructure? a. network diagram b. wiring schematic c. topology map d. system diagram

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.2 - Create and analyze network diagrams DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

23. What is the name of the GUI front end that is available for the Nmap utility? a. GUINmap b. Zenmap c. iMap d. VizMap

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.2 - Create and analyze network diagrams DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

28. Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? a. master service agreement b. master license agreement c. service-level agreement d. memorandum of understanding

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

16. If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. bus topology b. star topology c. star bus topology d. mesh topology

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

19. You are connected to your network's Cisco router, and need to verify the route table. What command should you enter? a. route print b. show ip route c. route -a d. show route-table

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

30. When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable? a. 8 b. 15 c. 20 d. 32

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

35. In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? a. fire extinction agent b. fire suppression agent c. extinguishing medium d. eliminating factor

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

16. In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received? a. urgent pointer b. sliding-window c. URG flag d. PSH flag

b POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

37. What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? a. MAC address b. IP address c. port address d. autonomous system address

b POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

13. What command will list only current connections, including IP addresses and port numbers? a. show ip stats b. netstat -n c. netstat -s d. portstat

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

29. Which command will produce statistics about each message transmitted by a host, separated according to protocol type? a. ipconfig -s b. netstat -s c. ipstat -a d. netstat -an

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

32. What kind of tool can you use to measure voltage on a cable length? a. continuity tester b. multimeter c. time domain reflectometer d. light meter

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Tools QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.4 - Select and use the appropriate tool to troubleshoot common cable problems DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

27. What type of device can be used to assess the quality of a wireless signal? a. Wi-Fi analyzer b. spectrum analyzer c. channel scanner d. frequency hopper

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Wi-Fi Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

40. Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of? a. guest network profile b. captive portal c. WPA2-Enterprise d. browser hijacking

b POINTS: 1 DIFFICULTY: Easy REFERENCES: Wi-Fi Network Security QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.5 - Secure a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

16. In IEEE terminology, a group of stations that share an access point are said to be part of which of the following? a. extended service set b. basic service set c. modified service set d. generic service set

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

18. Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames? a. management frames b. control frames c. data frames d. extended frames

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

35. In an 802.11 data frame, what is the maximum amount of data that can be sent? a. 1500 bytes b. 2312 bytes c. 4582 bytes d. 9000 bytes

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

36. Which of the following statements regarding the 802.11ac standard is NOT accurate? a. The standard was officially approved in early 2014. b. 802.11ac access points function more like a hub than a switch. c. 802.11ac access points can handle multiple transmissions at one time over the same frequency. d. 802.11ac operates on the 5-GHz band.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

11. Diffraction has what affect on a wireless signal's propagation? a. The signal is redirected into multiple directions. b. The signal is split into secondary waves that continue in the direction in which they split. c. The signal is returned back towards the source of the original signal. d. The signal is completely absorbed by the diffracting material.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Characteristics of Wireless Transmissions QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.1 - Identify and describe various types of wireless networking characteristics DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

36. What statement regarding the Power Over Ethernet standards is inaccurate? a. The amount of power provided is 15.4 watts for standard PoE devices. b. Power over Ethernet requires CAT6 or better copper cable. c. Electric current may run over a pair of wires used for data transmission. d. A device that supplies power for PoE is known as power sourcing equipment.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

21. Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. Both IPv4 and IPv6 protocols will be used on the network. c. The router serving the network will have a redundant spare. d. The network will exist on two separate segments, separated by a proxy.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

30. When creating network diagrams, what icon description typically represents a network firewall? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.2 - Create and analyze network diagrams DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

40. In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a. Active Directory Federated Users (AD FU) b. Active Directory Domain Services (AD DS) c. Automated Directory Network Services (AD NS) d. Windows Named Resource Services (WN RS)

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Models QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

32. What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Ports and Sockets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

31. What is the minimal amount of voltage required to damage an electrical component? a. 5 volts b. 10 volts c. 100 volts d. 1500 volts

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

21. What is the purpose of the checksum TCP field? a. It specifies special options, such as the maximum segment size a network can handle. b. It allows the receiving node to determine whether the TCP segment became corrupted during transmission. c. It identifies the data segment's position in the stream of data segments being sent. d. It confirms receipt of data via a return message to the sender.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

