NETWORK PLUS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A wiring professional terminates the ends of some coaxial cables. Which one of these connectors can the professional use? -DB-9 -BNC -LC

A Bayonet Neill-Concelman (BNC) connector is a twist and lock type of connector that is used with coaxial cable. The Lucent Connector (LC) is a small form factor fiber optic connector with a tabbed push/pull design. The small size of LC allows for higher port density. A straight tip (ST) connector is an early bayonet-style fiber connector that uses a push-and-twist locking mechanism. Most PCs use a male DB9 9-pin connector for serial communications. The 9-pin connector supports the major data and handshake (data flow control) lines needed for peripherals, such as modems or mice.

Which port will a Domain Names Server (DNS) use for record transfers over 512 bytes? - Transmission Control Protocol (TCP) port 23 - Transmission Control Protocol (TCP) port 53 - User Datagram Protocol (UDP) 69 - User Datagram Protocol (UDP) port 53

A Domain Name Server (DNS) server that need to allow large record transfers over 512 bytes will be configured to allow connections over Transmission Control Protocol (TCP) port 53 A DNS server is usually configured to listen for queries on User Datagram Protocol (UDP) port 53. Larger transfers (over 512 bytes) require use of TCP port 53 Telnet uses TCP port 23 by default. Telnet is terminal emulation software to support a remote connection to another computer. Trivial File Transfer Protocol (TFTP) is a connectionless protocol running over User Datagram Port 69. C: Transmission Control (TCP) port 53

A technician finishes running fiber optic cable across a large building to expand the internal network. The fiber connects to equipment in a rack with extremely limited space for a connector. Considering the situation and the types of available fiber connectors, which one will accomplish connectivity? -LC -UPC -ST -APC

A lucent connector (LC) is a small form factor version of the SC push-pull fiber optic connector. It is available in simplex and duplex versions. SFP+ used the LC form factor but runs at speeds of 10Gb. A subscriber connector (SC) is a push/pull connector used with fiber optic cabling. Angled physical contact (APC) faces are angled for a tighter connection than other fiber connectors. These connectors are usually deployed when the fiber is being used to carry analog signaling, as in cable access TV (CATV) networks. The ultra physical contact (UPC) fiber connector defines that the cable and connector are polished to the highest standard (a higher standard than with PC). CORRECT: LC

A wiring professional finishes wiring a building with twisted pair cabling for a new Ethernet network. Where do the wires running throughout the building centrally terminate? - Single-mode - FDP - Patch panel - Duplex

A patch panel consolidates and connects all Ethernet cabling runs to a central location. Patch cables then connect the patch panel runs to a network switch. 110 block patch panels are the most popular for LANs. Duplex refers to two-way communication. For example, if a link is full duplex, one pair is used for transmitting and the other for receiving. Permanent cables are run through a conduit to wall ports at the client access end and a fiber distribution panel (FDP) at the switch end. Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics. Correct: Patch Panel

A building inspector reviews the network cabling in a building. The inspector's report indicates that cabling found in the drop-ceiling is not fire retardant. To satisfy the requirements for replacement, which type of rated cable do wiring experts install? -Crossover - Patch Panel - Plenum -Duplex

A plenum is a false ceiling used by HVAC systems and wiring. Plenum-rated cable is fire retardant. Plenum-rated cable uses treated PVC or fluorinated ethylene polymer. A crossover cable is created by wiring the connectors at each end differently, so that Tx (transmit) on one connector goes directly to Rx (receive) on the other connector and vice versa (TX/RX reverse). A patch panel consolidates and connects all Ethernet cabling runs to a central location. Patch cables then connect the patch panel runs to a network switch. 110 block patch panels are the most popular for LANs. Duplex refers to two-way communication. For example, if a link is full duplex, one pair is used for transmitting and the other for receiving. CORRECT: Plenum

Explain how the Simple Authentication and Security Layer (SASL) provides binding in Lightweight Directory Access Protocol Secure (LDAPS) - The client supplies the Domain Name (DN) and password. - The server authenticates to the client and configures a secure channel for communications. - The client and server negotiate the use of a supported security mechanism. - The directory grants anonymous access.

