Network + Practice Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

One of the differences between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources. true or false

true

The 66 block (older type/used in telephony) and the 110 block (newer type/used in networking) are examples of punch-down blocks. true or false

true

Which of the following answers refers to Generic Routing Encapsulation (GRE)? a tunneling protocol b IEEE 802.1Q c VLAN trunking protocol (VTP) d address resolution protocol (ARP)

Tunneling protocol

An IP PBX system is an example of: a UTM appliance b peer-to-peer (P2P) architecture c unified voice services d reverse proxy

Unified voice services

T1 lines support data transfer rates of up to: a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps

1.544 mbps

What is the typical cable segment length for a copper twisted-pair Ethernet cable? a 33 meters b 55 meters c 100 meters d 250 meters

100 meters

T3 lines support data transfer rates of up to: a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps

44.736 mbps

What type of standard is LTE? a 1G b 2G c 3G d 4G

4G

What is the size of an ATM cell? a 32 bits b 53 bytes c 48 bits d 56 bytes

53 bytes

Which of the answers listed below refers to the maximum data transfer rate of an OC-12 connection? a 622.08 mbps b 1244.16 mbps c 2488.32 mbps d 9953.28 mbps

622.08 mbps

Which of the DNS database records listed below returns a 32-bit IPv4 address? a MX b AAAA c CNAME d A e PTR

A

What is the most common type of a DSL Internet access? a VDSL b ADSL c SDSL d UDSL

ADSL

An infrastructure device designed for connecting wireless/wired client devices to a network is commonly referred to as: a demarc b access point (AP) c intermediate distribution frame (IDF) d active hub

AP (access point)

Which of the answers listed below refer to examples of packet-switching communication methods? (Select 2 answers) A frame relay B POTS C T-carrier D ATM E E-carrier

ATM frame relay

Which of the following twisted-pair copper cabling types is most commonly used in modern Ethernet networks? a CAT3 b CAT4 c CAT5 d CAT5e

CAT5e

What is the minimum cabling requirement for a 10GBASE-T network? a CAT5 b CAT5e c CAT6 d CAT6A

CAT6

Which of the following answers refer to cellular technologies used in mobile networks? (Select 3 answers) a CDMA b GSM c CSMA d LTE e DWDM

CDMA GSM LTE

Which of the following solutions are used for implementing VPNs? (Select all that apply) a IPSec b GRE c SDLC d SSL/TLS e PPTP

IPSec GRE SSL/TLS PPTP

Which of the following connector types are used for connecting devices to a RS-232 port? (Select 2 answers) a RJ-11 b DB-9/DE-9 c ST d RJ-48C e DB-25 f LC

DB-25

Which of the following solutions provides an alternative to manual assignment of IP addresses? a DNS b SNMP c NAT d DHCP

DHCP (dynamic host configuration protocol)

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for example numerical IP addresses? a TCP/IP b DNS c SQL d DHCP

DNS

In order to be able to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? A ICS server B web server C DNS server D DHCP server

DNS server

Which of the answers listed below refers to a solution that allows for keeping a domain name linked to a changing IP address? a network address translation (NAT) b domain name system (DNS) c dynamic host configuration protocol (DHCP) d dynamic DNS (DDNS)

Dynamic DNS (DDNS)

Which of the following answers refers to a software or hardware that monitors network traffic and depending on the configuration settings applied to each data packet either blocks it or allows it to pass through? a HIDS b firewall c load balancer d vulnerability scanner

Firewall

A security solution implemented on an individual computer monitoring that specific system for malicious activities or policy violations is referred to as: a NIPS b MAC filter c firewall d HIDS

HIDS

Which of the following answers lists an example of a protocol used for implementing control over multiple Access Points (APs)? a LDAP b LWAPP c RTSP d MGCP

LWAPP

The characteristic feature of the Evolved High-Speed Packet Access (HSPA+) standard is the use of: a SDLC b MIMO c CSMA/CD d KVM