35. By default, what is the MTU size on a typical Ethernet network? a. 1492 bytes b. 1500 bytes c. 1518 bytes d. 1522 bytes

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

20. Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines? a. time division multiplexing b. statistical time division multiplexing c. frequency division multiplexing d. wavelength division multiplexing

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

17. On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. ip show d. if status

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Address Problems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

38. What command can be used to check a domain computer's time source from a Command Prompt window? a. date /source b. w32tm /query /source c. ntpd show source d. time --source

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Address Problems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

38. When troubleshooting wireless issues, what statement is accurate? a. A WPA key can be used to associate with a WEP configured access point. b. Access points that use overlapping channels can cause interference with each other if they are too close. c. Simultaneous wired and wireless network connections do not affect the ability to communicate on the network. d. Access point power levels should always be configured to output as much power as possible.

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Wi-Fi Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

32. Near-field communication devices send data at what fixed frequency? a. 8.65 MHz b. 13.56 MHz c. 21.39 MHz d. 47.1 MHz

b POINTS: 1 DIFFICULTY: Moderate REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

31. The 1000Base-LX utilizes light with what wavelength? a. 850 nanometers b. 1200 nanometers c. 1300 nanometers d. 1550 nanometers

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

23. You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

27. You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? a. EIGRP will increase CPU utilization on core routers. b. Increased traffic will result from the switch to EIGRP. c. EIGRP may not be available on non-Cisco routers. d. Convergence time will be increased with EIGRP.

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

40. In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate? a. The hosts that share the same MAC addresses will be completely unable to communicate with any other devices. b. The hosts will generate new MAC addresses until the conflict is resolved. c. The hosts will still send and receive traffic, but traffic may not always reach the correct destination. d. The network switch will eventually crash due to being unable to properly forward traffic.

c POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

25. What mail protocol is used to send mail messages to a server? a. POP3 b. IMAP4 c. SMTP d. HTTPS

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Client-Server Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

16. What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? a. horizontal cross connect b. patch cable c. vertical cross connect d. diagonal cabling

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

12. What is the maximum supported throughput of a CAT6 cable? a. 100 Mbps b. 1 Gbps c. 10 Gbps d. 100 Gbps

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

11. What is the minimum category of UTP cable required in order to support Gigabit speeds? a. Cat 3 b. Cat 5 c. Cat 5e d. Cat 6

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

27. A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands? a. fiber stripper b. fiber snipper c. fiber cleaver d. fiber saw

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.4 - Select and use the appropriate tool to troubleshoot common cable problems DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

16. What text editor can be used on Linux to view and edit the contents of a configuration file? a. Notepad b. Microsoft Word c. vim d. edit

c POINTS: 1 DIFFICULTY: Easy REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

15. What is a defining characteristic of a bus topology based network? a. Devices are connected to two adjacent devices, and communication priority is granted by a token. b. Devices are connected directly to a centralized networking device, known as a network switch. c. Devices are daisy-chained together in a single line. d. Devices are directly attached to a network router, which forwards data to intended destinations.

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Network Hardware QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.3 - Describe various networking hardware devices and the most common physical topologies DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

31. Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. UDP 161 c. TCP 3389 d. UDP 10000

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Ports and Sockets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

36. What routing metric affects a path's potential performance due to delay? a. theoretical bandwidth b. MTU c. latency d. load

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

36. In the United States, who is able to activate the Emergency Alert System at the national level? a. Any U.S. state or territory b. The Federal Bureau of Investigation c. The President d. Local law enforcement

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

11. What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Connection-oriented Protocol b. Sequencing and checksums c. Framing d. Flow Control

c POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

18. The IP connectionless protocol relies on what other protocol to guarantee delivery of data? a. UDP b. ICMP c. TCP d. ARP

c POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

23. In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? a. traffic class b. group ID c. flow label d. traffic exchange

c POINTS: 1 DIFFICULTY: Easy REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

38. What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? a. HTTP b. POP3 c. SNMP d. SMTP

c POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

18. Noise that can degrade or distort a signal on a network is measured with what unit? a. joules b. volts c. decibels d. farads

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

22. What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig c. ping d. route

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Address Problems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

39. If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use? a. spectrum analyzer b. protocol analyzer c. Wi-Fi analyzer d. air scanner