Authentication, referred to as binding to the server, can be implemented in several ways for Lightweight Directory Access Protocol Secure (LDAPS). The Simple Authentication and Security Layer (SASL) completes binding by the client and server negotiating the use of a supported security mechanism. If no authentication is used, anonymous access is granted to the directory. Simple authentication performs binding by the client supplying the Domain Name (DN) and password. Secure Sockets Layer (SSL)/Transport Layer Security (TLS) can also be used for authentication. SSL/TLS provides a means for the server to authenticate to the client and configure a secure channel for communications. Correct: The client and server negotiate the use of supported security mechanism

What are the main uses of Secure Shell (SSH)? Pick 2 - Trivial File Transfer (TFTP) - Secure File Transfer (SFTP) - Network Level Authentication (NLA) - Remote administration

C1: Secure Shell (SSH) is the principal means of obtaining secure remote access to a UNIX or Linux server. One of the main uses of SSH is for Secure File Transfers (SFTP). C2: Remote administration is another main use of SSH. Administrators are able to use SSH to obtain secure remote access. The Trivial File Transfer Protocol (TFTP) is another file transfer service, but unlike File Transfer Protocol (FTP), it is a connectionless protocol. TFTP does not provide the guaranteed delivery offered by FTP. Network Level Authentication (NLA) requires the client to authenticate before a full remote sessions is started. A serer that does not enforce NLA can be subject to attacks.

A licensed wiring professional runs Cat 6A cable in lengths under 55 meters in an office building. What specification of cabling does the professional install? -1000BaseLx -10GBaseT -100BaseT - 1000BaseT

C: 10GBaseT Ethernet specifies speeds of 10 gigabits. Cat 6, 6A, and 7 twisted pair cables fall under the 10GBaseT Ethernet specification. 1000BaseT Ethernet specifies speeds of 1 gigabit. Cat 5e, 6, and 6A twisted pair fall under this specification. It is important to note that Cat 6 and Cat 6A fall under multiple specifications using criteria such as cable length. 100BaseT is a legacy cabling standard that supports speeds up to 100 megabits per second. Cat 3 cabling was common 100BaseT implementation. 1000Base-LX is a specification for gigabit Ethernet net using fiber optic cabling.

Network equipment in a rack system has limited in-front facing space with the door closed. A technician uses small form-factor connectors to connect a fiber cable. After evaluating the choices, predict the correct fiber connectors for the system. - APC -ST -LC -UPC

C: A lucent connector (LC) is a small form factor version of the SC push-pull fiber optic connector. It is available in simplex and duplex versions. A subscriber connector (SC) is a push/pull connector used with fiber optic cabling. Angled physical contact (APC) faces are angled for a tighter connection than other fiber connectors. These connectors are usually deployed when the fiber is being used to carry analog signaling, as in cable access TV (CATV) networks. The ultra physical contact (UPC) fiber connector defines that the cable and connector are polished to the highest standard (a higher standard than with PC).

A wiring professional finishes wiring a building with twisted pair cabling for a new Ethernet network. Where do the wires running throughout the building centrally terminate? -Duplex - SIngle-Mode -FDP -Patch panel

C: A patch panel consolidates and connects all Ethernet cabling runs to a central location. Patch cables then connect the patch panel runs to a network switch. 110 block patch panels are the most popular for LANs. Duplex refers to two-way communication. For example, if a link is full duplex, one pair is used for transmitting and the other for receiving. Permanent cables are run through a conduit to wall ports at the client access end and a fiber distribution panel (FDP) at the switch end. Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics.

An IT manager drafts a wiring plan for a company's internal network overhaul. The plan corrects mistakes of the past and addresses all proper codes related to building wiring. In regards to standards and ratings, which option relates to fire retardant requirements? -Duplex - Crossover -Patch Panel - Plenum

C: A plenum is a false ceiling used by HVAC systems and wiring. Plenum-rated cable is fire retardant. Plenum-rated cable uses treated PVC or fluorinated ethylene polymer. A crossover cable is created by wiring the connectors at each end differently, so that Tx (transmit) on one connector goes directly to Rx (receive) on the other connector and vice versa (TX/RX reverse). A patch panel consolidates and connects all Ethernet cabling runs to a central location. Patch cables then connect the patch panel runs to a network switch. 110 block patch panels are the most popular for LANs. Duplex refers to two-way communication. For example, if a link is full duplex, one pair is used for transmitting and the other for receiving.