MIMO

Which of the technologies listed below enables the use of different types of network protocols on the same network? a LWAPP b MPLS c MLPPP d MIBS

MPLS

Which of the following DNS database records maps a domain name to a list of mail servers for that domain? a AAAA b MX c PTR d CNAME e A

MX

Which of the following solutions alleviates the problem of depleting number of routable IPv4 addresses? a DNS b NAT c GRE d VPN

NAT

Which of the following solutions provide(s) the AAA functionality? (Select all that apply) a PAP b RADIUS c TACACS+ d PPTP e MSCHAP

RADIUS TACACS

A dial-up or VPN connection allowing remote users to access corporate network requires what type of service? a RAS b PoE c NAS d WPS

RAS

Which of the following answers list examples of coaxial cabling types? (Select 2 answers) a STP b RG-59 c multimode fiber d UTP e RG-6 f single mode fiber

RG-59 RG-6

Which of the following connector types would be used for terminating a T-1 line? a RJ-45 b RJ-48C c UTP d RJ-11

RJ-48C

Which of the following answers refers to an international standard for high-speed data communications over fiber-optic media? a ISDN b HSPA+ c LTE d SONET

SONET

Which of the following answers refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet? a VPN concentrator b load balancer c managed switch d multilayer switch

VPN concentrator

A system that uses public network (e.g. Internet) as a means for creating private encrypted connections between remote locations is known as: a Personal area network (PAN) b Virtual local area network (VLAN) c integrated services digital network (ISDN) d virtual private network (VPN)

Virtual private network (VPN)

A type of network covering large geographic areas is commonly referred to as: a LAN b MAN c WLAN d WAN

WAN (wide area network)

The IEEE 802.16 standards defining high-speed, long-distance wireless communication are also commonly referred to as: a ISDN b SONET c WiMAX d HSPA+

WiMAX

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called: a authentication b authorization c accounting

accounting

Which of the following statements describe the function of a forward proxy? (Select 2 answers) a acts on behalf of a client b hides the identity of a client c acts on behalf of a server d hides the identity of a server

acts on behalf of a client hides the identity of a client

Which of the statements listed below describe the function of a reverse proxy? (Select 2 answers) a acts on behalf of a client b hides the identity of a client c acts on behalf of a server d hides the identity of a server

acts on behalf of a server hides the identity of a server

Which of the devices listed below allows for establishing a communication channel over a PSTN? a analog modem b ICS server c multilayer switch d default gateway

analog modem

Which part of the AAA security architecture deals with the verification of the identity of a person or process? a authentication b authorization c accounting

authentication

Which of the answers listed below refers to the process of granting or denying access to resources? a authentication b authorization c accounting

authorization

Which of the following answers list(s) the characteristic feature(s) of fiber-optic cabling? (Select all that apply) a high signal attenuation b immunity to electromagnetic interference c provides higher level of security than copper cabling (difficult to tap into d low bandwidth capacity e more suitable for carrying digital information than copper cabling

b immunity to electromagnetic interference Provides higher level of security than copper cabling (difficult to tap into) More suitable for carrying digital information than copper cabling

The use of cable modems within a standard cable television infrastructure for Internet access is commonly referred to as: a broadband cable b frame relay c metro-ethernet d dial-up

broadband cable

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) a PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. b The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. c PTR record resolves an IP address to a hostname for reverse lookups. d The functionality provided by a PTR record is the opposite of A and AAAA DNS records ePTR record maps a domain name to a list of mail servers for that domain.

c PTR record resolves an IP address to a hostname for reverse lookups. d The functionality provided by a PTR record is the opposite of A and AAAA DNS records

