Test 2 ch5-8 RQ

Ace your homework & exams now with Quizwiz!

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

NFC (Near Field Communication)

A form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).

Which fiber transceiver is the same size as SFP transceivers, but can support network speeds over 10 Gbps?

SFTP

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

What bluetooth class has the highest power output?

Class 1

What kind of cable uses BNC connectors? Which connector is likely to be used by cable Tv?

Coaxial Cable, F-connector

What characteristics of optical transmissions is primarily responsible for the distance limitations of fiber-optic cabling?

Cost and optical loss

List two advantages to using virtualization on a network.

Efficient use of resources/Cost and energy savings.

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi, so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called " Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil Twin

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?

FHSS(Frequency hopping Spread Spectrum)

What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber Type mismatch

You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide internet access for their parent while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests?

Guest Networking

What feature of a site survey maps the Wi-Fi signals and other noise in your location?

Heat Map

Which tunneling protocol is a component of the IPsec protocol suite?

IKEvz (internet key exchange)

Which one of the following wireless transmission types requires a clear LOS to function?

Infrared

what fiber is used in fiber-optic cabling to protect the inner core and prevent the cable from stretching?

Kevlar (polymeric fiber)

What is twist ratio and why is it important?

The number of twist per meter is know as twist ratio. The more twist per meter, the more it is resistant to cross talk.

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

White/Green

To exchange information, two antennas must be tuned to the same_____

Frequency

802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size channels does 802.11ac support?

120

Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States?

5 GHZ

Which 802.11 standard functions in both the 2.4- GHz and 5- GHz bands?

802.11n

what is the difference between short circuits and open circuits?

A Short Circuit is an unwanted connection, such as when exposed wires touch each other. An Open Circuit is one where needed connection are missing, such as when a wire break.

SFTP (Secure File Transfer Protocol)

A protocol available with the proprietary version of SSH that copies files between hosts securely. Like FTP, SFTP first establishes a connection with a host and then allows a remote user to browse directories, list files, and copy files. Unlike FTP, SFTP encrypts data before transmitting it.

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?

CAT6a

FHSS (Frequency Hopping Spread Spectrum)

A type of radio transmission in which a signal is sent on one channel at a time, and at predetermined fiXed intervals, the channel changes.

Which IoT wireless standard is used to sync data from a smartwatch, bike, computer and smart phone to a single user account?

ANT+

Which transmission characteristic is never fully achieved?

Bandwidth

A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?

BlueSnarfing

What kind of tool can measure the distance to the location of damage in a cable?

CABLE PERFORMANCE TESTER, line testers, certifier or network tester.

Which of these categories of twisted-pair cable can support gigabit ethernet?

CAT 5e, 6a, 7

What is the lowest layer of the OSI model at which wired and wireless transmission share the same protocols?

Layer 3

Which fiber connector contains two strands of fiber in each ferrule?

MTRJ (mechanical transfer registered jack)

With which network connection type does the VM obtain IP addressing information from its host?

NAT Mode

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT (near end cross talk)

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

NFC

Which remote access protocol is used over an ethernet network?

PPPoe

Which transport layer protocol does PPTP use?

PPTP uses TCP and L2TP uses UDP

Which cloud computing services model gives software developers access to multiple operating systems for testing?

Paas

Which port must be open for RDP traffic to cross a firewall?

Por 3389

How is latency measured and in what unit?

RTT The delay from when the data leave the source and when it arrives, the unit is called RTT (round trip time)

When a wireless signal encounters a large obstacle, what happens to the signal?

Reflection or bounce back

what kind of device is used to configure and manage physical and virtual networking devices across the network?

SDN

Which remote file access protocol is an extension of SSH?

SFTP

Suppose you're assisting with a cable installation using fiber-optic cabling that will support Gigabit ethernet. You're approved to install segments up to 4000 m in length. What kind of cable are you using?

SMF

Which current protocol is used to create secure transmissions for HTTP growing sessions?

SSL/TSL

Which kind of Multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

Secure Socket Tunneling Protocol (SSTP)

Why is SMF more efficient over long distances than MMF?

Signals traveling over multimode fiver experience greater attenuation than those traversing single mode.

why do APC ferrules create less back reflection than UPC ferrules?

The end faces are placed at an angle to each other.

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone Locator or Probe

Which type of hypervisor is installed on bare metal?

Type 1

Which kind of antenna is used in a point-to-point link, especially over long distances?

Unidirectional Antenna

How does a vNIC get a MAC address?

Upon creation, each vNIC is automatically assigned a MAC address

Which terminal emulation protocol is similar to TDP but is open source?

VNC

What service in windows server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

direct access

What software allows you to define VM's and manage resource allocation and sharing among them on a host computer?

hypervisor

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

integrity

You've just competed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

rogue AP (access point)

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

switch (virtual switch


Related study sets

Davies REVIEW (Questions Only-RD)

View Set

Chapter 14 trasquetball questions

View Set

Section 6.2: Percent Equations and Percent Increase and Decrease

View Set