NET+

Ace your homework & exams now with Quizwiz!

Which of the answers listed below refers to a binary representation of the decimal number 192? - 10101100 - 11000000 - 01100010 - 10101010

- 11000000

Which of the following answers lists the binary notation of the decimal number 252? - 11110010 - 11111000 - 11111010 - 11111100

- 11111100

Which of the TCP port numbers listed below is assigned to the Internet Message Access Protocol (IMAP)? - 143 - 389 - 443 - 636

- 143

What is the network address for the 154.24.67.147/22 host? - 154.24.48.0 - 154.24.60.0 - 154.24.62.0 - 154.24.64.0

- 154.24.64.0

Compared to SFP, SFP+ offers enhanced data transfer rates of up to: - 2 Gbps - 4 Gbps - 8 Gbps - 16 Gbps

- 16 Gbps

An SNMP Agent receives requests on UDP port: - 161 - 137 - 162 - 138

- 161

An SNMP management station receives SNMP notifications from Agents on UDP port: - 161 - 137 - 162 - 138

- 162

What is the last usable host IP address for the 172.45.120.0/23 network? - 172.45.120.254 - 172.45.121.254 - 172.45.122.254 - 172.45.123.254

- 172.45.121.254

Which of the following answers lists the decimal notation of the binary number 11100000? - 192 - 224 - 240 - 248

- 224

Which of the answers listed below refers to an IPv4 address range reserved for future use? - 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) - 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) - 192.168.0.0 - 192.168.255.255 (192.0.0.0/24) - 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

- 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

Which of the following answers lists the default (classful) subnet mask for a class A network? - 255.0.0.0 - 255.128.0.0 - 224.0.0.0 - 255.224.0.0

- 255.0.0.0

What is the dot-decimal representation of a /13 subnet mask? - 255.240.0.0 - 255.248.0.0 - 255.252.0.0 - 255.254.0.0

- 255.248.0.0

Which of the following answers lists the default (classful) subnet mask for a class B network? - 255.252.0.0 - 255.255.0.0 - 255.248.0.0 - 255.224.0.0

- 255.255.0.0

Which of the following ports is used by syslog? - 445 - 514 - 587 - 636

- 514

TCP port 25 is used by: - SNMP - Telnet - FTP - SMTP

- SMTP

Which of the following TCP flags are used for establishing a network connection via TCP three-way handshake? (Select 2 answers) - RST - SYN - FIN - ACk - URG

- SYN - ACK

Which of the following answers refer(s) to the POP3S encrypted communication? (Select all that apply) - TCP port 993 - Secure Sockets Layer (SSL) - TCP port 995 - Transport Layer Security (TLS) - TCP port 110

- Secure Sockets Layer (SSL) - TCP port 995 - Transport Layer Security (TLS)

In the OSI model, the layer 4 TCP PDU is known as: - Bit - Frame - Packet - Segment - Datagram

- Segment

A network topology in which each node has a direct physical connection to every other node is called: - Star - Bus - Mesh - Ring

- Mesh

Which type of network topology provides the highest level of redundancy? - Ring - Mesh - Bus - Star

- Mesh

What are the features of GBIC? (Select all that apply) - Data transfer of 10 Gbps - Modular (hot swappable) interface - Converts optical signals to electrical signals - Fixed physical interface - Converts electrical signals to optical signals - Data transfer of 1 Gbps

- Modular (hot swappable) interface - Converts optical signals to electrical signals - Converts electrical signals to optical signals - Data transfer of 1 Gbps

A type of network traffic intended for a particular group of hosts is called: - Unicast - Anycast - Multicast - Broadcast

- Multicast

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address? - DNS - APIPA - NAT - DHCP

- NAT

The FTP's Control Connection for administering a session is established through: - TCP port 20 - UDP port 20 - TCP port 21 - UDP port 21

- TCP port 21

Which of the following ports is used by HTTPS? - TCP port 80 - TCP port 443 - UDP port 53 - TCP port 143

- TCP port 443

Which of the ports listed below are assigned to the Session Initiation Protocol (SIP)? (Select 2 answers) - UDP port 67 - TCP port 5060 - TCP port 389 - UDP port 68 - TCP port 5061 - TCP port 3389

- TCP port 5060 - TCP port 5061

UDP port 69 is assigned to: - TFTP - SNMP - DHCP - LDAP

- TFTP

An IPv4-to-IPv6 transition mechanism with native support for Network Address Translation (NAT) is known as: - 6to4 - Teredo - eDiscovery - Miredo

- Teredo

What does the term "Miredo" refer to? - IPv4 to IPv6 migration mechanism - Load balancing solution - Teredo tunneling software - Content filtering solution

- Teredo tunneling software

Which of the following answers refers to a modular network device designed to provide a seamless link between different types of network interfaces? - Bridge - Transceiver - Active hub - Managed switch

- Transceiver

Layer 4 of the OSI model is also known as: - Network layer - Data link layer - Session layer - Transport layer

- Transport layer

An IPsec mode providing encryption only for the payload (the data part of the packet) is known as: - Protected mode - Tunnel mode - Transport mode - Safe mode

- Transport mode

What are the characteristic features of the RJ45 connector? (Select 2 answers) - Used with telephone cabling - Coaxial cabling connector - Used with Ethernet network cabling - Twisted-pair copper cabling connector - Fiber-optic cabling connector

- Used with Ethernet network cabling - Twisted-pair copper cabling connector

Which of the following answers lists the CIDR notation of the 255.192.0.0 subnet mask? - /10 - /11 - /12 - /13

- /10

Which of the following answers lists the CIDR notation for 255.255.224.0 subnet mask? - /19 - /20 - /21 - /22

- /19

Which of the following answers lists the CIDR notation of the 255.255.255.224 subnet mask? - /25 - /26 - /27 - /28

- /27

Which of the following answers refer to IPv6 loopback addresses? (Select 2 answers) - 127.0.0.1 - 0:0:0:0:0:0:0:1 - 169.254/16 - ::1 - FE80::/10

