Chapter 5 - Network Cabling, Ch. 5 Quiz CTS1134, Networking Plus Chapter Three, Network Ch.3, Network+ Ch3 quiz, Networking Final Quizlet

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You need a network that provides centralized authentication for your users. Which of the following logical topologies should you use? VLANs Peer‐to‐peer Client/Server Mesh

A client/server logical topology allows you to have a centralized database of users so that authentication is provided in one place.

true

A continuity tester should not be used on a live network segment.

What statement describes a transmission flaw that is occurring due to attenuation?

A customer modem is continuously losing signal due to large distance from the transmitting device

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. A. True b. False

A. True

UDP port 123 is utilized by the Network Time Protocol service A. True b. False

A. True

When using IPv6, two or more nodes on the same link are said to be neighbors. A. True b. False

A. True

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

AAAA record

Which LAN topology is characterized by all devices being daisy‐chained together with the devices at each end being connected to only one other device?

Bus

What are the three primary LAN topologies?

Bus, ring, and star

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. traceroute b. ifconfig C. ping d. route

C. ping

Choose the hexadecimal representation of the binary number 11000011.

C3

What is the minimum category of UTP cable required in order to support Gigabit speeds?

Cat 5e

38. What statement accurately reflects what occurs when a message is too large to transport oil a network?

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

30. What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

The packet will be divided into smaller packets using fragmentation.

36. Which of the following is not one of the disadvantages of peer-to-peer networks?

They centralize user account logins

How do routers create a broadcast domain boundary?

They do not forward broadcast traffic.

A time domain reflectometer sends a signal and analyzes the return signal's change in amplitude to determine where cable imperfections may exist. T/F

True

A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable. T/F

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

True

Latency on data networks is based on a calculation of a packet's round trip time (RTT). T/F

True

Multimode fiber contains a core that is larger than a single mode fiber core. T/F

True

UDP port 123 is utilized by the Network Time Protocol service.

True

When using IPv6, two or more nodes on the same link are said to be neighbors.

True

What command can be used to check a domain computer's time source from a Command Prompt window? a. date /source b.w32tm/query /source c. ntpd show source d. time --source

b.w32tm/query /source

A hexadecimal number represents how many binary digits?

4

The 1024 - 65535 range of ports is also known as the "well-known" range.

False

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission

False

The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes. T/F

False

The subnet mask 255.255.255.0 is the only subnet mask that can be used for a Class C network.

false

A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?

fiber cleaver

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

Ping

A Fast Ethernet connection utilizes what pins on an RJ-45 plug?

1,2,3,6

If you borrow 3 bits in a class C network, how many usable hosts will be on each subnet?

30

What is the maximum supported throughput of a CAT6 cable?

10 Gbps

35. What is the minimal amount of voltage required to damage an electrical component?

10 volts

What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?

10GBase- T

Which of the following is NOT a range of IP addresses recommended for use in private networks?

127.0.0.0 through 127.255.255.255

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

In the classful addressing scheme, what range of network addresses is considered a Class B?

128.0.x.y to 191.255.x.y

The 1000Base-LX utilizes light with what wavelength?

1300 nanometers

What is the increment if your subnet mask is 255.255.255.240?

16

Which of the following IP addresses is a Class B address? Mark all that apply.

190.168.60.83 or 128.60.5.52

Which of the following IPv6 addresses represents a global unicast address?

2000::/3

When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?

3/8 inch

Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?

40km

How many subnets can you create if you borrow 3 bits in a class C network?

8

What is the industry standard angle for an Angle Polished Connector (APC)?

8 degrees

PoE+ devices are defined by what IEEE standard?

802.3at

The hexadecimal number 5E is what number in decimal?

