MIT 245 Test 1

Ace your homework & exams now with Quizwiz!

What statement describes a transmission flaw that is occurring due to attenuation? a. A customer modem is continuously losing signal due to large distance from the transmitting device. b. A network switch interface is dropping due to a powerful radio transmitter in the adjacent room. c. A customer's video conferencing application is experiencing delay in audio and video that comes and goes. d. Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs.

A customer modem is continuously losing signal due to large distance from the transmitting device

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.

False

At what layer of the OSI model does a network switch normally operate? a. Layer 2 b. Layer 3 c. Layer 4 d. Layer 5

Layer 2

. HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 4 b. Layer 5 c. Layer 6 d. Layer 7

Layer 7

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Toxic Chemical Safety Procedure (TCSP) b. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c. Environmental Chemical Hazard Sheet (ECHS) d. Material Safety Data Sheet (MSDS) ß

Material Safety Data Sheet (MSDS)

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Application b. Session c. Transport d. Network

Network

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. bus topology b. star topology c. star bus topology d. mesh topology

Star topology

. The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF).

True

Latency on data networks is based on a calculation of a packet's round trip time (RTT).

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle.

True

Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines? a. time division multiplexing b. statistical time division multiplexing c. frequency division multiplexing d. wavelength division multiplexing

statistical time division multiplexing

What is the maximum supported throughput of a CAT6 cable? a. 100 Mbps b. 1 Gbps c. 10 Gbps d. 100 Gbps

10 Gbps

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting? a. at least 3 inches b. at least 3 feet c. at least 6 feet d. at least 12 feet

At least 3 feet

What is the difference between bandwidth and throughput?

Bandwidth, Max speed at which data can travel between nodes on a network.Throughput : actual speed of data transfer that is achieved.

What statement accurately reflects what occurs when a message is too large to transport on a network? a. The message is discarded and must be sent again. b. The message is sent anyway, and is received by the destination as garbage data. c. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). d. An ICMP error is generated, and the application must reformat the data for transmission.

C. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

What is the minimum category of UTP cable required in order to support Gigabit speeds? a. Cat 3 b. Cat 5 c. Cat 5e d. Cat 6

Cat 5

What is a defining characteristic of a bus topology based network? a. Devices are connected to two adjacent devices, and communication priority is granted by a token. b. Devices are connected directly to a centralized networking device, known as a network switch. c. Devices are daisy-chained together in a single line. d. Devices are directly attached to a network router, which forwards data to intended destinations.

Devices are daisy-chained together in a single line.

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.

False

Static electricity is an electrical charge in motion

False

The Data Link layer attaches a trailer to the end of a packet, and does not include a header.

False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.

False

The Transport layer header addresses a receiving application by a number called a MAC address

False

The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. packet b. data c. bit d. Frame

Frame

. During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a. No more than 1 inch of the cable should be exposed. b. No less than 1 inch of the cable should be exposed. c. Each pair should be stripped of insulation so that it doesn't get caught in the jack. d. Each pair should be twisted around another pair to reduce cross talk.

No more than 1 inch of the cable should be exposed.

Which of the following is not one of the disadvantages of peer-to-peer networks? a. They lack scalability. b. They are not necessarily secure. c. They are impractical for connecting large numbers of computers. d. They centralize user account logins.

They centralize user account logins.

Noise can degrade or distort a signal on a network; what are some of its causes?

Two common sources of noise are:* EMI (electromagnetic interference)-Caused by motors, power lines, televisions, copiers, fluorescent lights, microwave ovens, manufacturing machinery, and other sources of electrical activity (including a severe thunderstorm). One type of EMI is RFI (radio frequency interference), or electromagnetic interference caused by radio waves. * crosstalk-Occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.

When creating network diagrams, what icon description typically represents a network router? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

28. The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? a. MAC (Media Access Control) address b. DAC (Data Access Control) address c. DAC (Digital Access Control) address d. PAC (Packet Access Control) address

a. MAC (Media Access Control) address

. Which of the following is an example of encapsulation? a. The addition of a header to data inherited from the layer above in the OSI model. b. The subtraction of a header from data inherited from the layer below in the OSI model. c. The modification of headers from a higher layer in the OSI model. d. The addition of a trailer to data inherited from the layer above in the OSI model.

a. The addition of a header to data inherited from the layer above in the OSI model.

Where is a demarc located in relation to the structured cabling of an enterprise environment? a. in the Main Distribution Frame (MDF) b. at the Intermediate Distribution Frame (IDF) c. in the work area d. between the MDF and the IDF

a. in the Main Distribution Frame (MDF)

What is the minimal amount of voltage required to damage an electrical component? a. 5 volts b. 10 volts c. 100 volts d. 1500 volts

b. 10 volts

Which of the following statements about fiber-optic cabling is accurate? a. Fiber-optic cabling has a low resistance to signal noise. b. Light experiences virtually no resistance when traveling through glass. c. Fiber-optic cable is cheaper than shielded twisted pair cabling. d. The maximum length for a fiber segment is 20km.

b. Light experiences virtually no resistance when traveling through glass.

. What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system? a. IEEE 802.3 b. TIA/EIA-568 c. ITU 922 d. ISO 9001

b. TIA/EIA-568

Which of the following is NOT a best practice when performing cable management? a. A cable tester should be used to verify that each segment of cable is transmitting reliably. b. Cable should not be placed across a floor where they might be damaged by traffic. c. Cable ties should be pulled tightly to keep cables from moving around in a bundle. d. Grounding requirements should be followed when running cables.

c. Cable ties should be pulled tightly to keep cables from moving around in a bundle.

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Application b. Network c. Physical d. Data Link

c. Physical

. The TCP and UDP protocols both exist at what layer of the OSI model? a. Application b. Presentation c. Transport d. Network

c. Transport

29. When creating network diagrams, what icon description typically represents a network switch? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

Signals that can travel in only one direction on a medium are referred to as what type of signal? a. full-duplex b. duplex c. half-duplex d. Simplex

d. Simplex

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. b. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. c. The packet will be dropped silently, requiring the communicating application try again. d. The packet will be divided into smaller packets using fragmentation.

d. The packet will be divided into smaller packets using fragmentation.

Name the 7 layers of the OSI Model, describe its function, and give the data unit for each layer.

· Layer 7 - Application- Payload- Human interaction layer, where applications can access network services. · Layer 6 - Presentation- Payload- Ensures data is in a usable format and where encryption can occur · Layer 5 - Session- Payload- Maintains connections and is responsible for controlling ports and sessions · Layer 4 - Transport -Segment TCP or datagram UDP- Transmits data using transport protcols · Layer 3 - Network- Packet- Decides what physical path the data will take · Layer 2 - Data Link- Frame- Defines the format of data on the network · Layer 1 - Physical- Bit- Transmits raw data over a physical medium


Related study sets

Roles / Contemporary Nursing Test 1

View Set

Positioning 2: Ch. 16 WB & Review Questions

View Set

Cognition & Memory quiz questions

View Set

nur 2990 - prepu - nonmalignant hematologic disorders

View Set

Neuroscience Chapter 2 Sample Questions

View Set

9th Cultural Geography Chp 9 Test

View Set