- 0:0:0:0:0:0:0:1 - ::1

Which of the answers listed below refer(s) to the characteristic features of the 10GBASE-T Ethernet standard? - Single-mode fiber-optic cable - 10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 UTP cable) - Uses two pairs of wires in a cable for data transmission - Multimode fiber-optic cable - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6 STP cable) - Twisted-pair copper cabling - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6a UTP/STP cable) - Uses all four pairs of wires in a cable for data transmission

- 10 Gbps transfer rate over a maximum cable segment length of 55 meters (Cat 6 UTP cable) - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6 STP cable) - Twisted-pair copper cabling - 10 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 6a UTP/STP cable) - Uses all four pairs of wires in a cable for data transmission

What is the first valid host address for a node residing in the 10.119.136.143/20 network? - 10.119.96.1 - 10.119.128.1 - 10.119.132.1 - 10.119.136.1

- 10.119.128.1

What is the first valid host address that can be assigned to a node residing in the 10.119.136.143/20 network? - 10.119.96.1 - 10.119.128.1 - 10.119.132.1 - 10.119.136.1

- 10.119.128.1

Which of the answers listed below refer(s) to the characteristic feature(s) of Category 5 (Cat 5) cabling? (Select all that apply) - Coaxial cabling - 100 Mbps transfer rate over 2 cable pairs (100BASE-T networks) - F-type connector - 55-meter cable segment length - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks) - BNC connector - 100-meter cable segment length - 10 Gbps transfer rate over all 4 cable pairs (10GBASE-T networks) - Twisted-pair copper cabling - RJ45 connector - Fiber-optic cabling

- 100 Mbps transfer rate over 2 cable pairs (100BASE-T networks) - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks) - 100-meter cable segment length - Twisted-pair copper cabling - RJ45 connector

What is the typical cable segment length for a copper twisted-pair Ethernet cable? - 33 meters - 55 meters - 100 meters - 250 meters

- 100 meters

Which of the following answers describe(s) to the characteristics of Category 5e (Cat 5e) cabling? (Select all that apply) - BNC connector - 100-meter cable segment length - Coaxial cabling - Twisted-pair copper cabling - Fiber-optic cabling - 1 Gbps transfer rate over 2 cable pairs (1000BASE-T networks) - RJ45 connector - 55-meter cable segment length - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks) - F-type connector

- 100-meter cable segment length - Twisted-pair copper cabling - RJ45 connector - 1 Gbps transfer rate over all 4 cable pairs (1000BASE-T networks)

What is the binary representation of the 255.254.0.0 subnet mask? - 11111111.11111100.00000000.00000000 - 11111111.11111110.00000000.00000000 - 11111111.11111101.00000000.00000000 - 11111111.11111000.00000000.00000000

- 11111111.11111110.00000000.00000000

What is the binary representation of the 255.255.128.0 subnet mask? - 11111111.11111111.10000000.00000000 - 11111111.11111111.11000000.00000000 - 11111111.11111111.11100000.00000000 - 11111111.11111111.11110000.00000000

- 11111111.11111111.10000000.00000000

Network Time Protocol (NTP) runs on UDP port: - 123 - 110 - 161 - 137

- 123

Which of the following answers refers to an IPv4 address range used for loopback addresses? - 0.0.0.0 - 0.255.255.255 (0.0.0.0/8) - 127.0.0.0 - 127.255.255.255 (127.0.0.0/8) - 169.254.0.0 - 169.254.255.255 (169.254.0.0/16) - 240.0.0.0 - 255.255.255.254 (240.0.0.0/4)

- 127.0.0.0 - 127.255.255.255 (127.0.0.0/8)

Which of the following answers refers to an IPv4 loopback address? - ::1 - FE80::/10 - 0:0:0:0:0:0:0:1 - 169.254/16 - 127.0.0.1

- 127.0.0.1

What is the leading octet value range for an IPv4 address belonging to a class B network? - 128 - 191 - 1 - 126 - 192 - 223 - 224 - 239

- 128 - 191

What is the leading octet value range for an IPv4 address belonging to a class B network? - 240 - 254 - 128 - 191 - 1 - 126 - 192 - 223 - 224 - 239

- 128 - 191

An IPv6 address consists of: - 32 bits - 48 bits - 64 bits - 128 bits

- 128 bits

A networked host with unknown IPv4 address can be reached via: - Unicast - Anycast - Multicast - Broadcast

- Broadcast

A type of network that interconnects multiple LANs within a limited geographical area is known as: - BAN - CAN - SAN - RAN

- CAN

Which of the answers listed below refers to a solution that replaces the classful network design? - VLAN - RSTP - SNAT - CIDR

- CIDR

What is the maximum valid range for IP addresses that can be assigned to hosts on the 134.170.185.46 255.255.128.0 network? - 134.170.128.1 - 134.170.255.254 - 134.170.128.1 - 134.170.191.254 - 134.170.160.1 - 134.170.191.254 - 134.170.176.1 - 134.170.191.254

- 134.170.128.1 - 134.170.255.254

Which of the following port numbers is used by the Microsoft Structured Query Language (SQL) Server? - 1433 - 1521 - 3306 - 3389

- 1433

SQLnet runs on port: - 587 - 993 - 1433 - 1521

- 1521

What is the network address for a 154.24.67.147/22 host? - 154.24.48.0 - 154.24.60.0 - 154.24.62.0 - 154.24.64.0

- 154.24.64.0

Which of the following answers lists a decimal notation of the binary number 10101100? - 168 - 172 - 192 - 224

- 172

What is the first usable host IP address on the 172.26.56.110/27 network? - 172.26.56.97 - 172.26.56.111 - 172.26.56.126 - 172.26.56.127

- 172.26.56.97

What is the maximum valid range for IP addresses that can be assigned to hosts on the 192.168.100.248 255.255.255.248 network? - 192.168.100.249 - 192.168.100.255 - 192.168.100.248 - 192.168.100.254 - 192.168.100.249 - 192.168.100.254 - 192.168.100.248 - 192.168.100.255