A laptop connects to a web server on the Internet, and the service provider then assigns the laptop an IP (Internet Protocol) address. Similarly, the web server to which the laptop is communicating, has an IP address. At which layer of the Open Systems Interconnection (OSI) model are these two devices functioning? -Layer 4 -Layer 5 -Layer 2 -Layer 3

C: An Internet Protocol (IP) address lives at layer 3 (the Network layer). Because both the laptop and the web server use an IP at layer 3, they are capable of communicating with one another. The Data Link layer (layer 2) permits the transmission of data to layer 3, where it is addressed and routed. At the Transport layer (layer 4), on the sending host, data from the upper layers is packaged as segments, tagged with the application's port number, and then passed to the Network layer for delivery. Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages occurs in layer 5 (the Session layer).

What is the name of data unit used at the Open System Internconnection (OSI) physical layer? -Bit -Frame -Packet -Segment

C: Bits are the data unit used at the Physical Layer. The network, at layer 1, transmits the stream of bits making up the Ethernet frame from the Data Link layer. Frames are the encapsulation unit at the Data Link layer. Layer 2 puts an IP packet into an Ethernet frame, then transmits the stream of bits making up the frame over the network at layer 1. At the Transport layer (layer 4) on the sending host, data from the upper layers is packaged as a series of layer 4 PDUs, referred to as segments. Packets are the data unit used at the Network layer. The general convention is to describe PDUs packaged at the Network layer as packets or datagrams.

An engineer has a task to survey an old building and determine the current network infrastructure. Building owners state that some cabling is from a recent install. The engineer achieves a speed of 10 Gbps while testing the cable up to 100 meters and also determines the cable to be well shielded. Based on the engineer's findings, the cabling meets what specification? -Cat3 -Cat 7 - Cat5e -Cat 6

C: Cat 7 cable is fully screened and shielded (S/FTP) and rated for 10GbE applicationsup to 100 m (328 feet). The cable supports transmission frequencies up to 600 MHz at 10 Gbps. Cat 5e is tested at 100 MHz (like Cat 5 was) but to higher overall specifications for attenuation and crosstalk, meaning that the cable is rated to handle Gigabit Ethernet (1 Gbps) throughput. Cat 6 can support 10 Gbps speeds only over shorter distances—nominally 55 meters, but oftenless if cables are closely bundled together.Cat 3 is an old specification. It is not used for modern implementations but may be found in older installations. Cat 3 supports speeds up to 10 Mbps.

Which technology offers a mode for simultaneous two-way communication? -Crossover - Multimode - Duplex

C: Duplex is a communication configuration. Full-duplex refers to a communication type such as network links that allow simultaneously sending and receiving. Most network links are full-duplex. Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns. Multimode fiber is inexpensive to deploy compared to single mode fiber. As such, it does not support long distances as single mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs). A crossover cable is created by wiring the connectors at each end differently, so that the transmit on one connector goes directly to receive on the other connector and vice versa.

What protocol is an alternative to the Session Initiation Protocol (SIP)? - Real-time Transport Protocol (RTP) - H.323 Protocol - Common Address Redundancy Protocol (CARP) - Real- time Transport Protocol Control (RTCP)

C: H.323 is an alternative session control protocol to the Session Initiation Protocol (SIP). Endpoints, known as terminals, connect to gatekeepers to request services. The Real-time Transport Protocol (RTP) enables the delivery of a stream of media data via the User Datagram Protocol (UDP), while implementing some of the reliability features usually associated with the Transmission Control Protocol (TCP). The RTP Control Protocol (RTCP) is used by RTP to monitor the quality of the connection and to provide reports to the endpoints. The Common Address Redundancy Protocol (CARP) handles Virtual Internet Protocol (VIP) addresses for load balancing.

An IT engineer considers optical mode OM1 or OM2 cables for a project. The project requires cables that are rated for applications up to 1 Gbps and use LED transmitters. Of the following choices, which type of cable does the engineer select to use? -Multimode -Bidirectional -Single-mode -Duplex

C: Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support long distances as single-mode. Multimode uses uses light emitting diode (LED) technology. Single-mode cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics. Duplex is a communication configuration. Full duplex refers to a communication configuration/type such as network links that allow simultaneously sending and receiving. Most network links are full-duplex.Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns.

