CIW-NTA Lesson 2
What is the data transfer rate of a T1 line? A) 2.048 Mbps B) 6.312 Mbps C) 1.544 Mbps D) 64 Kbps
1.544 Mbps
What is fiber-optic cable? A) A cable that sends data as pulses of light over threads of glass B) A cable that is flexible and easy to handle around corners and objects C) A specialized cable that allows you to connect two computers directly without using a hub D) A cable that is protected from external electromagnetic interference by a metal sheath wrapped around the wires
A cable that sends data as pulses of light over threads of glass
What is a hub? A) A device that filters frames to determine whether a specific frame belongs to a local segment or another LAN segment B) A device that connects computers in a star-configured network so they can exchange information C) A device that forwards data from one network to another D) A device that directs the flow of information from one node to another, operating on the Data Link layer of the OSI model.
A device that connects computers in a star-configured network so they can exchange information
What is a switch? A) A device that connects computers in a star-configured network so they can exchange information B) A device that forwards data from one network to another C) A device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment D) A device that directs the flow of information from one node to another
A device that directs the flow of information from one node to another
What is coaxial cable? A) A cable that sends data as pulses of light over threads of glass B) A specialized cable that allows you to connect two computers directly without using a hub C) A high-capacity cable used for video and communication networks D) A cable that is flexible and easy to handle around corners and objects
A high-capacity cable used for video and communication networks
What is a plenum? A) A space between floors in a building B) A specialized cable that allows you to connect two computers directly without using a hub C) A tool that pushes the plugs from an RJ-45 connector into the cable D) A high-capacity cable
A space between floors in a building
What is the term for the weakening of a transmission signal as it travels farther from its source? A) Attenuation B) Store-and-forward C) Crossover D) Wideband
Attenuation
Where is a network firewall most commonly placed? A) Between a network device and a wall jack B) Between a corporate LAN and the Internet C) Between two NICs in the same computer D) Between an individual computer and the network
Between a corporate LAN and the Internet
What is the term for a device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment? A) Bridge B) Router C) Hub D) Switch
Bridge
Which phrase reflects the growing movement of employees who use their personal smartphones and tablets at work? A) Wireless networking B) Mobile computing C) Bring Your Own Device (BYOD) D) Social networking
Bring Your Own Device (BYOD)
The access method for the IEEE 802.11 specifications is: A) MU-MIMO. B) MIMO. C) CSMA/CD. D) CSMA/CA.
CSMA/CA
Which category of twisted-pair cable has a bandwidth of 100 Mbps and is used in 10BaseT and 100BaseTX networks? A) Category 4 B) Category 1 C) Category 5 D) Category 3
Category 5
What is the name for the Wi-Fi-related technique in which two separate non-overlapping channels can be used at the same time to transmit data? A) Packet aggregation B) Channel bonding C) Multiple-Input, Multiple-Output (MIMO) D) Payload optimization
Channel bonding
Which twisted-pair cable category is the only one that can support segments over 100 meters in length? A) Category 5e B) Category 6E C) Class F D) Category 5
Class F
What are T-carrier systems usually used for? A) Connecting a LAN to a WAN B) Connecting LANs to form a multi-LAN network C) Connecting individual computers to form a LAN D) Connecting an individual computer to the Internet
Connecting a LAN to a WAN
What is the term for a specialized cable that allows you to connect two computers directly without using a hub? A) Coaxial cable B) Fiber-optic cable C) Crossover cable D) Shielded twisted-pair cable
Crossover cable
Which of the following use asynchronous transmissions? A) T1 line B) Dial-up modem C) Cable television system D) Ethernet network
Dial-up modems
Which of the following wireless transmission technologies is considered a wideband networking method? A) Multiple-Input, Multiple-Output (MIMO) B) Wireless access point (AP) C) Direct Sequence Spread Spectrum (DSSS) D) Orthogonal Frequency Division Multiplexing (OFDM)
Direct Sequence Spread Spectrum (DSSS)
Which of the following has a data transfer rate of 2.048 Mbps? A) E1 line B) T2 line C) E2 line D) T1 line
E1 line
For which of the following is Category 5e twisted-pair cable used? A) Gigabit Ethernet and other high-speed networks B) 10BaseT and 100BaseTX networks C) 10-Gbps networks D) Low-speed serial communication
Gigabit Ethernet and other high-speed networks
Which IEEE standard supports the 1000BaseT wiring standard? A) Ethernet/IEEE 802.3 B) Fast Ethernet/IEEE 802.3u C) Wireless Ethernet/IEEE 802.11 D) Gigabit Ethernet/IEEE 802.3ab
Gigabit Ethernet/IEEE 802.3ab
What is the term for networking mode in which systems connect via a centralized access point? A) Ad-hoc B) Wireless access point (AP) C) Infrastructure D) Spread spectrum
Infrastructure
Which statement is true about MAC addresses on your system? A) Many computers will commonly share a MAC address. B) MAC addresses are unique addresses that are burned into a NIC. C) MAC addresses use six hexadecimal digits to form a 24-bit address. D) In a routed network environment, the IP address, rather than the MAC address, is used to send a packet to its final destination.