- 192.168.100.249 - 192.168.100.254

What is the network address for the 192.168.223.15 255.255.255.252 host? - 192.168.223.10 - 192.168.223.11 - 192.168.223.12 - 192.168.223.13

- 192.168.223.12

What is the last usable host IP address on the 192.168.32.9/30 network? - 192.168.32.9 - 192.168.32.10 - 192.168.32.11 - 192.168.32.12

- 192.168.32.10

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network? - 192.168.31.255 - 192.168.47.255 - 192.168.63.255 - 192.168.79.255

- 192.168.63.255

Which of the following answers refers to a valid IPv6 EUI-64 format address generated from a MAC address of 29:88:68:0B:1B:CA? - 2001:DB8:ABCD:12:2A88:68FF:FE0B:1BCA - 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA - 2001:DB8:ABCD:12:2C88:68FF:FE0B:1BCA - 2001:DB8:ABCD:12:2D88:68FF:FE0B:1BCA

- 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA

Which of the following answers refer to the leading octet value range and class of the IPv4 multicast address block? (Select 2 answers) - 128 - 191 - Class B - 192 - 223 - Class C - 224 - 239 - Class D

- 224 - 239 - Class D

Which of the following answers refer to the IPv4 multicast address block? (Select 2 answers) - 128 - 191 - Class B range - 192 - 223 - Class C range - 224 - 239 - Class D range

- 224 - 239 - Class D range

Which of the TCP ports listed below is used by Telnet? - 20 - 21 - 22 - 23

- 23

Which of the answers listed below refers to the default (classful) subnet mask for a class C network? - 255.255.192.0 - 255.255.224.0 - 255.255.255.0 - 255.255.252.0

- 255.255.255.0

An IPv4 address consists of: - 32 bits - 48 bits - 64 bits - 128 bits

- 32 bits

Which of the following answers refers to a port number assigned to the MySQL database system? - 1433 - 1521 - 3306 - 3389

- 3306

Which of the following answers refers to the maximum data transfer rate of QSFP? - 1 Gbps - 1.6 Gbps - 2 Gbps - 4 Gbps

- 4 Gbps

QSFP+ offers data transfer rates of up to: - 10 Gbps - 20 Gbps - 40 Gbps - 80 Gbps

- 40 Gbps

What is the maximum number of hosts per subnet for the 10.47.255.1/20 network? - 512 hosts - 1022 hosts - 2046 hosts - 4094 hosts

- 4094 hosts

Which of the following answers lists the broadcast address for the 46.28.247.109/10 network? - 46.31.255.255 - 46.63.255.255 - 46.127.255.255 - 46.255.255.255

- 46.63.255.255

Which of the following ports is assigned to the Domain Name System (DNS)? - 53 - 67 - 110 - 389

- 53

SMTP TLS runs on port: - 445 - 514 - 587 - 636

- 587

How many usable IP addresses can be assigned to hosts on a /26 subnet? - 254 - 126 - 62 - 30

- 62

A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the following TCP ports needs to be opened to implement this change? - 636 - 389 - 443 - 1720

- 636

A limited IPv4-to-IPv6 transition mechanism that allows for encapsulation of IPv6 packets in IPv4 packets transmitted over IPv4 networks is referred to as: - 6to4 - 802.3af - eDiscovery - Miredo

- 6to4

What is the maximum number of subnets and hosts per subnet for the 192.168.50.247 255.255.255.224 network? - 2 subnets, 126 hosts per subnet - 4 subnets, 62 hosts per subnet - 8 subnets, 30 hosts per subnet - 16 subnets, 14 hosts per subnet

- 8 subnets, 30 hosts per subnet

Which part of the IPsec protocol suite provides authentication and integrity? - CRC - AH - SIEM - AES

- AH

An IPv6 link-local address is an equivalent of IPv4's: - APIPA address - Routable IP address - Public IP address - MAC address

- APIPA address

Which of the following answers refers to an IPv6-only, one-to-nearest data transmission type? - Unicast - Anycast - Multicast - Broadcast

- Anycast

Which of the following answers refer to the characteristics of Category 8 (Cat 8) cabling? (Select 3 answers) - Designed for long-distance, high-speed links - 100GBASE-T - Appropriate for connecting datacenter equipment - Designed for short-distance (approx. 30 meters), high-speed links - 40GBASE-T - Appropriate for wide range of cabling infrastructures

- Appropriate for connecting datacenter equipment - Designed for short-distance (approx. 30 meters), high-speed links - 40GBASE-T

In the OSI model, the physical layer PDU is known as: - Bit - Frame - Packet - Segment - Datagram

- Bit

Which of the following answers refers to a recommended minimum requirement for twisted-pair copper cabling in 1000BASE-T networks? - Cat 3 - Cat 5 - Cat 5e - Cat 6 - Cat 6a

- Cat 5e

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space

- Class A address space

In IPv4 addressing, the leading octet of an IP address with a value of 1 through 126 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space - Class E address space

- Class A address space

Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 (10.0.0.0/8) IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range

- Class A range - Non-routable (private) IP address range

Which of the following answers refer to the characteristic features of the 10.0.0.0 - 10.255.255.255 IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range

- Class A range - Non-routable (private) IP address range

Which of the answers listed below refer to the 172.16.0.0 - 172.31.255.255 (172.16.0.0/12) IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range

- Class B range - Non-routable (private) IP address range

Which of the following answers list the characteristic features of the 172.16.0.0 - 172.31.255.255 IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range

- Class B range - Non-routable (private) IP address range

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space

- Class C address space

In IPv4 addressing, the leading octet of an IP address with a value of 192 through 223 denotes that the IP address within that range belongs to the: - Class A address space - Class B address space - Class C address space - Class D address space - Class E address space

