Test 2 ch5-8 RQ
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
NFC (Near Field Communication)
A form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).
Which fiber transceiver is the same size as SFP transceivers, but can support network speeds over 10 Gbps?
SFTP
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
What bluetooth class has the highest power output?
Class 1
What kind of cable uses BNC connectors? Which connector is likely to be used by cable Tv?
Coaxial Cable, F-connector
What characteristics of optical transmissions is primarily responsible for the distance limitations of fiber-optic cabling?
Cost and optical loss
List two advantages to using virtualization on a network.
Efficient use of resources/Cost and energy savings.
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi, so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called " Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil Twin
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHSS(Frequency hopping Spread Spectrum)
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Fiber Type mismatch
You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide internet access for their parent while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?
Guest Networking
What feature of a site survey maps the Wi-Fi signals and other noise in your location?
Heat Map
Which tunneling protocol is a component of the IPsec protocol suite?
IKEvz (internet key exchange)
Which one of the following wireless transmission types requires a clear LOS to function?
Infrared
what fiber is used in fiber-optic cabling to protect the inner core and prevent the cable from stretching?
Kevlar (polymeric fiber)
What is twist ratio and why is it important?
The number of twist per meter is know as twist ratio. The more twist per meter, the more it is resistant to cross talk.
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
White/Green
To exchange information, two antennas must be tuned to the same_____
Frequency
802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size channels does 802.11ac support?
120
Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States?
5 GHZ
Which 802.11 standard functions in both the 2.4- GHz and 5- GHz bands?
802.11n
what is the difference between short circuits and open circuits?
A Short Circuit is an unwanted connection, such as when exposed wires touch each other. An Open Circuit is one where needed connection are missing, such as when a wire break.
SFTP (Secure File Transfer Protocol)
A protocol available with the proprietary version of SSH that copies files between hosts securely. Like FTP, SFTP first establishes a connection with a host and then allows a remote user to browse directories, list files, and copy files. Unlike FTP, SFTP encrypts data before transmitting it.
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
CAT6a
FHSS (Frequency Hopping Spread Spectrum)
A type of radio transmission in which a signal is sent on one channel at a time, and at predetermined fiXed intervals, the channel changes.
Which IoT wireless standard is used to sync data from a smartwatch, bike, computer and smart phone to a single user account?
ANT+
Which transmission characteristic is never fully achieved?
Bandwidth
A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
BlueSnarfing
What kind of tool can measure the distance to the location of damage in a cable?
CABLE PERFORMANCE TESTER, line testers, certifier or network tester.
Which of these categories of twisted-pair cable can support gigabit ethernet?
CAT 5e, 6a, 7
What is the lowest layer of the OSI model at which wired and wireless transmission share the same protocols?
Layer 3
Which fiber connector contains two strands of fiber in each ferrule?
MTRJ (mechanical transfer registered jack)
With which network connection type does the VM obtain IP addressing information from its host?
NAT Mode
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT (near end cross talk)
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
Which remote access protocol is used over an ethernet network?
PPPoe
Which transport layer protocol does PPTP use?
PPTP uses TCP and L2TP uses UDP
Which cloud computing services model gives software developers access to multiple operating systems for testing?
Paas
Which port must be open for RDP traffic to cross a firewall?
Por 3389
How is latency measured and in what unit?
RTT The delay from when the data leave the source and when it arrives, the unit is called RTT (round trip time)
When a wireless signal encounters a large obstacle, what happens to the signal?
Reflection or bounce back
what kind of device is used to configure and manage physical and virtual networking devices across the network?
SDN
Which remote file access protocol is an extension of SSH?
SFTP
Suppose you're assisting with a cable installation using fiber-optic cabling that will support Gigabit ethernet. You're approved to install segments up to 4000 m in length. What kind of cable are you using?
SMF
Which current protocol is used to create secure transmissions for HTTP growing sessions?
SSL/TSL
Which kind of Multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?
Secure Socket Tunneling Protocol (SSTP)
Why is SMF more efficient over long distances than MMF?
Signals traveling over multimode fiver experience greater attenuation than those traversing single mode.
why do APC ferrules create less back reflection than UPC ferrules?
The end faces are placed at an angle to each other.
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Tone Locator or Probe
Which type of hypervisor is installed on bare metal?
Type 1
Which kind of antenna is used in a point-to-point link, especially over long distances?
Unidirectional Antenna
How does a vNIC get a MAC address?
Upon creation, each vNIC is automatically assigned a MAC address
Which terminal emulation protocol is similar to TDP but is open source?
VNC
What service in windows server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
direct access
What software allows you to define VM's and manage resource allocation and sharing among them on a host computer?
hypervisor
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
integrity
You've just competed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
rogue AP (access point)
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
switch (virtual switch