CIW-NTA Lesson 2

Ace your homework & exams now with Quizwiz!

What is the data transfer rate of a T1 line? A) 2.048 Mbps B) 6.312 Mbps C) 1.544 Mbps D) 64 Kbps

1.544 Mbps

What is fiber-optic cable? A) A cable that sends data as pulses of light over threads of glass B) A cable that is flexible and easy to handle around corners and objects C) A specialized cable that allows you to connect two computers directly without using a hub D) A cable that is protected from external electromagnetic interference by a metal sheath wrapped around the wires

A cable that sends data as pulses of light over threads of glass

What is a hub? A) A device that filters frames to determine whether a specific frame belongs to a local segment or another LAN segment B) A device that connects computers in a star-configured network so they can exchange information C) A device that forwards data from one network to another D) A device that directs the flow of information from one node to another, operating on the Data Link layer of the OSI model.

A device that connects computers in a star-configured network so they can exchange information

What is a switch? A) A device that connects computers in a star-configured network so they can exchange information B) A device that forwards data from one network to another C) A device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment D) A device that directs the flow of information from one node to another

A device that directs the flow of information from one node to another

What is coaxial cable? A) A cable that sends data as pulses of light over threads of glass B) A specialized cable that allows you to connect two computers directly without using a hub C) A high-capacity cable used for video and communication networks D) A cable that is flexible and easy to handle around corners and objects

A high-capacity cable used for video and communication networks

What is a plenum? A) A space between floors in a building B) A specialized cable that allows you to connect two computers directly without using a hub C) A tool that pushes the plugs from an RJ-45 connector into the cable D) A high-capacity cable

A space between floors in a building

What is the term for the weakening of a transmission signal as it travels farther from its source? A) Attenuation B) Store-and-forward C) Crossover D) Wideband

Attenuation

Where is a network firewall most commonly placed? A) Between a network device and a wall jack B) Between a corporate LAN and the Internet C) Between two NICs in the same computer D) Between an individual computer and the network

Between a corporate LAN and the Internet

What is the term for a device that filters frames to determine whether a specific frame belongs on a local segment or another LAN segment? A) Bridge B) Router C) Hub D) Switch

Bridge

Which phrase reflects the growing movement of employees who use their personal smartphones and tablets at work? A) Wireless networking B) Mobile computing C) Bring Your Own Device (BYOD) D) Social networking

Bring Your Own Device (BYOD)

The access method for the IEEE 802.11 specifications is: A) MU-MIMO. B) MIMO. C) CSMA/CD. D) CSMA/CA.

CSMA/CA

Which category of twisted-pair cable has a bandwidth of 100 Mbps and is used in 10BaseT and 100BaseTX networks? A) Category 4 B) Category 1 C) Category 5 D) Category 3

Category 5

What is the name for the Wi-Fi-related technique in which two separate non-overlapping channels can be used at the same time to transmit data? A) Packet aggregation B) Channel bonding C) Multiple-Input, Multiple-Output (MIMO) D) Payload optimization

Channel bonding

Which twisted-pair cable category is the only one that can support segments over 100 meters in length? A) Category 5e B) Category 6E C) Class F D) Category 5

Class F

What are T-carrier systems usually used for? A) Connecting a LAN to a WAN B) Connecting LANs to form a multi-LAN network C) Connecting individual computers to form a LAN D) Connecting an individual computer to the Internet

Connecting a LAN to a WAN

What is the term for a specialized cable that allows you to connect two computers directly without using a hub? A) Coaxial cable B) Fiber-optic cable C) Crossover cable D) Shielded twisted-pair cable

Crossover cable

Which of the following use asynchronous transmissions? A) T1 line B) Dial-up modem C) Cable television system D) Ethernet network

Dial-up modems

Which of the following wireless transmission technologies is considered a wideband networking method? A) Multiple-Input, Multiple-Output (MIMO) B) Wireless access point (AP) C) Direct Sequence Spread Spectrum (DSSS) D) Orthogonal Frequency Division Multiplexing (OFDM)

Direct Sequence Spread Spectrum (DSSS)

Which of the following has a data transfer rate of 2.048 Mbps? A) E1 line B) T2 line C) E2 line D) T1 line

E1 line

For which of the following is Category 5e twisted-pair cable used? A) Gigabit Ethernet and other high-speed networks B) 10BaseT and 100BaseTX networks C) 10-Gbps networks D) Low-speed serial communication

Gigabit Ethernet and other high-speed networks

Which IEEE standard supports the 1000BaseT wiring standard? A) Ethernet/IEEE 802.3 B) Fast Ethernet/IEEE 802.3u C) Wireless Ethernet/IEEE 802.11 D) Gigabit Ethernet/IEEE 802.3ab

Gigabit Ethernet/IEEE 802.3ab

What is the term for networking mode in which systems connect via a centralized access point? A) Ad-hoc B) Wireless access point (AP) C) Infrastructure D) Spread spectrum

Infrastructure

Which statement is true about MAC addresses on your system? A) Many computers will commonly share a MAC address. B) MAC addresses are unique addresses that are burned into a NIC. C) MAC addresses use six hexadecimal digits to form a 24-bit address. D) In a routed network environment, the IP address, rather than the MAC address, is used to send a packet to its final destination.