- Class C address space

Which of the following answers refer to the RG-6 cabling specification? (Select 3 answers) - Twisted-pair copper cabling - Suitable for short-distance cable runs - Used for analog video and CCTV installations - Coaxial cabling - Suitable for long-distance cable runs - Used for cable television, satellite television, and cable modems

- Coaxial cabling - Suitable for long-distance cable runs - Used for cable television, satellite television, and cable modems

What are the characteristics of the RG-59 cabling specification? (Select 3 answers) - Coaxial cabling - Suitable for short-distance cable runs - Used for analog video and CCTV installations - Twisted-pair copper cabling - Suitable for long-distance cable runs - Used for cable television, satellite television, and cable modems

- Coaxial cabling - Suitable for short-distance cable runs - Used for analog video and CCTV installations

Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers) - Jitter - Signal attenuation - Crosstalk - EMI - Signal latency

- Crosstalk - EMI

A network protocol providing an alternative solution to the manual allocation of IP addresses is called: - DNS - SNMP - NAT - DHCP

- DHCP

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? - TCP/IP - DNS - SQL - DHCP

- DNS

Layer 2 of the OSI model is also referred to as: - Transport layer - Network layer - Data link layer - Physical layer

- Data link layer

In the OSI model, the layer 4 UDP PDU is called: - Bit - Frame - Packet - Segment - Datagram

- Datagram

IPv4 addresses are expressed with the use of: - Octagonal numbers - Binary numbers - Hexadecimal numbers - Decimal numbers

- Decimal numbers

LDAP is an example of: - Authentication protocol - Address resolution protocol - Directory access protocol - File exchange protocol

- Directory access protocol

Which part of IPsec provides authentication, integrity, and confidentiality? - AES - SHA - AH - ESP

- ESP

POP3 is used for: - Name resolution - Sending email messages - File exchange - Email retrieval

- Email retrieval

A type of coaxial connector commonly used for cable television and cable modems is called: - RG-6 - F-type - DB-9 - MT-RJ

- F-type

Which of the answers listed below refers to an IPv6 link-local address? - 2002::/16 - FE80::/10 - 2001::/32 - ::1/128

- FE80::/10

Which of the following answers lists a valid IPv6 address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression? - FE80:00A7::2AA:0:4C:FE9A - FE80:A7::2AA::4C00:FE9A - FE80:00A7::2AA:0:4C00:FE9A - FE80:A7::2AA:0:4C00:FE9A

- FE80:A7::2AA:0:4C00:FE9A

In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the physical layer up to the application layer. - True - False

- False

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. - True - False

- False

Which of the following answers does not refer to the characteristics of twinaxial cabling? - Coaxial cabling - Two inner conductors - Very-short-range high-speed connections - Copper cabling - Long-distance cable runs

- Long-distance cable runs

Transmission Control Protocol (TCP) is an example of a connectionless protocol. Because TCP does not support three-way handshake while establishing a network connection, it is referred to as unreliable or best-effort protocol. Example applications of TCP include transmission of video and audio streaming data. - True - False

- False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake which is a set of initial steps required for establishing network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). Example applications of UDP include transmission of text and image data. - True - False

- False

User Datagram Protocol (UDP) is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required to establish network connection. UDP supports retransmission of lost packets, flow control (managing the amount of data that is being sent), and sequencing (rearranging packets that arrived out of order). - True - False

- False

What is the function of FTP? - Email service - Directory access - Serving of web pages - File exchange

- File exchange

In the OSI model, the layer 2 PDU is called: - Bit - Frame - Packet - Segment - Datagram

- Frame

Which of the following answers refers to a tunneling protocol? - VRRP - GRE - RTSP - BGP

- GRE

Which network protocol enables retrieving contents of an Internet page from a web server? - SNMP - HTTP - SMTP - IMAP

- HTTP

Which of the following protocols reside(s) at the application layer of the OSI model? (Select all that apply) - ATM - HTTP - FTP - IP - SMTP - TCP/UDP

- HTTP - FTP - SMTP

What is the name of a network protocol that secures web traffic via SSL/TLS encryption? - SFTP - HTTPS - FTPS - SNMP

- HTTPS

IPv6 addresses are expressed with the use of: - Octagonal numbers - Binary numbers - Hexadecimal numbers - Decimal numbers

- Hexadecimal numbers

Which of the following reside at the physical layer of the OSI model? (Select 3 answers) - IP address - Network switch - Hub - Router - Network cabling - Ethernet frame - Repeater

- Hub - Network cabling - Repeater

Which of the following reside at the physical layer of the OSI model? (Choose 3) - IP Address - Network Switch - Hub - Router - Network Cabling - Ethernet frame - Repeater

- Hub - Network Cabling - Repeater

A network topology where each node connects to a central switching device is known as: (Select 2 answers) - Hub-and-spoke - Bus - Ring - Star - Mesh

- Hub-and-spoke - Star

TCP port 80 is assigned to: - Hypertext Transfer Protocol (HTTP) - Hypertext Transfer Protocol over TLS/SSL (HTTPS) - Internet Message Access Protocol (IMAP) - Lightweight Directory Access Protocol (LDAP)

- Hypertext Transfer Protocol (HTTP)

Which of the following answers refers to a protocol used by routers, hosts, and network devices to generate error messages and troubleshoot problems with delivery of IP packets? - CCMP - RSTP - ICMP - SNMP

- ICMP

WHat is the name of a network layer protocol that specifies the format of packets and IP addressing scheme in network communications? - UDP - IP - TCP - NetBIOS

- IP

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? - UDP - IP - TCP - NetBIOS

- IP

Which of the following answers refers to a proprietary European alternative to 110 block? - Krone - BIX - M Block - IDC

- Krone

A type of network connecting computers within a small geographical area such as a building or group of buildings is called: - PAN - LAN - MAN - WAN

- LAN

Which of the following answers refer(s) to example(s) of fiber-optic connectors? (Select all that apply) - LC - DB-25 - ST - SC - RG-6