An engineer uses fiber optic cable for a run within a building. Which type of transceiver does the engineer use to achieve 40 Gbe speed? -QSFP -RG-59 - SFP+ -GBIC

C: Quad Small Form Factor Pluggable (SFP) (QSFP and QSFP+) is a transceiver form factor designed to support 40 GbE plus other high bandwidth applications (including InfiniBand and SONET). Essentially it combines 4 SFP or SFP+ links. Small Form Factor Pluggable (SFP) uses Lucent Connectors (LC) connectors and is also designed for Gigabit Ethernet. SFP+ is an updated specification to support 10GbE but still uses the LC form factor. Gigabit Interface Converter (GBIC) form factor, which used SC ports and was designed (as the name suggests) for Gigabit Ethernet. A cable broadband Internet connection is usually available along with Cable Access TV (CATV). This type of service uses coaxial cable (RG-6 or RG-59).

Which protocol uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session starts? -Telnet - Remote Desktop Protocol (RDP) - Secure Shell (SSH) - Virtual Network Computing (VNC)

C: Remote Desktop Protocol (RDP) is Microsoft's protocol for operating remote Graphical User Interface (GUI) connections to a Windows machine. RDP uses Network Level Authentication (NLA) which requires the client to authenticate before a full remote session is started. During a Telnet connection, the password and other communications are not encrypted and therefore could be vulnerable to packet sniffing and other attacks. Secure Shell (SSH) is the principal means of obtaining secure remote access to a UNIX or Linux server. The server's host key is used to set up a secure channel for the client to submit authentication credentials. Virtual Network Computing (VNC) is a freeware product with similar functionality to RDP. There is no connection security with this product.

An engineer installs fiber cable between two buildings on a large company campus. Which type of fiber optic cable does the engineer use? - Single-mode -Multimode -LC F-type

C: Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics. Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support high signaling speeds or long distances as single-mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs). Some coax installations use F-type connectors. A broadband cable Internet access service is likely to use this connector. F-connectors come in a secure screw-on form or as a non-threaded slip-on connector and are used with RG-59 and RG6 coaxial cable. A Lucent Connector (LC) is a small-form-factor fiber connector with a tabbed push/pull design.

Host A is communicating with Host B. Host A uses the American Standard Code for Information Interchange (ASCII) and Host B uses Unicode. The clients agree to translate the communication to ASCII. What layer of the Open System Interconnection (OSI) model does the agreement and translation occur? - Session -Application -Presentation -Transport

C: The Presentation layer (Layer 6) transforms data between the format required for the network and the format required for the application. For example, the Presentation layer is used for character set conversion. The Application layer (Layer 7) receives the translated data. This protocol does not encapsulate any other protocols or provide services to any protocol. The Session layer (Layer 5) represents the dialog control functions that administer the process of establishing the dialog, managing data transfer, and then ending the session. The Transport layer (Layer 4) identifies each type of network application by assigning it a port number.

A Simple Network Management Protocol (SNMP) agent informs the monitor of a port failure. Analyze the functions of an SNMP agent to determine what command the monitor uses for this notification. - Set - Get -Walk - Trap

C: The Trap command is used when the agent informs the monitor of a notable event, such as a port failure. The threshold for triggering traps can be set for each value. The Get command is used for the software to query the agent for a single Object Identifier (OID). This command is used by the monitor to perform regular polling. The monitor can be used to change certain variables using the Set command. The monitor can walk a Management Information Base (MIB) subtree by using multiple Get and Get Next commands.

A wiring expert runs new Ethernet cabling in an office. The chosen cable type allows for distances of 100 meters (328 feet) with speeds of 10 Gbps, fully screened and shielded. Based on the characteristics of the standard Ethernet cable categories, which should the expert install? - Cat 7 - Cat 5e - Cat 3 - Cat 6

Cat 7 cable is fully screened and shielded (S/FTP) and rated for 10GbE applicationsup to 100 m (328 feet). The cable supports transmission frequencies up to 600 MHz at 10 Gbps. Cat 5e is tested at 100 MHz (like Cat 5 was) but to higher overall specifications for attenuation and crosstalk, meaning that the cable is rated to handle Gigabit Ethernet (1 Gbps) throughput. Cat 6 can support 10 Gbps speeds only over shorter distances—nominally 55 meters, but oftenless if cables are closely bundled together. Cat 3 is an old specification. It is not used for modern implementations but may be found in older installations. Cat 3 supports speeds up to 10 Mbps. CORRECT: Cat 7