94

C

A Fast Ethernet connection utilizes what pins on an RJ-45 plug? A. 1, 2, 3, 5 B. 1, 2, 7, 8 C. 1, 2, 3, 6 D. 1, 2, 4, 5

Which network topology is a combination of two or more types of physical or two or more types of logical topologies? Point‐to‐multipoint Hybrid Bus Star

A hybrid topology is a combination of two or more types of physical or logical network topologies working together within the same network.

B

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue? A. The USB standard is incompatible with the serial connection used by the console port. B. The cable must be a rollover cable. C. Router console ports are only used when connected to other routers. D. The router console port is providing an Ethernet connection, instead of a serial connection.

Why should you terminate coaxial cable with connectors that are rated for the exact cable type?

A mismatched connector will work fine, but breaks cabling standards

Will a computer that shares no resources most likely be connected to the backbone or to a segment?

A segment

false

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.

false

A short circuit is one where needed connections are missing, such as when a wire breaks.

true

A time domain reflectometer sends a signal and analyzes the return signal's change in amplitude to determine where cable imperfections may exist.

B

A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands? A. fiber stripper B. fiber cleaver C. fiber saw D. fiber snipper

true

A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable.

A hexadecimal number is a number written in the base 16 number system. A. True b. False

A. True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. A. True b. False

A. True

39. In a domain, the process of allowing a user to sign on to the network from any computer on, the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

What advantage does the client‐server architecture have over peer‐to‐peer? Easier maintenance Greater organization Tighter security All of the above

All of the above In client‐server networks, requests for resources go to a main server that responds by handling security and directing the client to the resource it wants, instead of the request going directly to the machine with the desired resource (as in peer‐to‐peer).

What is a difference between a LAN and a WAN? WANs need a special type of router port. WANs cover larger geographical areas. WANs can utilize either private or public data transport. All of the above.

All of the above. A typical WAN connects two or more remote LANs together using someone else's network (your ISP's) using a router. Your local host and router see these networks as remote networks and not as local networks or local resources.

When designing a network and deciding which type of network topology to use, which item(s) should be considered? (Select all that apply.) Cost Ease of installation Ease of maintenance Fault‐tolerance requirements

All. Each topology has its own set of pros and cons regarding implementation, so asking the right questions and considering cost, ease of installation, maintenance, and fault tolerance are all important factors to be considered.

B

Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable? A. RG-59 B. RG-6 C. LRG-50 D. RG-20

26. What is the most popular web server application?

Apache

15. In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

Application

What type of topology gives you a direct connection between two routers so that there is one communication path? Point‐to‐point Star Bus Straight

As its name implies, in a point‐to‐point topology you have a direct connection between two routers, giving you one communication path. The routers in a point‐to‐point topology can either be linked by a serial cable, making it a physical network, or be far away and only connected by a circuit within a frame‐relay network, making it a logical network.

What statement regarding the Server Message Block protocol is accurate? a. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a signaling protocol used to make a connection between hosts prior to data transfer. d. It is a protocol used for accessing network-based LDAP directories.

B. It is used by Windows and UNIX-based operating systems to share files.

What is by far the most popular DNS server software available?

BIND

C

Bidirectional transceivers utilize what technology to separate the data in each direction? A. statistical time division multiplexing B. time division multiplexing C. wavelength division multiplexing D. frequency division multiplexing

D

Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber? A. 300m B. 10km C. 550m D. 40km

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. TCP 22 b. UDP 161 C. TCP 3389 d. UDP 10000

C. TCP 3389

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

What network model draws a clear distinction between devices that share their resources and devices that do not?

Client/server

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs

False

22. What is a defining characteristic of a bus topology based network?

Devices are daisy-chained together in-a single line.

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

EUI-64

In order to achieve 1000Base-T over CAT5e cable, 2 pairs of copper are needed. T/F

False

RG-59 is more expensive than RG-6, but has better resistance to attenuation. T/F

False

2. True/False - The Data Link layer attaches a trailer to the end of a packet, and does not include a header.

False

3. True/False - Static electricity is an electrical charge in motion.

False

4. True/False - The protocol data unit for the Physical layer of the OSI model is payload, or data.

False

5. True/False - The Transmission Control Protocol (TCP) is considered to be a connectionless or best-effort delivery protocol.