MAC addresses are unique addresses that are burned into a NIC
Which of the following is the interface between the computer and the network? A) Network interface card (NIC) B) Firewall C) Switch D) Router
Network interface card (NIC)
Which of the following are established rules that enable data to flow from one network interface card (NIC) to another? A) Network protocols B) Broadcast domains C) Broadcasts D) Collision domains
Network protocols
A unique name for each wireless cell or network is called a: A) Service Set Identifier (SSID). B) Basic Service Set Identifier (BSSID). C) wireless access point (AP). D) network interface card (NIC).
Service Set Identifier (SSID).
What are the three methods of circuit operation for data transmissions? A) Ad-hoc, infrastructure, and wireless B) Baseband, broadband, and wireless C) Simplex, duplex, and triplex D) Simplex, half duplex, and full duplex
Simplex, half duplex and full duplex
How many twisted-pair cable standards, or categories, are specified by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA) 568 Commercial Building Wiring standard? A) Six B) Four C) Five D) Two
Six
What is virtualization? A) A networking mode in which systems connect via a centralized access point B) A P2P protocol that can be used to download large files quickly, such as video games, movies, or software applications C) A networking mode in which systems use only their NICs to connect with one another D) Software technology that enables you to run multiple virtual operating systems and applications on a single physical computer
Software technology that enables you to run multiple virtual operating systems and applications on a single physical computer
What is the term for a technology in which a signal is generated by a system and then sent over a large number of frequencies to another system? A) Infrastructure B) Spread spectrum C) Ad hoc D) Bridge
Spread spectrum
Which of the following operates the fastest? A) Routers B) Hubs C) Bridges D) Switches
Switches
In which type of data transmission do the access device and network device share a clock and transmission rate? A) Synchronous B) Asynchronous C) Half duplex D) Full duplex
Synchronous
What is the function of a Channel Service Unit/Data Service Unit (CSU/DSU)? A) To forward traffic based on MAC addresses B) To direct the flow of information from one node to another C) To convert data from digital telephony-based lines into data that a network connection that traditional network equipment can recognize D) To act as a barrier against potential malicious activity, while still allowing a "door" for people to communicate between a secured network and the open, unsecured network
To convert data from digital telephony-based lines into data that a network connection used by traditional network equipment can recognize
What is the essential function of a virtual LAN (VLAN)? A) To filter frames in order to determine whether a specific frame belongs on a local segment or another LAN segment B) To forward traffic based on MAC addresses C) To establish a connection between two network segments just long enough to send a current packet D) To organize systems according to their logical function on the network, rather than their physical location
To organize systems according to their logical function on the network, rather than their physical location
What is the name for a device that transmits and receives digital or analog signals? A) Universal Serial Bus (USB) B) Media Access Control (MAC) C) Transceiver D) Network interface card (NIC)
Transceiver
The IEEE 802 series of standards specifies which of the following? A) Various network protocols B) Various LAN technologies C) Various wireless technologies only D) Various Ethernet technologies only
Various LAN technologies
Which of the following is considered to be the de facto standard for wireless security? A) Wi-Fi Protected Access 3 (WPA3) B) Wired Equivalent Privacy (WEP) C) MAC address filtering D) Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access 2 (WPA2)
What do wireless systems use to communicate with one another that is similar to a standard hub or switch? A) Wireless cell B) Wireless access point (AP) C) Basic Service Set Identifier (BSSID) D) Service Set Identifier (SSID)
Wireless access point (AP)
What is the term for a collection of wireless clients around a specific wireless AP? A) Wireless cell B) Basic Service Set Identifier (BSSID) C) Service Set Identifier (SSID) D) Spread spectrum
Wireless cell
Which of the following statements is true about a virtualization environment? A) You can run one additional operating system at a time on a single computer. B) You will need to make backups of your virtual machine before you exit because virtualization software does not save state. C) Energy efficiency is reduced because the consumption of electricity is increased and more heat is generated. D) You can run software written for one operating system on another without the need to reboot your computer.
You can run software written for one operating system on another without the need to reboot your computer.
Routers are conceptually similar to: A) firewalls. B) switches. C) hubs. D) bridges.
bridges.
Wired Equivalent Privacy (WEP) encryption: A) uses a 128-bit key that has never been cracked. B) is available in a 512-bit key. C) is more secure than WiFi Protected Access (WPA). D) is less secure than WiFi Protected Access (WPA).
is less secure than WiFi Protected Access (WPA)
In a virtualization environment, the virtual machine is known as: A) the guest. B) the tracker. C) the seed. D) the host.
the guest