Term
Anything greater than ___ will show up as a Beat in analog picture. A. 30dB B. -30dB C. 30dBmV D. -30dBmV |
|
Definition
|
|
Term
Which statement is True? A. A Key system is sometimes referred to as a phone switch. B. PBX's are usually found in small companies where fewer features are required. C. You Usually dial "9" for an outside line with a PBX phone. D. None of the above. |
|
Definition
|
|
Term
With 100' of RG-6 Drop Cable what would the max. loss be (for test answer)? A. 3db B. 4db C. 5db D. 6db |
|
Definition
|
|
Term
If Two APs reply to the probe, the laptop will use whichever has the___ Signal. A. Stronger B. Weaker C. More Secure D. None of the above |
|
Definition
|
|
Term
CLI Figure of Merit of ___ or Less. A. 16 B. 32 C. 64 D. 128 |
|
Definition
|
|
Term
A wireless network begins with a(n). A. Comcast Tech B. An IP C. Workgroup D. An Access Point |
|
Definition
|
|
Term
Look for sections of code triggered by time or date events, routines to search for files such as; .com, .exe, .bat, & .vbs. A. Exe Virus' B. Heuristic Detectors C. Worms D. Trojan Horses |
|
Definition
|
|
Term
Name the 4 actions that Virus' generally Perform. A. Executable, E-mail, Worms, Trojan Horse. B. Corrupting Programs, Looking For System Weakness', Changing Bios Settings C. Replication, Event Watching, Camouflage, Delivery. D. Deleting Files, Corrupting Files, Replication, Embedding. |
|
Definition
|
|
Term
Name the 4 Delivery Methods for Virus'. A. Executable, E-mail, Worms, Trojan Horse. B. Corrupting Programs, Looking For System Weakness', Changing Bios Settings C. Replication, Event Watching, Camouflage, Delivery. D. Deleting Files, Corrupting Files, Replication, Embedding. |
|
Definition
|
|
Term
Voice Equipment Telemetry Wiring Pattern (Colors) A. Green, Red, Yellow, Black B. Blue, Orange, White, Brown, Green C. Brown, Green, Blue, Orange, White D. White, Brown, Blue, Orange, Green |
|
Definition
|
|
Term
A _____ Uses an antenna-equipped expansion card or a USB antenna attachment. A. Router B. Desktop PC C. Gateway D. Switch |
|
Definition
|
|
Term
A mathmatical value derived from the number & severity of leaks in the cable system. A. CLI B. dBmV C.dB D. Leakage |
|
Definition
|
|
Term
What does CLI stand for? A. Computer & Laptop Instruments B. Common Leakage Index C. Cumulative Leakage Index D. Cable Leakage Index |
|
Definition
|
|
Term
[image] What is this? A.66 Block B. RJ-21X C. RJ-26X D 16 Block |
|
Definition
|
|
Term
What does ILEC stand for? A. Internal Local Exchange Carrier B. International Local Exchange Carrier C. Incumbent Logical Exchange Carrier D. Incumbent Local Exchange Carrier |
|
Definition
|
|
Term
[image] What is this? A. 66 Block B. RJ-21X C. RJ-26X D ILEC |
|
Definition
|
|
Term
Business Class EMTA Loop Voltage? A. 110v B. 90v C. 120v D. 48v |
|
Definition
|
|
Term
What is a RJ45 used for? A. Telephony B. Internet C. Cable D. Fax Machines |
|
Definition
|
|
Term
What is the REN max for BCDV? A.6 B.12 C.24 D.36 |
|
Definition
|
|
Term
How many call events can a BCDV 8 line emta handle? A.14 B.18 C.8 D.16 |
|
Definition
|
|
Term
An Alarm Telemetry block pinout #2 means? A.A/C Fail B.Battery is low C.Replace Battery D. Battery is missing |
|
Definition
|
|
Term
An Alarm on Telemetry block pinout #1 means? A.A/C Fail B.Battery is low C.Replace Battery D. Battery is missing |
|
Definition
|
|
Term
An Alarm Telemetry block pinout #3 means? A.A/C Fail B.Battery is low C.Replace Battery D. Battery is missing |
|
Definition
|
|
Term
