Term
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? |
|
Definition
|
|
Term
Which network topology is the most common? |
|
Definition
|
|
Term
Any computer or device on a network that can be addressed on the local network is referred to as a: |
|
Definition
|
|
Term
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? |
|
Definition
|
|
Term
What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network? |
|
Definition
|
|
Term
Servers that have a NOS installed require less memory, processing power, and storage capacity that clients because servers are called on to handle only light processing loads and requests from multiple clients. |
|
Definition
|
|
Term
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. |
|
Definition
|
|
Term
Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications? |
|
Definition
|
|
Term
____ networks are the most popular type of network for medium- and large-scale organizations. |
|
Definition
|
|
Term
Which of the following applications would be best suited to multicasting? |
|
Definition
|
|
Term
Select the IPv6 address below that indicates a global unicast address: |
|
Definition
|
|
Term
A loopback IP address begins with what number? |
|
Definition
|
|
Term
Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. |
|
Definition
|
|
Term
IPv6 address consists of how many bits: |
|
Definition
|
|
Term
Which of the following parameters is used in the ping utility for setting the size of an ICMP packet? |
|
Definition
|
|
Term
What is the range assigned to Registered Ports? |
|
Definition
|
|
Term
What do the first 24 bits of a MAC address represent? |
|
Definition
|
|
Term
Select the protocol below that is used to synchronize clocks on computers on a network: |
|
Definition
|
|
Term
|
Definition
|
|
Term
____ is more efficient than TCP for carrying messages that fit within one data packet. |
|
Definition
|
|
Term
What kind of route is created when a network administrator configures a router to use a specific path between nodes? |
|
Definition
|
|
Term
At what layer of the OSI model would a TCP or UDP header be added to a payload? |
|
Definition
|
|
Term
In which of the following situations would it be most desirable to use a connectionless Transport layer protocol? |
|
Definition
|
|
Term
What happens when a router receives a packet with a TTL of 0? |
|
Definition
|
|
Term
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding? |
|
Definition
|
|
Term
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? |
|
Definition
|
|
Term
Which OSI layer is responsible for directing data from one LAN to another? |
|
Definition
|
|
Term
A routing protocol’s reliability and priority are rated by what measurement? |
|
Definition
|
|
Term
In what part of a structured cabling system would you find users’ desktop computers? |
|
Definition
|
|
Term
Which of the following options is not a likely source of electromagnetic interference? |
|
Definition
|
|
Term
What cable type comes in two different modes, single mode and multimode? |
|
Definition
|
|
Term
Select the two terms below that are used to describe a UPS that provides continuous voltage to a device by switching virtually instantaneously to the battery when it detects a loss of power (select 2): |
|
Definition
|
|
Term
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? |
|
Definition
|
|
Term
The standard that describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system, can be referred to by what two options below? (select 2) |
|
Definition
|
|
Term
Many network problems can be traced to poor cable ____ techniques. |
|
Definition
|
|
Term
A device that is responsible for modulating digital signals into analog signals, and demodulating analog signals into digital signals at the receiving end, is known as? |
|
Definition
|
|
Term
What part of a cable protects it against environmental damage? |
|
Definition
|
|
Term
A measure of a signal's strength at any given time is known as which term below? |
|
Definition
|
|
Term
What is different about the method used to boost a digital signal’s strength, compared with the method of boosting an analog signal’s strength? |
|
Definition
|
|
Term
Using DWDM, a single fiber can carry between what two numbers of channels? |
|
Definition
|
|
Term
Which type of cross-talk occurs between wire pairs near the source of a signal? |
|
Definition
|
|
Term
The term "site survey" refers to: |
|
Definition
|
|
Term
If your wireless stations are configured to perform passive scanning, what do they need from an access point to initiate association? |
|
Definition
|
|
Term
What frequency band is used by 802.11b, 802.11g, and 802.11n? |
|
Definition
|
|
Term
Which of the following can operate at 5 GHz frequency range? (Select 2) |
|
Definition
|
|
Term
In the 802.11 standard, IEEE specifies what type of access method? |
|
Definition
|
|
Term
Your organization is expanding and plans to lease 3000 square feet of space in a nearby building. Your supervisor asks you to conduct a site survey of the space. If conducted properly, which of the following will your site survey reveal? |
|
Definition
|
|
Term
Select below the name for the special signal that contains information that a wireless node requires in order to associate itself with an access point: |
|
Definition
|
|
Term
Which IEEE standard specifies security mechanisms for wireless networks? |
|
Definition
|
|
Term
Which cloud computing service model gives software developers access to multiple operating systems for testing? |
|
Definition
|
|
Term
Which of the following meet the requirements for two-factor authentication process? |
|
Definition
|
|