MAC addresses are unique addresses that are burned into a NIC

Which of the following is the interface between the computer and the network? A) Network interface card (NIC) B) Firewall C) Switch D) Router

Network interface card (NIC)

Which of the following are established rules that enable data to flow from one network interface card (NIC) to another? A) Network protocols B) Broadcast domains C) Broadcasts D) Collision domains

Network protocols

A unique name for each wireless cell or network is called a: A) Service Set Identifier (SSID). B) Basic Service Set Identifier (BSSID). C) wireless access point (AP). D) network interface card (NIC).

Service Set Identifier (SSID).

What are the three methods of circuit operation for data transmissions? A) Ad-hoc, infrastructure, and wireless B) Baseband, broadband, and wireless C) Simplex, duplex, and triplex D) Simplex, half duplex, and full duplex

Simplex, half duplex and full duplex

How many twisted-pair cable standards, or categories, are specified by the Telecommunications Industry Association/Electronic Industries Alliance (TIA/EIA) 568 Commercial Building Wiring standard? A) Six B) Four C) Five D) Two

Six

What is virtualization? A) A networking mode in which systems connect via a centralized access point B) A P2P protocol that can be used to download large files quickly, such as video games, movies, or software applications C) A networking mode in which systems use only their NICs to connect with one another D) Software technology that enables you to run multiple virtual operating systems and applications on a single physical computer

Software technology that enables you to run multiple virtual operating systems and applications on a single physical computer

What is the term for a technology in which a signal is generated by a system and then sent over a large number of frequencies to another system? A) Infrastructure B) Spread spectrum C) Ad hoc D) Bridge

Spread spectrum

Which of the following operates the fastest? A) Routers B) Hubs C) Bridges D) Switches

Switches

In which type of data transmission do the access device and network device share a clock and transmission rate? A) Synchronous B) Asynchronous C) Half duplex D) Full duplex

Synchronous

What is the function of a Channel Service Unit/Data Service Unit (CSU/DSU)? A) To forward traffic based on MAC addresses B) To direct the flow of information from one node to another C) To convert data from digital telephony-based lines into data that a network connection that traditional network equipment can recognize D) To act as a barrier against potential malicious activity, while still allowing a "door" for people to communicate between a secured network and the open, unsecured network

To convert data from digital telephony-based lines into data that a network connection used by traditional network equipment can recognize

What is the essential function of a virtual LAN (VLAN)? A) To filter frames in order to determine whether a specific frame belongs on a local segment or another LAN segment B) To forward traffic based on MAC addresses C) To establish a connection between two network segments just long enough to send a current packet D) To organize systems according to their logical function on the network, rather than their physical location

To organize systems according to their logical function on the network, rather than their physical location

What is the name for a device that transmits and receives digital or analog signals? A) Universal Serial Bus (USB) B) Media Access Control (MAC) C) Transceiver D) Network interface card (NIC)

Transceiver

The IEEE 802 series of standards specifies which of the following? A) Various network protocols B) Various LAN technologies C) Various wireless technologies only D) Various Ethernet technologies only

Various LAN technologies

Which of the following is considered to be the de facto standard for wireless security? A) Wi-Fi Protected Access 3 (WPA3) B) Wired Equivalent Privacy (WEP) C) MAC address filtering D) Wi-Fi Protected Access 2 (WPA2)

Wi-Fi Protected Access 2 (WPA2)

What do wireless systems use to communicate with one another that is similar to a standard hub or switch? A) Wireless cell B) Wireless access point (AP) C) Basic Service Set Identifier (BSSID) D) Service Set Identifier (SSID)

Wireless access point (AP)

What is the term for a collection of wireless clients around a specific wireless AP? A) Wireless cell B) Basic Service Set Identifier (BSSID) C) Service Set Identifier (SSID) D) Spread spectrum

Wireless cell

Which of the following statements is true about a virtualization environment? A) You can run one additional operating system at a time on a single computer. B) You will need to make backups of your virtual machine before you exit because virtualization software does not save state. C) Energy efficiency is reduced because the consumption of electricity is increased and more heat is generated. D) You can run software written for one operating system on another without the need to reboot your computer.

You can run software written for one operating system on another without the need to reboot your computer.

Routers are conceptually similar to: A) firewalls. B) switches. C) hubs. D) bridges.

bridges.

Wired Equivalent Privacy (WEP) encryption: A) uses a 128-bit key that has never been cracked. B) is available in a 512-bit key. C) is more secure than WiFi Protected Access (WPA). D) is less secure than WiFi Protected Access (WPA).

is less secure than WiFi Protected Access (WPA)

In a virtualization environment, the virtual machine is known as: A) the guest. B) the tracker. C) the seed. D) the host.

the guest


Related study sets

TestBank 6 (evolution of the brain)

View Set

Layers of the Earth Based on Physical Properties

View Set