Test 3
Which of the following statements about fiber-optic cabling is accurate? a. Fiber-optic cabling has a low resistance to signal noise. b. Light experiences virtually no resistance when traveling through glass. c. The maximum length for a fiber segment is 20km. d. Fiber-optic cable is cheaper than shielded twisted pair cabling.
b. Light experiences virtually no resistance when traveling through glass.
A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue? a. The router console port is providing an Ethernet connection, instead of a serial connection. b. The cable must be a rollover cable. c. The USB standard is incompatible with the serial connection used by the console port. d. Router console ports are only used when connected to other routers.
b. The cable must be a rollover cable.
What kind of tool can you use to measure voltage on a cable length? a. light meter b. multimeter c. time domain reflectometer d. continuity tester
b. multimeter
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation? a. spread spectrum frequency hopping b. multiple input-multiple output (MIMO) c. frame aggregation d. channel bonding
b. multiple input-multiple output (MIMO)
Telephone connections follow what registered jack standard? a. registered jack 45 (RJ-45) b. registered jack 11 (RJ-11) c. registered jack 100 (RJ-100) d. registered jack 12 (RJ-12)
b. registered jack 11 (RJ-11)
Signals that can travel in only one direction on a medium are referred to as what type of signal? a. full-duplex b. simplex c. duplex d. half-duplex
b. simplex
A Fast Ethernet connection utilizes what pins on an RJ-45 plug a. 1, 2, 3, 6 b. 1, 2, 4, 5 c. 1, 2, 3, 5 d. 1, 2, 7, 8
a. 1, 2, 3, 6
Near-field communication devices send data at what fixed frequency? a. 13.56 MHz b. 8.65 MHz c. 47.1 MHz d. 21.39 MHz
a. 13.56 MHz
What scenario describes an evil twin attack? a. A malicious access point is configured with the SSID of a non-malicious public access point. b. A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents. c. An attacker is actively attempting to brute force the PIN of a WPS enabled access point. d. A hacker is actively sending wireless probes to discover available wireless networks.
a. A malicious access point is configured with the SSID of a non-malicious public access point.
At what layer of the OSI model do the 802.11 standards vary? a. Transport layer b. Data link layer c. Physical layer d. Network layer
a. Transport layer b. Data link layer c. Physical layer d. Network layer
Which of the following statements regarding the 802.11ac standard is NOT accurate? a. 802.11ac access points can handle multiple transmissions at one time over the same frequency. b. 802.11ac access points function more like a hub than a switch. c. The standard was officially approved in early 2014. d. 802.11ac operates on the 5-GHz band.
b. 802.11ac access points function more like a hub than a switch.
Why should you terminate coaxial cable with connectors that are rated for the exact cable type? a. A mismatched connector will destroy the equipment it is connected to. b. A mismatched connector will have different impedance ratings, causing data errors. c. A mismatched connector will not fit the coaxial cable for termination. d. A mismatched connector will work fine, but breaks cabling standards.
b. A mismatched connector will have different impedance ratings, causing data errors.
When troubleshooting wireless issues, what statement is accurate? a. A WPA key can be used to associate with a WEP configured access point. b. Access points that use overlapping channels can cause interference with each other if they are too close. c. Access point power levels should always be configured to output as much power as possible. d. Simultaneous wired and wireless network connections do not affect the ability to communicate on the network.
b. Access points that use overlapping channels can cause interference with each other if they are too close.
How does refraction affect the propagation of a wireless transmission? a. It causes the signal to be absorbed by the refracting material. b. It distorts the signal as it travels into and through a different transmission medium. c. It splits the signal into secondary waves that continue in the direction in which they split. d. It causes the signal to be returned back towards the source of the origin.
b. It distorts the signal as it travels into and through a different transmission medium.
What is the maximum supported throughput of a CAT6 cable? a. 100 Mbps b. 100 Gbps c. 10 Gbps d. 1 Gbps
c. 10 Gbps
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug? a. 4/5 inch b. 1/5 inch c. 3/8 inch d. 1/2 inch
c. 3/8 inch
What is the minimum category of UTP cable required in order to support Gigabit speeds? a. Cat 3 b. Cat 6 c. Cat 5e d. Cat 5
c. Cat 5e
What statement correctly describes "jitter"? a. Jitter is the fluctuation of a signal's strength as it travels away from its source. b. Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter. c. Jitter is what happens when packets experience varying amounts of delay and arrive out of order. d. Jitter is the transmission of signal onto unintended pairs in a copper cable.
c. Jitter is what happens when packets experience varying amounts of delay and arrive out of order
Which statement accurately describes what near end crosstalk (NEXT) is? a. NEXT is crosstalk that occurs near the opposite end of a signal source. b. NEXT is crosstalk that occurs when an EMI source is near the data signal source. c. NEXT is crosstalk that occurs between wire pairs near the source of a signal. d. NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius
c. NEXT is crosstalk that occurs between wire pairs near the source of a signal.
What optional protocol can be used in 802.11 to reserve the medium for one node's use? a. RAR/CTU (Reserve Airtime Request/Clear to Use) b. RT/FT (Request Time/Fair Time) c. RTS/CTS (Request to Send/Clear to Send) d. HA/RA (Hold Airtime/Reserved Airtime)
c. RTS/CTS (Request to Send/Clear to Send)
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use? a. TIA/EIA 568F b. TIA/EIA rollover c. TIA/EIA 568A d. TIA/EIA 568B
c. TIA/EIA 568A
You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network? a. The client is using a network adapter with outdated firmware. b. The client is only able to get line of sight with an omnidirectional antenna. c. The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID. d. The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g.
c. The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use? a. protocol analyzer b. air scanner c. Wi-Fi analyzer d. spectrum analyzer
c. Wi-Fi analyzer
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of? a. WPA2-Enterprise b. browser hijacking c. captive portal d. guest network profile
c. captive portal
How many data streams are used in 802.11ac Wave 2 devices? a. 8 data streams b. 2 data streams c. 3 data streams d. 4 data streams
d. 4 data streams
What statement describes a transmission flaw that is occurring due to attenuation? a. A customer's video conferencing application is experiencing delay in audio and video that comes and goes. b. A network switch interface is dropping due to a powerful radio transmitter in the adjacent room. c. Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs. d. A customer modem is continuously losing signal due to large distance from the transmitting device.
d. A customer modem is continuously losing signal due to large distance from the transmitting device
When using RFID, what is an ARPT (Active Reader Passive Tag)? a. It is a tag that requires an active reader, but still contains a battery in the tag. b. It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader. c. It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely. d. It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
d. It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
Diffraction has what affect on a wireless signal's propagation? a. The signal is redirected into multiple directions. b. The signal is completely absorbed by the diffracting material. c. The signal is returned back towards the source of the original signal. d. The signal is split into secondary waves that continue in the direction in which they split.
d. The signal is split into secondary waves that continue in the direction in which they split.
What type of device can be used to assess the quality of a wireless signal? a. Wi-Fi analyzer b. channel scanner c. frequency hopper d. spectrum analyzer
d. spectrum analyzer