False

7. True/False - The Transport layer header addresses a. receiving application by a number called a MAC address.

False

8. True/False - Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.

False

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port. T/F

False

A short circuit is one where needed connections are missing, such as when a wire breaks. T/F

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

False

DNS follows a centralized database model, allowing for easier management of DNS records.

False

What device is an example of an Ethernet technology implemented as a star topology?

Hub

21. What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

IP address

You have a network with multiple devices and need to have a smaller broadcast domain while working with a tight budget. Which of the following is the best solution? Use static IP addresses Add more hubs Implement more switches Create VLANs

If you have a switch, you can break up a layer‐2 switched networks into smaller broadcast domains by creating VLAN's.

B

In a coaxial cabling, what does the RG rating measure? A. The overall thickness of the cable. B. The materials used for shielding and conducting cores. C. The maximum distance the cable is rated for, in kilometers. D. The number of twists in the copper core.

In what type of network are all computers considered equals and do they not share any central authority? Peer‐to‐peer Client‐server Physical topology None of the above

In a peer‐to‐peer network, all computers are considered equals. It is up to the computer that has the resource being requested to perform a security check for access rights to its resources.

In a physical‐star topology, what happens when a workstation loses its physical connection to another device? The ring is broken, so no devices can communicate. Only that workstation loses its ability to communicate. That workstation and the device it's connected to lose communication with the rest of the network. No devices can communicate because there are now two unterminated network segments.

In a star topology, each workstation connects to a hub, switch, or similar central device, but not to other workstations. The benefit is when connectivity to the central device is lost, the rest of the network lives on.

false

In order to achieve 1000Base-T over CAT5e cable, 2 pairs of copper are needed.

Which type of topology has the greatest number of physical connections? Point‐to‐multipoint Star Point‐to‐point Mesh

In the mesh topology, there is a path from every machine to every other one in the network. A mesh topology is used mainly because of the robust fault tolerance it offers—if one connection goes on the blink, computers and other network devices can simply switch to one of the many redundant connections that are up and running.

What does the MX record do in a forward DNS zone?

It identifies the e-mail server to be used for e-mail traffic for the domain.

What statement regarding the Server Message Block protocol is accurate?

It is used by Windows and UNIX-based operating systems to share files.

What is the ARPA domain suffix utilized for?

It is used for reverse DNS queries, and holds PTR records.

What statement correctly describes "jitter"?

Jitter is what happens when packets experience varying amounts of delay and arrive out of order

Which of the following is an example of a LAN? Ten buildings interconnected by Ethernet connections over fiber‐optic cabling Ten routers interconnected by frame‐relay circuits Two routers interconnected with a T1 circuit A computer connected to another computer so they can share resources

LANs generally have a geographic scope of a single building or smaller. They can range from simple (two hosts) to complex (with thousands of hosts).

true

Latency on data networks is based on a calculation of a packet's round trip time (RTT).

33. At what layer of the OSI model does a network switch normally operate?

Layer 2

14. HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

Layer 7

Which of the following statements about fiber-optic cabling is accurate?

Light experiences virtually no resistance when traveling through glass

11. The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?

MAC (Media Access Control) address

25. The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Material Safety Data Sheet (MSDS)

What common WAN topology often results in multiple connections to a single site, leading to a high degree of fault tolerance?

Mesh

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

Multicast address

true

Multimode fiber contains a core that is larger than a single mode fiber core.

Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal

31. At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network

D

Noise that can degrade or distort a signal on a network is measured with what unit? A. joules B. farads C. volts D. decibels

18. What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

On the DNS root servers.