A Router downloads configuration files over User Datagram Protocol (UDP) port 69. The router does not have access to browse the directory or to delete files. Analyze File Transfer Protocols (FTPs) and determine what protocol router is using. - File Transfer Protocol over Secure Sockets Layer (SSL) - Active File Transfer Protocol (FTP) - Trivial File Transfer Protocol (TFTP) - Secure File Transfer Protocol (SFTP)

Correct: The Trivial File Transfer Protocol (TFTP) is a connectionless protocol that runs over User Datagram Port (UDP) port 69. TFTP supports reading and writing files, not directory browsing or file deletion. Secure FTP (SFTP) runs over Transmission Control Protocol (TCP) port 22. SFTP addresses the privacy and intergrity issues of FTP by encrypting the authentication and data transfer. FTP connects to TCP port 21 on an FTP sever and opens a dynamic client port number (N). In active mode, the client sends a PORT command specifying the chosen data connection port number (typically N+1). FTP over Secure Sockets Layer (SSL) uses either Explicit Transport Layer Security (FTPES) or Implicit Transport Layer Security (FTPS) for secure communication.

A network link offers simultaneous communications in each direction. Of the following choices, which defines this functionality? -Straight-through -Duplex -Bidirectional -Multimode

Duplex is a communication configuration. Full-duplex refers to a communication type, such as network links, that allow simultaneously sending and receiving. Most network links are full-duplex. Straight-through refers to cabling, such as twisted pair cabling, where pins on one end of the cable match the pins on the opposite end. Multimode fiber is inexpensive to deploy compared to single mode fiber. As such, it does not support long distances as single mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs). Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns. CORRECT: Duplex

Which of the following protocols reside at the application layer of the Open Systems Interconnection (OSI) model? - HTTP - SMTP -IP TCP

Layer 7 (Application layer) works at the user end to interact with user applications. QoS (Quality of Service), file transfer, and email are the major popular services of the Application layer. This layer uses the following protocols: HTTP, SMTP, and FTP. Layer 3 (Network layer) performs real time processing and transfers data from nodes to nodes. The Network layer assists the IP protocol. SMTP protocol resides at the Application layer (layer 7). This is the layer at which many TCP/IP services (high level protocols) can run, which also includes FTP and HTTP. The Transport layer—or Host-to-Host layer—establishes connections between the different applications, that the source and destination hosts are communicating with, using the TCP and UDP protocols. C1: HTTP C2: SMTP

Which Open Systems Interconnection (OSI) layer assumes responsibility for managing network connections between applications? -Physical -Network -Data Link - Session

Most application protocols require the exchange of multiple messages between the client and server. This exchange of such a sequence of messages is called a session, thus, the Session layer. Sessions can work in three modes: simplex, half-duplex, or duplex. Some form of transmission or physical media creates a link between network nodes. The Physical layer of the OSI model (layer 1) is responsible for the transmission and receipt of bits from one node to another node. The Network layer (layer 3) transfers information between networks. It is the Session layer that manages connections between applications. The Data Link layer (layer 2) transfers data between nodes on the same logical segment. Whereas, the Session layer manages connections between applications.

A system administrator for ABC Company receives a request for a new account. A new employee is onboarding and will receive a Voice over Internet Protocol (VoIP) phone. The employee's name is Sam Smith and the phone number will be 1234567890. The company's domain is @abccompany.com. Develop a Session Initiation Protocol (SIP) Uniform Resource Indicator (URI). (Select two) - sip:[email protected] -sip:123456789.abccompany.com - sip:sam.smith.abccompany.com -sip:sam.smith@1234567890

Session Initiation Protocol (SIP) endpoints are the end-user devices, also known as user agents. In this scenario, the Voice over Internet Protocol (VoIP) is the SIP endpoint. One example of an SIP for this VoIP is sip:[email protected]. This is a unique URI that includes the user's name and the company domain. The URI sip:1234567890 is a unique URI that includes the user's name and the SIP endpoint phone number. The URI sip:1234567890.abcompany.com is not a valid URI. The URI must include the "@" symbol followed by the phone number or company domain. The URI sip:sam.smith.abccompany.com is not a valid URI. The URI must include the "@" symbol followed by the phone number or company domain. C1: sip:[email protected] C2: sip:sam.smith@1234567890