- LC - ST - SC - MT-RJ

TCP port 389 is the default network port for: - RDP - LDAP - SMB - LDAPS

- LDAP

Which of the following answers refers to an SSL/TLS-based directory access protocol? - H.323 - PPTP - Kerberos - LDAPS

- LDAPS

Physical layer of the OSI model is also known as: - Layer 2 - Layer 7 - Layer 1 - Layer 4

- Layer 1

Which of the following terms refers to the OSI network layer? - Layer 2 - Layer 5 - Layer 3 - Layer 4

- Layer 3

Which of the following answers does not refer to the OSI TCP segment header? - Layer 4 header - Source port number - Destination port number - Layer 3 header - Sequence number - Checksum field

- Layer 3 header

Which of the following answers does not refer to the OSI UDP datagram header? - Length in bytes - Destination port number - Layer 4 header - Source port number - Checksum field - Layer 3 header

- Layer 3 header

The term "Presentation layer" refers to: - Layer 7 of the OSI model - Layer 5 of the OSI model - Layer 6 of the OSI model - Layer 4 of the OSI model

- Layer 6 of the OSI model

The application layer of the OSI model is also known as: - Layer 1 - Layer 3 - Layer 6 - Layer 7

- Layer 7

Which of the following statements apply to Peer-to-Peer (P2P) networking? (Select 3 answers) - In P2P networks, a network node can only request resources - Centralized network type - Less stable and secure than client-server networking model - Decentralized network type - In P2P networks, each node can at the same time serve and request resources - More stable and secure than client-server networking model

- Less stable and secure than client-server networking model - Decentralized network type - In P2P networks, each node can at the same time serve and request resources

A type of protocol used in network management systems for monitoring network-attached devices is known as: - SMB - NTP - SNMP - RDP

- SNMP

What are the characteristic components of the OSI data link layer? - MAC address - IP packet - Network switch - Router - Network cabling - Ethernet frame

- MAC address - Network switch - Ethernet frame

What are the characteristic components of the OSI data link layer? (Select 3 answers) - MAC address - IP packet - Network switch - Router - Network cabling - Ethernet frame

- MAC address - Network switch - Ethernet frame

A computer network connecting multiple LANs over an area of a city is referred to as: - PAN - SAN - WAN - CAN

- MAN

A limit on the maximum amount of data that can be transmitted over a network without fragmentation is referred to as: - DSU - CSU - Data payload - MTU

- MTU

What are the characteristics of the 1000BASE-SX Ethernet standard? (Select 2 answers) - Single-mode fiber-optic cabling - Maximum cable segment length between 220 and 550 meters - Multimode fiber-optic cabling - Maximum cable segment length of 185 meters - Twisted-pair copper cabling

- Maximum cable segment length between 220 and 550 meters - Multimode fiber-optic cabling

What are the characteristic features of the 100BASE-TX Ethernet standard? (Select 3 answers) - Twisted-pair copper cabling (Category 3 or higher) - Maximum cable segment length of 100 meters - Transfer rate of 100 Mbps over two-pair Cat 5 or better cable - Maximum cable segment length of 55 meters - Twisted-pair copper cabling (Category 5 or higher) - Transfer rate of 1000 Mbps (1 Gbps) over four-pair Cat 5 or better cable

- Maximum cable segment length of 100 meters - Transfer rate of 100 Mbps over two-pair Cat 5 or better cable - Twisted-pair copper cabling (Category 5 or higher)

What are the characteristic features of the 1000BASE-T Ethernet standard? (Select 3 answers) - Maximum cable segment length of 185 meters - Single-mode fiber-optic cabling - Maximum cable segment length of 100 meters - Twisted-pair copper cabling (Cat 5 or higher) - Uses two pairs of wires in a cable for data transmission - Multimode fiber-optic cabling - Uses all four pairs of wires in a cable for data transmission

- Maximum cable segment length of 100 meters - Twisted-pair copper cabling (Cat 5 or higher) - Uses all four pairs of wires in a cable for data transmission

What are the characteristic features of the 100BASE-FX Ethernet standard? (Select 3 answers) - Maximum cable segment length of up to 412 meters (half-duplex communication) - Multimode fiber - Maximum cable segment length of up to 2 kilometers (full-duplex communication) - Single-mode fiber - Maximum cable segment length of up to 5 kilometers (full-duplex communication)

- Maximum cable segment length of up to 412 meters (half-duplex communication) - Multimode fiber - Maximum cable segment length of up to 2 kilometers (full-duplex communication)

Which of the answers listed below refer to the 1000BASE-LX Ethernet standard? (Select 3 answers) - Twisted-pair copper cabling - Transfer rate of 1 Gbps over two-pair Cat 5e or better cable - Maximum cable segment length of up to 5 kilometers over single-mode fiber - Fiber-optic cabling - Maximum cable segment length of 100 meters - Transfer rate of 1 Gbps over four-pair Cat 5e or better cable - Maximum cable segment length of up to 550 meters over multimode fiber

- Maximum cable segment length of up to 5 kilometers over single-mode fiber - Fiber-optic cabling - Maximum cable segment length of up to 550 meters over multimode fiber

A network link consisting of two dissimilar transmission medium types requires an intermediary device known as: - Coupler - Patch panel - Content filter - Media converter

- Media converter

What are the characteristic traits of single-mode fiber optics? (Select 3 answers) - Transmission distances of up to 2 km - More expensive than multimode fiber optics - Transmission distances of up to 100 km - Uses laser as the source of light - Less expensive than multimode fiber optics

- More expensive than multimode fiber optics - Transmission distances of up to 100 km - Uses laser as the source of light

Which of the following answers can be used to describe client-server architecture? (Select 3 answers) - Less stable and secure than peer-to-peer architecture - More reliable than peer-to-peer architecture - Decentralized network type - Each network node can at the same time serve and request resources - More stable and secure than peer-to-peer architecture - Centralized network type - Less reliable than peer-to-peer architecture

- More stable and secure than peer-to-peer architecture - Centralized network type - Less reliable than peer-to-peer architecture

Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device? - QoS - DHCP - NAT - DNS

- NAT

An IPv6 protocol used by routers to advertise their presence on a network is called: - NDR - NCP - NDP - NTP

- NDP

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? - NTP - VTP - NNTP - RTP

- NTP

Compared to the number of all IPv4 addresses available per subnet, the total number of usable IPv4 addresses that can be assigned to hosts from that pool is reduced by two. Those two addresses that cannot be assigned to hosts are used as: (Select 2 answers) - Network address - Unicast address - Broadcast address - Multicast address

- Network address - Broadcast address

Which of the following answers can be used to describe the characteristics of ring topology? (Select 3 answers) - All network nodes connect to a single central cable (a.k.a. backbone or trunk) - Network nodes are daisy-chained in a closed loop - A terminator at each end of the main network cable prevents collisions caused by signal bounce - Data is passed through each intermediate node until the receiver node is reached - Each network node connects to exactly two other nodes - The main network cable becomes a single point of failure

- Network nodes are daisy-chained in a closed loop - Data is passed through each intermediate node until the receiver node is reached - Each network node connects to exactly two other nodes

What are the characteristic features of the 192.168.0.0 - 192.168.255.255 (192.0.0.0/16) IPv4 address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range

- Non-routable (private) IP address range - Class C range

Which of the following answers list the characteristic features of the 192.168.0.0 - 192.168.255.255 IP address space? (Select 2 answers) - Class A range - Public IP address range - Class B range - Non-routable (private) IP address range - Class C range

- Non-routable (private) IP address range - Class C range

In modern Ethernet networks, a twisted-pair copper cable terminated according to the TIA/EIA-568A standard on one end and TIA/EIA-568B standard on the opposite end forms a: - Crossover cable - Straight-through cable - Patch cable - None of the above

- None of the above

Which of the answers listed below refers to an example of a valid subnet mask? - 255.255.225.0 - 255.255.191.0 - 255.255.127.0 - 255.255.64.0 - None of the above is a valid subnet mask

- None of the above is a valid subnet mask

Which of the following is an example of a valid subnet mask? - 255.255.225.0 - 255.255.191.0 - 255.255.127.0 - 255.255.64.0 - None of the above is a valid subnet mask

- None of the above is a valid subnet mask

Which of the following answers refer to IMAP4? (Select 2 answers) - Offers improved functionality in comparison to POP3 - Serves the same function as POP3 - Enables sending email messages from client devices - Offers less functions than POP3 - Enables email exchange between mail servers

- Offers improved functionality in comparison to POP3 - Serves the same function as POP3

A type of limited-range computer network used for data transmission among various types of personal devices is referred to as: - PAN - LAN - SAN - MAN

- PAN

Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information? - PAT - NAC - DNS - ARP

- PAT

In the OSI model, the layer 3 PDU is known as: - Bit - Frame - Packet - Segment - Datagram

- Packet

A simple device consisting of multiple connector blocks and ports used for cable management is known as: - Media converter - Demarc - Main Distribution Frame (MDF) - Patch panel

- Patch panel

Data format translation, data compression, and data encryption/decryption take place at the: - Application layer of the OSI model - Presentation layer of the OSI model - Session layer of the OSI model - Transport layer of the OSI model

- Presentation layer of the OSI model

What are the characteristic features of TFTP? (Select 2 answers) - Provides no security features - Typically used for exchanging files over the Internet - A very basic form of file sharing protocol - Provides authentication and encryption - Directory access protocol

- Provides no security features - A very basic form of file sharing protocol

What are the characteristics of SMB/CIFS? (Select all that apply) - Used mainly by computers running Linux distributions - Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems - Enables voice and multimedia communications over IP networks

- Provides shared access to files, directories, and devices - Used mainly by computers running Microsoft Windows operating systems

Telnet: (Select 3 answers) - Encrypts network connection - Provides username & password authentication - Transmits data in an unencrypted form - Does not provide authentication - Enables remote login and command execution

- Provides username & password authentication - Transmits data in an unencrypted form - Enables remote login and command execution

Which of the following answers refers to a Microsoft-proprietary remote-access protocol providing a user with graphical interface for connecting to another computer over a network? - RDP - SSH - VNC - Telnet

- RDP

Which of the following documents describes the concept of private IP addressing? - RFC 4949 - RFC 1918 - RFC 1208 - RFC 1983

- RFC 1918

Which of the following answers refer to the OSI network layer components? (Select 3 answers) - Router - Ethernet frame - IP address - TCP/UDP protocols - Packet - Network switch

- Router - IP address - Packet

Which of the following answers refer to the OSI network layer components? - Router - Ethernet frame - IP address - TCP/UDP protocols - Packet - Network switch

- Router - IP address - Packet

A dedicated local network consisting of devices providing data access is called: - SDN - NAS - iSCSI - SAN

- SAN

Which of the following answers refers to a solution that simplifies large network infrastructure management through the use of software? - mGRE - SDWAN - MPLS - EIGRP

- SDWAN

A network protocol for secure file transfer over Secure Shell (SSH) is called: - TFTP - SFTP - Telnet - FTPS

- SFTP

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? - L2TP - BGP - RSTP - SIP

- SIP

Which of the following allows a network node to autoconfigure an IPv6 address in the absence of a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server? - APIPA - CIDR - NetBEUI - SLAAC

- SLAAC

Which of the following protocols runs on TCP port 445? - HTTPS - SMB/CIFS - IMAP - H.323

- SMB/CIFS

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as: - TFTP - SSH - Telnet - RDP

- SSH

Which of the answers listed below refers to a secure replacement for Telnet? - CHAP - FTP - SNMP - SSH

- SSH

Unblocking TCP port 22 enables what type of traffic? (Select 2 answers) - FTPS - SSH - SFTP - FTP - HTTP

- SSH - SFTP

What are the characteristic features of the secure version of IMAP? (Select all that apply) - TCP port 143 - Secure Sockets Layer (SSL) - TCP port 993 - Transport Layer Security (TLS) - TCP port 995

- Secure Sockets Layer (SSL) - TCP port 993 - Transport Layer Security (TLS)

The SMTP protocol is used for: (Select 2 answers) - Sending email messages between mail servers - Name resolution services - Serving of web pages - Retrieving email messages from mail servers - Sending email messages from a client device

- Sending email messages between mail servers - Sending email messages from a client device

Authentication and authorization take place at what layer in the OSI model? - Application layer - Network layer - Session layer - Presentation layer

- Session layer

Layer 5 of the OSI model is also referred to as what?