Which of the following physical topologies has the least likelihood of having a collision? Bus Start Ring Mesh

Only a Mesh physical topology has point‐to‐point connections to every device, so it has the least likelihood of ever having a collision.

29. In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Physical

D

PoE+ devices are defined by what IEEE standard? A. 802.3af B. 802.3fc C. 802.3c D. 802.3at

Which network topology or connection type can be implemented with only two endpoints?

Point‐to‐point

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

Port 547

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

Port numbers

What statement regarding the Power Over Ethernet standards is inaccurate?

Power over Ethernet requires CAT6 or better copper cable

false

RG-59 is more expensive than RG-6, but has better resistance to attenuation.

Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?

RG-6

20. The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?

TIA/EIA 568A

Which of the following statements correctly describes the SFP+ transceiver?

SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

SIP

40. What mail protocol is used to send mail messages to a server?

SMTP

16. What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?

SNMP

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address.

In a coaxial cabling, what does the RG rating measure?

The materials used for shielding and conducting cores

Which of the following is a concern when using peer‐to‐peer networks? Where to place the server Whose computer is least busy and can act as the server The security associated with such a network Having enough peers to support creating such a network

Security is easy to relax in a peer‐to‐peer environment. Because of the trouble it takes to standardize authentication, a piecemeal approach involving users' personal preferences develops. There are no dedicated servers in a peer‐to‐peer network, and such a network can be created with as few as two computers.

What is the term for a device that shares its resources with other network devices?

Server

28. What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

Session Layer

A

Signals that can travel in only one direction on a medium are referred to as what type of signal? A. simplex B. half-duplex C. duplex D. full-duplex

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

TXT record

D

Telephone connections follow what registered jack standard? A. registered jack 45 (RJ-45) B. registered jack 12 (RJ-12) D. registered jack 100 (RJ-100) D. registered jack 11 (RJ-11)

A

The 1000Base-LX utilizes light with what wavelength? A. 1300 nanometers B. 1200 nanometers C. 1550 nanometers D. 850 nanometers

34. In considering the responsibilities of each layer of the e OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

13. In the United States, who is able to activate the Emergency Alert System at the national level?

The President

false

The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes.

17. Which of the following is an example of encapsulation?

The addition of a header to data inherited from the layer above in the OSI model.

An example of a hybrid network is which of the following? Ethernet Ring topology Bus topology Star topology

The best answer to this question is Ethernet, which uses a start physical topology with a logical bus technology

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

The cable must be a rollover cable

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

You want to remotely log into an office computer using remote desktop in a secure manner. Which of the following should you use? VPN Tagged packets VLANs Telnet SSH

To connect to remote office securely, you need to use a Virtual Private Network (VPN).

You need a topology that is scalable to use in your network. Which of the following will you install? Bus Ring Star Mesh

To install a physical topology that provides ease of scalability use a star network. This is a hub or switch device, and this is the most common LAN networks today.

19. The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

1. True/False - The term firmware refers to programs embedded into hardware devices. This software only, changes when a firmware upgrade is performed.

True

10. True/False - After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

True

6. True/False - In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.

True

9. True/False - The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

A continuity tester should not be used on a live network segment. T/F

True

A hexadecimal number is a number written in the base 16 number system.

True

B

Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines? A. wavelength division multiplexing B. statistical time division multiplexing C. frequency division multiplexing D. time division multiplexing

What is a logical grouping of network users and resources connected to administratively defined ports on a switch? Host Hub VLAN VTP

VLANs allow you to be anywhere on the physical network and still be local to the network resources you need.

What text editor can be used on Linux to view and edit the contents of a configuration file?

Vim

What does VLAN stand for?

Virtual local area network (LAN)

What does VPN stand for?

Virtual private network

What does the acronym VPN stand for? Virtual processor network Virtual passive network Virtual private network Variable‐length private network

Virtual private networks (VPNs) allow for the creation of private networks across the Internet. A VPN makes your local host part of the remote network by using the WAN link that connects you to the remote LAN.