Which of the cabling types listed below provide(s) protection against an outside signal interference? (Select all that apply) a UTP b coaxial c fiber-optic d STP

coaxial fiber-optic STP

Which of the following answers list(s) the characteristic feature(s) of a Category 5 (CAT5) cabling? (Select all that apply) a copper cable b RJ-45 connector c fiber optic cable d 10 gbps ethernet e 100 mbps ethernet

copper cable RJ-45 connector 100 mbps ethernet

A device used for the purpose of extending the length of various types of network cable runs is commonly referred to as: a coupler b media converter c amplifier d cable certifier

coupler

In twisted-pair cabling wires are grouped into pairs and wires in each pair are twisted around each other in order to reduce: a cross-talk b cable diameter c collisions d bend radius

cross-talk

Which of the following Internet access types takes advantage of the traditional PSTN lines? a fiber-optic b mobile broadband c dial-up d WiMAX

dial-up

An SSL VPN connection typically requires a dedicated VPN client application. true or false

false

Which of the connector types listed below are used with coaxial cabling? (Select 2 answers) a ST b MT-RJ c BNC d LC e F- connector

BNC F-connector

The disadvantage from using this device results from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports which has a negative impact on network performance. a router b switch c bridge d hub

Hub

Which of the following answers illustrates the difference between passive and active security breach response? a HIPS vs NIPS b UTM vs Firewall c CSMA/CD vs CSMA/CA d IDS vs IPS

IDS vs IPS

The DNS database AAAA record creates a pointer that maps a hostname to: a IPv4 address b mail server c IPv6 address d canonical name

IPv6

Which of the following solutions allows for simultaneous digital transmission of voice, video, data, and other network services over a PSTN? a WiMAX b PoE c ISDN d HSPA+

ISDN

Which of the following answers refers to a Network Address Translation (NAT) method that binds a combination of private IP address and port number with a corresponding public IP address and port information? a PAT b RAS c GPG d EAP

PAT

Which of the answers listed below refer(s) to example(s) of circuit-switching communication method(s)? (Select all that apply) a frame relay b POTS c t-carrier d ATM e e- carrier

POTS T-carrier E-carrier

Which of the following answers refers to a method for establishing a dedicated point-to-point link between two networked devices? a PSK b PTR c PKI d PPP

PPP

A technology that allows for prioritizing certain types of network traffic in order to improve the overall network effectiveness and performance is known as: a AAA framework b packet shaping c content filtering d port forwarding

Packet shaping

A device designed to filter and transfer data packets between dissimilar types of computer networks is called: a: hub b: load balancer c: Router d: Switch

Router

Which of the following answers refers to a data link layer (Layer 2) device designed to forward data packets between Local Area Network (LAN) segments? a switch b firewall c router d hub

Switch

Dynamic Network Address Translation (DNAT) provides a permanent mapping between a private IP address and a public IP address on a one-to-one basis. true or false

false

Static Network Address Translation (SNAT) provides a mapping between private IP address and any of the IP addresses belonging to the available public IP address pool. true or false

false

The RS-232 standard defines an interface for parallel data transmission method. true or false

false

The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as: a option b resercation c scope d lease

lease

Which of the following answers lists a more costly alternative to VPN? a dial-up b leased line c broadband cable d satelite

leased line

A network device designed for managing the optimal distribution of workloads across multiple computing resources is called: a layer 3 switch b access point (AP) c load balancer d domain controller

load balancer

A method that allows to combine multiple analog or digital data streams for transmission over a shared medium is known as: a multiplexing b load balancing c packet shaping d frame aggregation

multiplexing

DHCP allows for passing additional configuration settings to DHCP clients on a network. The additional settings might include (among other types of configuration info) the default gateway IP address, or DNS server IP address. Which of the answers listed below refers to the part of a DHCP message containing those settings? a options b scope c reservation d lease

options

A type of enclosed space in a building (such as the one between a dropped ceiling and the structural ceiling) used for air handling is commonly referred to as: a plenum b access point c cable tray d HVAC system

plenum

A server with a private IP address has been set up to handle requests from an outside (public) network. Which of the solutions listed below would enable this function? a port bonding b port labeling c port forwarding d port mirroring

