CIW NTA Lesson 2 - Part B

Ace your homework & exams now with Quizwiz!

What is the data transfer rate of a T1 line?

1.544 Mbps

Which phrase reflects the growing movement of employees who use their personal smartphones and tablets at work?

Bring Your Own Device (BYOD)

The access method for the IEEE 802.11 specifications is:

CSMA/CA

What is the name for the Wi-Fi-related technique in which two separate non-overlapping channels can be used at the same time to transmit data?

Channel bonding

What are T-carrier systems usually used for?

Connecting a LAN to a WAN

Which of the following use asynchronous transmissions?

Dial-up modems

Which of the following wireless transmission technologies is considered a wideband networking method?

Direct Sequence Spread Spectrum (DSSS)

Which of the following has a data transfer rate of 2.048 Mbps?

E1 line

Which IEEE standard supports the 1000BaseT wiring standard?

Gigabit Ethernet / IEEE 802.3ab

What is the term for a networking mode in which systems connect via a centralized access point?

Infrastructure

Which statement is true about MAC addresses on your system?

MAC addresses are unique addresses that are burned into a NIC.

A unique name for each wireless cell or network is called a:

Service Set Identifier (SSID).

What are the three methods of circuit operation for data transmissions?

Simplex, half duplex and full duplex

What is virtualization?

Software technology that enables you to run multiple virtual operating systems and applications on a single physical computer

What is the term for a technology in which a signal is generated by a system and then sent over a large number of frequencies to another system?

Spread spectrum

In which type of data transmission do the access device and network device share a clock and transmission rate?

Synchronous

The IEEE 802 series of standards specifies which of the following?

Various LAN technologies

Which of the following is considered to be the de facto standard for wireless security?

Wi-Fi Protected Access 2 (WPA2)

What do wireless systems use to communicate with one another that is similar to a standard hub or switch?

Wireless access point (AP)

What is the term for a collection of wireless clients around a specific wireless AP?

Wireless cell

Which of the following statements is true about a virtualization environment?

You can run software written for one operating system on another without the need to reboot your computer.

Wired Equivalent Privacy (WEP) encryption:

is less secure than WiFi Protected Access (WPA).

In a virtualization environment, the virtual machine is known as:

the guest.


Related study sets

Chapter 14 - Financial Info and Accouting

View Set

Time Period 4~ Chapter 7 Apush Quiz MCQ

View Set

Study Questions for Auto Cad 3 Test 2

View Set

EXAM #4 - CH. 16, 21, 23, 27, 56

View Set

Ethical Hacking Chapter 9 Web and Database Attacks

View Set