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Troubleshooting Wi-Fi Networks QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.6 - Troubleshoot a Wi-Fi network DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

30. Healing messages are a feature of what smart home protocol? a. ZigBee b. Bluetooth c. Z-Wave d. ANT+

c POINTS: 1 DIFFICULTY: Easy REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

19. How does the 802.11 data frame indicate how a large packet should be fragmented? a. It uses the preamble header to estimate the ideal packet size. b. The frame check sequence dictates the calculated packet size. c. The sequence control field indicates how packets will be subdivided. d. The duration field determines how long the station can transmit a packet, which then determines how it is divided.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: 802.11 WLAN Standards QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.3 - Explain 802.11 standards and innovations DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

33. What does backbone cabling consist of? a. Short length cables with connectors at both ends. b. It is cabling that connects workstations to the closest data room and to switches housed in the room. c. The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs. d. The shielded cables that are used for high data transmission rates between an organization and an ISP.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

34. Which of the following is NOT a best practice when performing cable management? a. A cable tester should be used to verify that each segment of cable is transmitting reliably. b. Cable should not be placed across a floor where they might be damaged by traffic. c. Cable ties should be pulled tightly to keep cables from moving around in a bundle. d. Grounding requirements should be followed when running cables.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

23. A Fast Ethernet connection utilizes what pins on an RJ-45 plug? a. 1, 2, 4, 5 b. 1, 2, 3, 5 c. 1, 2, 3, 6 d. 1, 2, 7, 8

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

25. What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling? a. 100Base-T b. 1000Base-T c. 10GBase-T d. 10TBase-T

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

30. Which of the following statements correctly describes the SFP+ transceiver? a. SFP+ provides the same function as GBICs and is more compact. It is theoretically capable of 5 Gbps. b. SFP+ supports up to 10 Gbps and is slightly larger than SFP, with lower power consumption than XFP. c. SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps. d. SFP+ complies with the 802.3ba standard, allowing four channels in a single transceiver and supporting up to 40 Gbps data rates.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

24. What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer? a. statement of work b. memorandum of understanding c. service-level agreement d. master service agreement

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

15. Which statement regarding the Border Gateway Protocol (BGP) is accurate? a. BGP is limited to a single autonomous system. b. BGP is exclusively a distance-vector protocol. c. BGP utilizes TCP for communicating updates. d. BGP is a more advanced version of OSPF.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

32. When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. catastrophic failure b. interrupting failure c. upset failure d. temporary failure

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

33. What IPv6 field is similar to the TTL field in IPv4 packets? a. flow label b. next header c. hop limit d. distance vector

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

12. What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Application Layer b. Presentation Layer c. Session Layer d. Transport Layer

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

14. What statement accurately reflects what occurs when a message is too large to transport on a network? a. The message is discarded and must be sent again. b. The message is sent anyway, and is received by the destination as garbage data. c. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). d. An ICMP error is generated, and the application must reformat the data for transmission.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

27. The TCP and UDP protocols both exist at what layer of the OSI model? a. Application b. Presentation c. Transport d. Network

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

29. In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Application b. Network c. Physical d. Data Link

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

16. What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment? a. statistical time division multiplexing b. dense wavelength division multiplexing c. coarse wavelength division multiplexing d. spaced wavelength division multiplexing

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

14. What command can you utilize to display TCP/IP configuration information for each network adapter installed? a. ipconfig /show b. ipconfig /list c. ipconfig /all d. ipconfig /full

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Address Problems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

39. A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /renew b. ipconfig /release c. ipconfig /flushdns d. ipconfig /refresh

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Address Problems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

31. When using RFID, what is an ARPT (Active Reader Passive Tag)? a. It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely. b. It is a tag that requires an active reader, but still contains a battery in the tag. c. It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission. d. It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.

c POINTS: 1 DIFFICULTY: Moderate REFERENCES: Wireless Standards for the IoT (Internet of Things) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 6.2 - Explain the various wireless standards that support the Internet of Things DATE CREATED: 1/27/2018 1:21 PM DATE MODIFIED: 1/27/2018 1:21 PM

18. What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? a. network interface device b. main distribution frame c. intermediate distribution frame d. entrance facility

d POINTS: 1 DIFFICULTY: Difficult REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

28. When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 67 b. port 68 c. port 546 d. port 547

d POINTS: 1 DIFFICULTY: Difficult REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