- Session layer

Layer 5 of the OSI model is also referred to as: - Session layer - Application layer - Transport layer - Presentation layer

- Session layer

Which OSI layer assumes th responsibility fo opening, closing and maintaining connections between applications? - Network layer - Data link layer - Apllication layer - Session layer

- Session layer

Which OSI layer assumes the responsibility for opening, closing, and maintaining connections between applications? - Network layer - Data link layer - Application layer - Session layer

- Session layer

Authentication and authorization take place at the: - Application layer of the OSI model - Network layer of the OSI model - Session layer of the OSI model - Presentation layer of the OSI model

- Session layer of the OSI model

Which of the answers listed below refer(s) to the characteristic feature(s) of SFP? (Select all that apply) - Small form factor transceiver - Converts electrical signals to optical signals - Data transfer of 10 Gbps - Newer transceiver type that replaces GBIC - Modular (hot swappable) interface - Converts optical signals to electrical signals - Fixed physical interface - Data transfer of 1 Gbps

- Small form factor transceiver - Converts electrical signals to optical signals - Newer transceiver type that replaces GBIC - Modular (hot swappable) interface - Converts optical signals to electrical signals - Data transfer of 1 Gbps

Which of the following answers refer to examples of network layer header data? (Select 2 answers) - Source IP address - Destination IP address - Source port number - Destination port number

- Source IP address - Destination IP address

Which of the following answers refer to the OSI layer 2 header data? (Select 2 answers) - Destination port number - Source MAC address - Destination MAC address - Source port number

- Source MAC address - Destination MAC address

Which of the following network topologies is most commonly used in contemporary Ethernet LANs? - Bus topology - Star topology - Ring topology - Mesh topology

- Star topology

Which of the following allows to determine which network segment an IP address belongs to? - Physical address - Dynamic Host Configuration Protocol (DHCP) - Address Resolution Protocol (ARP) - Subnet mask

- Subnet mask

Which of the answers listed below refers to a data link device designed to forward frames between network segments? - Hub - Switch - Firewall - Router

- Switch

Which of the answers listed below refers to a data link layer device designed to forward frames between network segments? - Hub - Switch - Firewall - Router

- Switch

Post Office Protocol v3 (POP3) uses: - TCP port 110 - UDP port 123 - TCP port 143 - UDP port 161

- TCP port 110

Which port enables the FTP's Data Connection for sending file data? - UDP port 20 - TCP port 20 - UDP port 21 - TCP port 21

- TCP port 20

SSH protocol runs on: - TCP port 21 - UDP port 22 - TCP port 20 - TCP port 22

- TCP port 22

A network technician uses Remote Desktop Protocol (RDP) client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? - TCP port 1720 - TCP port 636 - TCP port 3389 - TCP port 445

- TCP port 3389

Which of the following answers refer to the characteristic features of bus topology? (Select 3 answers) - Each network node connects to exactly two other nodes - The main network cable becomes a single point of failure - Data is passed through each intermediate node until the receiver node is reached - All network nodes connect to a single central cable (a.k.a. backbone or trunk) - Each node becomes a network's single point of failure - A terminator at each end of the main network cable prevents collisions caused by signal bounce

- The main network cable becomes a single point of failure - All network nodes connect to a single central cable (a.k.a. backbone or trunk) - A terminator at each end of the main network cable prevents collisions caused by signal bounce

What are the characteristic features of the 10BASE-T Ethernet standard? (Select 3 answers) - BNC connector - Transfer rate of 10 Mbps over two-pair Category 3 or better UTP cable - Maximum cable segment length of 100 meters - RJ45 connector - Transfer rate of 100 Mbps over two-pair Category 5 or better UTP cable - Maximum cable segment length of 185 meters

- Transfer rate of 10 Mbps over two-pair Category 3 or better UTP cable - Maximum cable segment length of 100 meters - RJ45 connector

Which of the answers listed below refer to the characteristics of multimode fiber optics? (Select 3 answers) - Uses laser as the source of light - Transmission distances of up to 2 km - More expensive than single-mode fiber optics - Transmission distances of up to 100 km - Less expensive than single-mode fiber optics - Uses LED as the source of light

- Transmission distances of up to 2 km - Less expensive than single-mode fiber optics - Uses LED as the source of light

A double colon in an IPv6 address indicates that part of the address containing only zeros has been compressed to make the address shorter. - True - False

- True

A type of network topology that combines two or more differing standard network topologies is referred to as a hybrid network topology. - True - False

- True

An IP address that doesn't correspond to any actual physical network interface is called a virtual IP address (VIP/VIPA). - True - False

- True

Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IPv4 address and subnet mask when Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA-assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA-assigned address cannot connect to the Internet). - True - False

- True

Category 7 is a twisted-pair cabling standard featuring improved specifications for canceling crosstalk and system noise. As in Cat 6a, Cat 7 cabling offers 10 Gbps data transfer rate over a cable segment length of 100 meters in 10GBASE-T networks. Category 7 standard introduces new connector types (the GG45 and TERA connector). Cat 7 cabling has not seen a widespread consumer market adoption yet, because all manufacturers of active equipment and network cards prefer Cat 6a standard which offers similar performance and takes advantage of the traditional RJ45 connector. - True - False

- True

In 10GBASE-T networks, Category 6 (Cat 6) UTP cabling supports a 10 Gbps data transfer rate at a limited range of 33-55 meters, whereas Cat 6a (augmented) cabling allows for 10 Gbps data transfer rate over a cable segment length of 100 meters. - True - False