port forwarding

In computer networking, a system or an application processing requests on behalf of another system is commonly referred to as a proxy b web server c main-in-the-middle (MITM) d first responder

proxy

Which of the following terms refers to permanent IP address assignment from a DHCP server? a scope b reservation c DHCP relay d lease

reservation

A range of IP addresses assigned to hosts requesting dynamic IP address from a DHCP server is known as: a lease b DHCP relay c scope d reservation

scope

What are the characteristic features of satellite Internet connections? (Select all that apply) a lack of signal interface b signal latency c high connection speed d interference (weather dependent) e low connection speed

signal latency interference (weather dependent) low connection speed

A device that apart from the function of an ordinary network switch can also provide additional functions at higher levels of the OSI reference model is known as a multilayer switch. true or false

true

A mechanism that allows for connecting one set of wires with another set of wires in telecommunications closets or local area networks (LANs) is commonly referred to as a punch-down block true or false

true

A special type of cabling with a fire-retardant jacket placed inside the space between structural floor and dropped ceiling or inside walls is known as a plenum-rated cabling. true or false

true

Category 3 (CAT3) cable is a 10 Mbps twisted-pair copper cable used in telephone wiring. true or false

true

In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network). true or false

true

MLPPP provides a method for combining two or more physical communication links into one logical interface for the purpose of improved speed and redundancy. true or false

true

Materials from which the plenum-rated cable's cover is made include low-smoke polyvinyl chloride (PVC) and fluorinated ethylene polymer (FEP). true or false

true

Metro-Ethernet" is a general term for a computer network larger than a Local Area Network (LAN) and based on Ethernet standards. true or false

true

Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent. true or false

true

One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping. true or false

true

Optical Carrier (OC) transmission rate specifications adhere to a pattern whereby OC prefix is followed by a number designating a multiple of the base unit of 51.84 Mbps. true or false

true

The Category 6 (CAT6) cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas CAT6A (Augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. true or false

true

Which of the following answers refer to the RJ-45 connector? (Select 2 answers) a used with telephone cabling b copper cabling connector c used with ethernet network cabling d fiber-optic cabling connector e coaxial cabling connector

used with ethernet network cabling copper cabling connector

What are the characteristic features of the RJ-11 connector? (Select 2 answers) a used with telephone cabling b copper cabling connector c used with ethernet network cabling d fiber-optic cabling connector e coaxial cabling connector

used with telephone cabling copper cabling connector

A software solution designed to enable interaction between two devices over a network is generally referred to as: a proxy b web service c software as a service (SaaS) d virtual switch

web service

An OC-3 line supports transmission rates of up to: a 1.544 mbps b 51.54 mbps c 44.736 mbps d 155.52 mbps

155.52 mbps

Which of the following answers lists the maximum data transfer rate of an E1 connection? a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps

2.048 mbps

Which of the answers listed below refers to the maximum data transfer rate of an E3 connection? a 1.544 mbps b 2.048 mbps c 34.368 mbps d 44.736 mbps

34.368 mbps

Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address? a MX b CNAME c AAAA d PTR e A

CNAME

Which of the following answers refer(s) to the multiplexing method(s) used in fiber-optic communication? (Select all that apply) a CDMA b CWDM c CSMA d DWDM

CWDM DWDM

An application software used to selectively block access to certain websites is an example of: a captive portal b media converter c content filter d proxy server

Content filter


संबंधित स्टडी सेट्स

Accounting Chapter 2 Practice Quiz

View Set

Social Psychology: Attribution and Attribution Bias

View Set

Module #3 Debit, Credit, & Prepaid Cards

View Set

Pharm Ch. 30 Adrenergic Agonists Prep U

View Set

Lecture 9/chapter 7-FEELS & MEMORY

View Set

Ch. 26: The Child with Genitourinary Dysfunction

View Set

Med Surg Immune and Infections 2017

View Set

NCLEX questions for Musculoskeletal

View Set