34. What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. b. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. c. The packet will be dropped silently, requiring the communicating application try again. d. The packet will be divided into smaller packets using fragmentation.

d POINTS: 1 DIFFICULTY: Difficult REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

37. You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig --server 8.8.8.8 --type=mx mycompany.com b. dig -s 8.8.8.8 -t mx mycompany.com c. dig query 8.8.8.8 domain mycompany.com type mx d. dig @8.8.8.8 mycompany.com MX

d POINTS: 1 DIFFICULTY: Difficult REFERENCES: Troubleshooting Address Problems QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.5 - Use command-line tools to troubleshoot common network problems DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

39. The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. File Transfer Protocol (FTP) b. Secure Sockets Layer (SSL) c. Secure Shell (SSH) d. Remote Desktop Protocol (RDP)

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Client-Server Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

40. What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block? a. wire crimper tool b. block trimmer tool c. wire cinching tool d. punchdown tool

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

15. Which of the following IP addresses would be a loopback IP address? a. 169.254.0.1 b. 192.168.1.1 c. 224.0.0.1 d. 127.0.0.1

d POINTS: 1 DIFFICULTY: Easy REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

19. Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. NTP b. LDAP c. TFTP d. SIP

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Ports and Sockets QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.3 - Explain the purpose of ports and sockets, and identify the ports of several common, network protocols DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

25. Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? a. interior gateway protocols b. border gateway protocols c. distance vector protocols d. link-state protocols

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

26. Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols? a. IS-IS b. BGP c. OSPF d. EIGRP

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

37. Which statement does NOT accurately describe characteristics of the OSPF protocol? a. OSPF maintains a database of other routers' links. b. OSPF has no hop limits on a transmission path. c. OSPF provides low network overhead. d. OSPF requires very little CPU or memory resources.

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

38. Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for? a. The autonomous systems used by an organization. b. An entire network consisting of various network devices. c. The administrative boundaries of an organization. d. An IS-IS capable network router.

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Routers and How They Work QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.3 - Explain how routers manage internetwork communications DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

11. HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 4 b. Layer 5 c. Layer 6 d. Layer 7

d POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

13. The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. packet b. data c. bit d. frame

d POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

22. At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport d. Network

d POINTS: 1 DIFFICULTY: Easy REFERENCES: The Seven-Layer OSI Model QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.4 - Describe the seven layers of the OSI model DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

38. Signals that can travel in only one direction on a medium are referred to as what type of signal? a. full-duplex b. duplex c. half-duplex d. simplex

d POINTS: 1 DIFFICULTY: Easy REFERENCES: Transmission Basics QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.1 - Explain basic data transmission concepts, including throughput, bandwidth, multiplexing, and common transmission flaws DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

12. With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? a. ftp1 b. ftp1.dallas c. ftp1.dallas.mycompany. d. mycompany.com

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Addressing Overview QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

26. What is the most popular web server application? a. Microsoft Internet Information Services b. NGINX c. Lighttpd d. Apache

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Client-Server Applications QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.2 - Identify types of applications and protocols used on a network DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

11. When planning horizontal cabling, what is the maximum allowable distance that can be used? a. 100 feet b. 300 meters c. 1,000 feet d. 100 meters

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

36. What statement regarding main distribution frame or main distribution facilities is accurate? a. The MDF and entrance facility are always in separate rooms. b. The MDF refers to the racks holding network equipment in an organization. c. The MDF provides intermediate connection between the IDF and end-user equipment on each floor. d. The MDF is the centralized point of interconnection for an organization's LAN or WAN.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Components of Structured Cabling QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.1 - Identify and describe network and cabling equipment in commercial buildings and work areas DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

17. A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue? a. Router console ports are only used when connected to other routers. b. The router console port is providing an Ethernet connection, instead of a serial connection. c. The USB standard is incompatible with the serial connection used by the console port. d. The cable must be a rollover cable.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

21. In a coaxial cabling, what does the RG rating measure? a. The number of twists in the copper core. b. The overall thickness of the cable. c. The maximum distance the cable is rated for, in kilometers. d. The materials used for shielding and conducting cores.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Copper Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

20. What is by far the most popular DNS server software available? a. Microsoft DNS b. Dnsmasq c. Oracle Resolver d. BIND