- True

In a network using subnets, the term "Default gateway" refers to a network device that enables exchange of data between hosts residing in different subnets. - True - False

- True

In the OSI model, the payload data (a.k.a. user data) is the actual data that is being nested between header and tail control information. - True - False

- True

Secure File Transfer Protocol (SFTP) is an extension to the Secure Shell (SSH) protocol and runs by default on TCP port 22. - True - False

- True

The 66 block (older type/primarily used in analog telephone systems) and the 110 block (newer type/used in computer networks) are examples of punchdown blocks used for connecting sets of wires. - True - False

- True

The Internet is an example of a large public WAN. - True - False

- True

The general feature of all twisted-pair cabling types is that wires inside the cable are grouped into pairs and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk). - True - False

- True

The main difference between the UTP and STP cabling is that STP cable takes advantage of additional protective cover reducing signal interference from outside sources. - True - False

- True

The shape and angle of the tip of a fiber-optic connector can have an impact on the performance of a fiber-optic communication link. The two basic types of fiber end are Ultra Physical Contact (UPC) and Angled Physical Contact (APC). In the UPC-type connector, the connector end is polished with no angle, while APC connectors feature a fiber end polished at an 8-degree angle, which results in better performance. - True - False

- True

The term "Dual-stack IP" refers to a solution that relies on implementing both IPv4 and IPv6 protocol stacks on various network devices to facilitate seamless migration from IPv4 to IPv6. - True - False

- True

Which of the IPsec modes provides entire packet encryption? - Tunnel - Payload - Transport - Default

- Tunnel

Which of the answers listed below refer(s) to UTP cabling? (Select all that apply) - Twisted-pair copper cabling - Used in Ethernet networks and telephone systems - Low cost and ease of installation - Takes advantage of additional protective cover reducing signal interference from outside sources - Coaxial cabling - Not surrounded by any shielding that would provide protection against interference from outside sources - Fiber-optic cabling - In Ethernet networks, installed with RJ45 connector type

- Twisted-pair copper cabling - Used in Ethernet networks and telephone systems - Low cost and ease of installation - Not surrounded by any shielding that would provide protection against interference from outside sources - In Ethernet networks, installed with RJ45 connector type

Which of the protocols listed below reside at the OSI transport layer? - UDP - IP - SSL/TLS - ICMP - TCP - ATM

- UDP - TCP

Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers) - UDP - IP - SSL/TLS - ICMP - TCP - ATM

- UDP - TCP

Dynamic Host Configuration Protocol (DHCP) runs on: (Select 2 answers) - UDP port 53 - UDP port 67 - UDP port 68 - UDP port 69 - UDP port 161

- UDP port 67 - UDP port 68

A type of network traffic intended for a single host identified by a unique IP address is referred to as: - Unicast - Anycast - Multicast - Broadcast

- Unicast

Which of the answers listed below refer to the RJ11 connector? (Select 2 answers) - Used with telephone cabling - Twisted-pair copper cabling connector - Used with Ethernet network cabling - Fiber-optic cabling connector - Coaxial cabling connector

- Used with telephone cabling - Twisted-pair copper cabling connector

Which of the following answers refer to the 100BASE-SX standard? (Select 3 answers) - Uses LED as the source of light - Multimode fiber - Maximum cable segment length of up to 2 kilometers - Single-mode fiber - Uses laser as the source of light

- Uses LED as the source of light - Multimode fiber - Maximum cable segment length of up to 300 meters

Which of the following answers refer to the characteristic features of the 40GBASE-T Ethernet standard? (Select 3 answers) - Uses all four pairs of wires in a cable for data transmission - Twisted-pair copper cabling - 40 Gbps transfer rate over a maximum cable segment length of 30 meters (Cat 8 cabling) - Single-mode fiber-optic cable - 40 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 8 cabling) - Uses two pairs of wires in a cable for data transmission - 40 Gbps transfer rate over a maximum cable segment length of 100 meters (Cat 7 cabling) - Multimode fiber-optic cable

- Uses all four pairs of wires in a cable for data transmission - Twisted-pair copper cabling - 40 Gbps transfer rate over a maximum cable segment length of 30 meters (Cat 8 cabling)

Which of the following answers refer to the 10GBASE-SR Ethernet standard? (Select 3 answers) - Uses laser as the source of light - Multimode fiber - Maximum cable segment length of up to 400 meters - Uses LED as the source of light - Maximum cable segment length of up to 10 kilometers - Single-mode fiber

- Uses laser as the source of light - Multimode fiber - Maximum cable segment length of up to 400 meters

What are the characteristic features of the 10GBASE-LR Ethernet standard? (Select 3 answers) - Uses laser as the source of light - Single-mode fiber - Maximum cable segment length of up to 10 kilometers - Uses LED as the source of light - Maximum cable segment length of up to 400 meters- - Multimode fiber

- Uses laser as the source of light - Single-mode fiber - Maximum cable segment length of up to 10 kilometers

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes? - DNAT - VLSM - MPLS - VLAN

- VLSM

A computer network connecting multiple smaller networks over very large geographical areas is known as: - PAN - WLAN - MAN - WAN

- WAN

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called: - MAN - WLAN - LAN - VLAN

- WLAN

Layer 2 of the OSI model is also referred to as what?

Data link layer

The Physical layer of the OSI model is also known as?

Layer 1

Which of the following terms refers to the OSI network layer?

Layer 3

Layer 4 of the OSI model is also known as what?

Transport layer


Related study sets

LSU BIOL 1202 - Ch. 23 Mastering Biology Answers

View Set

Accounting Chapter 11: Reporting and Analyzing Stockholders Equity

View Set

ASTR 1050-01 | Survey of Astronomy Exam 01 Review

View Set

Chapter 19: Cardiovascular System: The Heart

View Set

Political Science 369: Chapter #8

View Set