An engineer suggests running fiber cable for a project. Which type allows for a longer distance? - Duplex - Single-mode - Bidirectional - Multimode

Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics. Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support high signaling speeds or long distances as single-mode and is more suitable for Local Area Networks (LANs). Duplex is a communication configuration. Full-duplex refers to a communication type such as network links that allow simultaneously sending and receiving. Most network links are full-duplex. Bidirectional refers to two-way communication. Bidirectional does not imply the ability for full-duplex and may only be half-duplex. This means send and receive is taken in turns. CORRECT: Single-mode

An engineer installs fiber cable between buildings on a large company campus. Which type of fiber optic cable does the engineer use? -Single-mode -Multimode -LC -F-type

Single-mode fiber cables support data rates up to 10 Gbps or better and cable runs of many kilometers, depending on the quality of the cable and optics. Multimode fiber is inexpensice to deploy compared to single-mode fiber. As scure uch it does not support high signaling speeds or long distances as single-mode and is more suitable for Local Area Networks (LANs) than Wide Area Networks (WANs). Some coax installations use F-type connectors. A broadband cable Internet access service is likely to use this connector. F-connectors come in secure screw-on form or as a non-threaded slip-on connector and are used with RG-59 and RG6 coaxial cable. A Lucent Connector (LC) is a small-form-factor-fiber connector with a tabbed push/pull design. CORRECT: Single-mode

A system administrator identifies an issue with a server. The administrator believes the problem is with the Network Time Protocol (NTP). Analyze the NTP and determine what symptoms would lead the administrator to believe there is an NTP issue. - A server cannot access network resources and authentication is failing - A server cannot access the File/Print Sharing Service. -A server cannot request resources from a web server. - A server cannot access a previously configured mailbox

The Network Time Protocol (NTP) enables the synchronization of time-dependent applications. A server or host that is configured with the incorrect time may not be able to access network services. Authentication, and other security mechanisms will often fail if the time is not synchronized on both communicating devices. Errors are likely to be generic failed or invalid token messages. Server Message Block (SMB) provides File/Print Sharing Service. SMB allows a machine to share its files and printers to make them available. Hypertext Transfer Protocol (HTTP) enables clients to request resources from a HTTP server. The Post Office Protocol (POP) is an early example of a mailbox protocol.

An engineer creates several Ethernet cables and chooses to terminate the cable ends with orange pair using pins one and two. Considering the standard choices, which of the following does the engineer choose to implement? - RJ-11 -TIA/EIA 568b -Rj-45 - TIA/EIA 568a

There are two defined methods for terminating Ethernet connectors: T568A and T568B. While T568A is mandated, T568B is more widely deployed of the two. ANSI/TIA/EIA 568 standard defines two methods for terminating Ethernet connectors: T568A and T568B. T568A is mandated by the US government and by residential cabling standard TIA 570. RJ-45 connectors are used with 4-pair (8-wire) cables. The connectors are also referred to as 8P8C (8-position/ 8-contact). RJ-11 connectors are used with 2 or 3 pair UTP (unshielded twisted pair). There is room for six wires, but the four center wires are most commonly used. Pins 3 and 4, carry the dial one and voice circuit. Correct: TIA/EIA 568b

An engineer creates several Ethernet cables and chooses to use the widely deployed pinout standard when terminating the cable ends. Considering the standard choices, which of the following does the engineer choose to implement? -RJ-45 -RJ-11 -TIA/EIA 568a - TIA/EIA 568b

There are two defined methods for terminating Ethernet connectors: T568A and T568B. While T568A is mandated, T568B is the more widely deployed of the two. ANSI/TIA/EIA 568 standard defines two methods for terminating Ethernet connectors: T568A and T568B. T568A is mandated by the US government and by the residential cabling standard TIA 570. RJ-45 connectors are used with 4-pair (8-wire) cables. The connectors are also referred to as 8P8C (8-position/8-contact). RJ-11 connectors are used with 2 or 3-pair UTP (unshielded twisted pair). There is room for six wires, but the four center wires are most commonly used. Pins 3 and 4, carry the dial tone and voice circuit. C: TIA/ELA 568b


Ensembles d'études connexes

Chapter 35 - Loss, Death, and Palliative Care

View Set

Chapter 39: Oxygenation and Perfusion

View Set

Personal Finance Chapter 2: Financial Aspects of Career Planning

View Set