A

What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling? A. 10GBase-T B. 1000Base-T C. 100Base-T D. 10TBase-T

D

What is the industry standard angle for an Angle Polished Connector (APC)? A. 14 degrees B. 12 degrees C. 16 degrees D. 8 degrees

D

What is the maximum supported throughput of a CAT6 cable? A. 100 Mbps B. 100 Gbps C. 1 Gbps D. 10 Gbps

D

What is the minimum category of UTP cable required in order to support Gigabit speeds? A. Cat 3 B. Cat 6 C. Cat 5 D. Cat 5e

C

What kind of tool can you use to measure voltage on a cable length? A. continuity tester B. light meter C. multimeter D. time domain reflectometer

D

What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment? A. statistical time division multiplexing B. spaced wavelength division multiplexing C. dense wavelength division multiplexing D. coarse wavelength division multiplexing

C

What statement correctly describes "jitter"? A. Jitter is the transmission of signal onto unintended pairs in a copper cable. B. Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter. C. Jitter is what happens when packets experience varying amounts of delay and arrive out of order. D. Jitter is the fluctuation of a signal's strength as it travels away from its source.

A

What statement describes a transmission flaw that is occurring due to attenuation? A. A customer modem is continuously losing signal due to large distance from the transmitting device. B. Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs. C. A network switch interface is dropping due to a powerful radio transmitter in the adjacent room. D. A customer's video conferencing application is experiencing delay in audio and video that comes and goes.

C

What statement regarding the Power Over Ethernet standards is inaccurate? A. Electric current may run over a pair of wires used for data transmission. B. A device that supplies power for PoE is known as power sourcing equipment. C. Power over Ethernet requires CAT6 or better copper cable. D. The amount of power provided is 15.4 watts for standard PoE devices.

Which of the following is an example of when a point‐to‐multipoint network is called for? When a centralized office needs to communicate with many branch offices When a full mesh of WAN links is in place When multiple offices are daisy‐chained to one another in a line When there are only two nodes in the network to be connected

When a central office, such as a headquarters, needs to communicate directly with its branch offices, but the branches do not require direct communication with one another, the point‐to‐multipoint model is applicable. The other scenarios tend to indicate the use of a point‐to‐point link between sites.

B

When terminating an Ethernet cable, about how far should the cable sheath extend into the plug? A. 1/2 inch B. 3/8 inch C. 1/5 inch D. 4/5 inch

Which of the following is a disadvantage of the star topology? When a port on the central concentrating device fails, the attached end device loses connectivity to the rest of the network. When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. In a star topology, a more expensive type of host must be used when compared to the host used when implementing a physical bus. It is more difficult to add stations and troubleshoot than with other topologies

When the central concentrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network. However, this topology makes troubleshooting easier; if the entire network fails, you know where to look first. The central device also ensures that the loss of a single port and the addition of a new device to an available port do not disrupt the network for other stations attached to such a device.

C

When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1? A. white/brown, brown, white/green, blue, white/blue, green, orange, white/orange B. white/green, green, white/orange, blue, white/blue, orange, white/brown, brown C. white/orange, orange, white/green, blue, white/blue, green, white/brown, brown D. blue, white/blue, green, white/green, orange, white/orange, brown, white/brown

A

Which of the following statements about fiber-optic cabling is accurate? A. Light experiences virtually no resistance when traveling through glass. B. Fiber-optic cabling has a low resistance to signal noise. C. The maximum length for a fiber segment is 20km. D. Fiber-optic cable is cheaper than shielded twisted pair cabling.

C

Which of the following statements correctly describes the SFP+ transceiver? A. SFP+ provides the same function as GBICs and is more compact. It is theoretically capable of 5 Gbps. B. SFP+ supports up to 10 Gbps and is slightly larger than SFP, with lower power consumption than XFP. C. SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps. D. SFP+ complies with the 802.3ba standard, allowing four channels in a single transceiver and supporting up to 40 Gbps data rates.