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

33. What is the ARPA domain suffix utilized for? a. It is a specialized government restricted TLD. b. It is used to announce records for other TLDs such as .com and .net. c. It is a private TLD used for synchronization of zones between servers. d. It is used for reverse DNS queries, and holds PTR records.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Domain Names and DNS (Domain Name System) QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.4 - Describe domain names and the name resolution process DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

20. Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com? a. traceroute -i srv1.mycompany.com b. traceroute -w srv1.mycompany.com c. traceroute -o ICMP srv1.mycompany.com d. traceroute -I srv1.mycompany.com

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Troubleshooting Route Issues QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.4 - Employ various TCP/IP utilities for network discovery and troubleshooting DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

29. You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size? a. subscriber connector (SC) b. straight tip (ST) c. Mechanical Transfer-Registered Jack (MTRJ) d. local connector (LC)

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.2 - Identify and describe the physical characteristics and official standards of coaxial cable, twisted-pair cable, and fiber-optic cable, and their related connectors DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

14. Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber? a. 550m b. 300m c. 10km d. 40km

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Fiber-Optic Cable QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 5.3 - Compare the benefits and limitations of various networking media DATE CREATED: 1/27/2018 1:19 PM DATE MODIFIED: 1/27/2018 1:19 PM

26. How do routers create a broadcast domain boundary? a. They forward broadcasts only to necessary segments. b. They listen to and direct broadcast traffic. c. They only forward broadcasts that are intended for multiple subnets. d. They do not forward broadcast traffic.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

27. Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 10.0.0.0 through 10.255.255.255 b. 172.16.0.0 through 172.31.255.255 c. 192.168.0.0 through 192.168.255.255 d. 127.0.0.0 through 127.255.255.255

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: IP Addresses QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 3.2 - Configure TCP/IP settings on a computer, including IP address, subnet mask, default gateway, and DNS servers DATE CREATED: 1/27/2018 1:13 PM DATE MODIFIED: 1/27/2018 1:13 PM

29. When creating network diagrams, what icon description typically represents a network switch? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.2 - Create and analyze network diagrams DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

22. Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a. memorandum of understanding b. statement of work c. request for quote d. request for proposal

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Documentation QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 2.3 - Explain operating procedures, inventory management, labeling conventions, and business documents for a typical network DATE CREATED: 1/27/2018 1:09 PM DATE MODIFIED: 1/27/2018 1:09 PM

21. Which of the following is not one of the disadvantages of peer-to-peer networks? a. They lack scalability. b. They are not necessarily secure. c. They are impractical for connecting large numbers of computers. d. They centralize user account logins.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Network Models QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.1 - Distinguish between client-server and peer-to-peer networks DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

17. The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Toxic Chemical Safety Procedure (TCSP) b. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c. Environmental Chemical Hazard Sheet (ECHS) d. Material Safety Data Sheet (MSDS)

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: Safety Procedures and Policies QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 1.5 - Explain best practices for safety when working with networks and computers DATE CREATED: 1/27/2018 12:47 PM DATE MODIFIED: 1/27/2018 12:47 PM

31. What occurs when a collision happens on a network? a. The collision goes undetected, and data transmission continues. b. The collision will create an error in the network switch, but otherwise, no issues will occur as a result. c. Each node on the network stops transmitting, until manually told to reconnect and transmit. d. Each node on the network waits a random amount of time and then resends the transmission.

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.1 - Describe the functions of core TCP/IP protocols DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM

34. If the VLAN tag is present in an Ethernet frame, what is the maximum frame size? a. 1492 bytes b. 1500 bytes c. 1518 bytes d. 1522 bytes

d POINTS: 1 DIFFICULTY: Moderate REFERENCES: TCP/IP Core Protocols QUESTION TYPE: Multiple Choice HAS VARIABLES: False LEARNING OBJECTIVES: 4.2 - Identify how each protocol's information is formatted in a TCP/IP message DATE CREATED: 1/27/2018 1:15 PM DATE MODIFIED: 1/27/2018 1:15 PM


Ensembles d'études connexes

Marketing Segmentation, Targeting and Positioning

View Set

Great Themes of the Bible: Exam 1 and 2

View Set

Health Assessment Ch 20: Abdominal Assessment

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

Clinical Level Final Mock Exam I

View Set