C

Which statement accurately describes what near end crosstalk (NEXT) is? A. NEXT is crosstalk that occurs near the opposite end of a signal source. B. NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius. C. NEXT is crosstalk that occurs between wire pairs near the source of a signal. D. NEXT is crosstalk that occurs when an EMI source is near the data signal source.

A

Why should you terminate coaxial cable with connectors that are rated for the exact cable type? A. A mismatched connector will have different impedance ratings, causing data errors. B. A mismatched connector will not fit the coaxial cable for termination. C. A mismatched connector will destroy the equipment it is connected to. D. A mismatched connector will work fine, but breaks cabling standards.

C

You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use? A. TIA/EIA 568F B. TIA/EIA rollover C. TIA/EIA 568A D. TIA/EIA 568B

A

You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size? A. local connector (LC) B. Mechanical Transfer-Registered Jack (MTRJ) C. straight tip (ST) D. subscriber connector (SC)

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EU1-64 b. IEEE 802.36 c. UUID-128 d. MACin6

b. IEEE 802.36

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. ipconfig /all b. ifconfig -a c. ip show d. if status

b. ifconfig -a

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Two different IPv4 address spaces will exist on the same network segment. b. Both IPv4 and IPv6 protocols will be used on the network. c. The router serving the network will have a redundant spare. d. The network will exist on two separate segments, separated by a proxy.

b. Both IPv4 and IPv6 protocols will be used on the network.

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. A. True b. False

b. False

DNS follows a centralized database model, allowing for easier management of DNS records. A. True b. False

b. False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs A. True b. False

b. False

The 1024 - 65535 range of ports is also known as the "well-known" range. A. True b. False

b. False

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. A. True b. False

b. False

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer has been assigned a routed public IP address. b. The network card has been erroneously assigned a loopback address. c. The computer is configured to use DHCP, but was unable to lease an address. d. The network card is set up for multicast communication.

c. The computer is configured to use DHCP, but was unable to lease an address.

What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?

coarse wavelength division multiplexing

What is by far the most popular DNS server software available? a.Microsoft DNS b. Dnsmasq c. Oracle Resolver d. BIND

d. BIND

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 67 b. port 68 c. port 546 d. port 547

d. port 547

Noise that can degrade or distort a signal on a network is measured with what unit?

decibels

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

dig query 8.8.8.8 domain mycompany.com type mx

27. An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

fail-close

37. A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

fail-open

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

false

The 1024 - 65535 range of ports is also known as the "well-known" range.

false

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.

false

32. In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?

fire suppression agent

12. The Data Link Layer utilizes what name for its protocol data unit (PDU)?

frame

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?

ipconfig /flushdns

A characteristics of the OUI of a MAC address is that:

it can be used to identify the manufacturer.

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

link local address

You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?

local connector (LC)

What kind of tool can you use to measure voltage on a cable length?

multimeter

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

ping

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

Telephone connections follow what registered jack standard?

registered jack 11 (RJ-100)

Signals that can travel in only one direction on a medium are referred to as what type of signal?

simplex

24. If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

star topology

Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?

statistical time division multiplexing

A hexadecimal number is a number written in the base 16 number system.

true

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

true

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.

true

UDP port 123 is utilized by the Network Time Protocol service.

true

When using IPv6, two or more nodes on the same link are said to be neighbors.

true

23. When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, & can cause intermittent errors?

upset failure

What command can be used to check a domain computer's time source from a Command Prompt window?

w32tm /query /source

Bidirectional transceivers utilize what technology to separate the data in each direction?

wavelength division multiplexing

When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?

white/orange, orange, white/green, blue, white/blue, green, white/brown, brown


Set pelajaran terkait

POLS1336 US and Texas Constitution and Politics Exam 3

View Set