An Alarm Telemetry block pinout #4 means? A.A/C Fail B.Battery is low C.Replace Battery D. Battery is missing |
|
Definition
|
|
Term
RJ11 has & uses how many pins? A.4 & uses 2 B.6 & uses 2 C.6 & uses 4 D.8 & uses 8 |
|
Definition
|
|
Term
RJ14 has how many pins? A.2 B.4 C.6 D.8 |
|
Definition
|
|
Term
RJ25 has how many pins? A.2 B.4 C.6 D.8 |
|
Definition
|
|
Term
RJ45 has how many pins? A.2 B.4 C.6 D.8 |
|
Definition
|
|
Term
Codecs: A.Decrypt Passwords B.Interprept HTML C.Compression/Decompression D.Email Virus |
|
Definition
|
|
Term
MPOE: A.Minimum Point of Entry B.Minimum Point of Exit C.Multiple Point of Entry D. Multiple Point of Exit |
|
Definition
|
|
Term
Commercial Demarcation Point for BCDV? A.Tap B.Workstation C.EMTA D.MPOE |
|
Definition
|
|
Term
BCDV Point of Demarcation if Customer owned EMTA? A.66Block and/or jack of EMTA B.Coaxial Input C.Switch or PBX D.None of the Above |
|
Definition
|
|
Term
BCDV Point of Demarcation if Comcast owned EMTA? A.66Block and/or jack of EMTA B.Coaxial Input C.Switch or PBX D.None of the Above |
|
Definition
|
|
Term
Backup Battery time for 8 Line EMTA? A.4hrs. B.6hrs. C.8hrs. D.12hrs. |
|
Definition
|
|
Term
What does NGT stand for? A.Network Gateway Terminal B.Network Gateway Telemetry C.New Global Telemetry D.New Global Telecom |
|
Definition
|
|
Term
MAC: A.Multiple Access Control B.Media Access Control C.Multiple Access Communications D.Media Access Comminicaions |
|
Definition
|
|
Term
AP: A.Access Point B.Address Point C.Address Protocol D.Access Protocol |
|
Definition
|
|
Term
POP: A.Proof of Purchase B.Point of Purchase C.Proof of Performance D.Point of Proxy |
|
Definition
|
|
Term
Consider IP address 150.215.017.009 the 1st set (150.215) represents? A.Network B.User C.Gateway D.Host |
|
Definition
|
|
Term
Consider IP address 150.215.017.009 the 2nd set (017.009) represents? A.Network B.User C.Gateway D.Host |
|
Definition
|
|
Term
IP Addresses contained within a subnetwork (Lowest in value to highest)? A.Network,Gateway,Broadcast,Routable B.Routable,Gateway,Broadcast, Network C.Network,Routable,Gateway,Broadcast D.Broadcast,Gateway,Routable,Network |
|
Definition
|
|
Term
Consider the IP Address 216.239.51.99 which set represents the Gateway? A.216 B.239 C.51 D.99 |
|
Definition
|
|
Term
Consider the IP Address 216.239.51.99 which set represents the Routable? A.216 B.239 C.51 D.99 |
|
Definition
|
|
Term
Consider the IP Address 216.239.51.99 which set represents the Broadcast? A.216 B.239 C.51 D.99 |
|
Definition
|
|
Term
Consider the IP Address 216.239.51.99 which set represents the Network? A.216 B.239 C.51 D.99 |
|
Definition
|
|
Term
VPN: A.Virus Protected Network B.Virtual Private Network C.Virtual Public Network D.Very Private Network |
|
Definition
|
|
Term
LAN: A.Local Area Network B.Logical Area Network C.Local Application Network D.Logical Appication Network |
|
Definition
|
|
Term
WAN: A.World Application Networking B.World Area Networking C.Wide Application Network D.Wide Area Network |
|
Definition
|
|
Term
A System of Computers, peripherials, terminals, & databases connected by communication lines: A.Workstations B.Network C.WAN D.Office |
|
Definition
|
|
Term
A program that sends information about you and how you use your pc to marketers & advertisers, usually without your knowledge. A.E-Mail B.Worms C.Spyware D.Trojan Horse |
|
Definition
|
|
Term
Virus contained in an E-Mail or its attachments. Sends itself through address book. A.E-Mail B.Worms C.Spyware D.Trojan Horse |
|
Definition
|
|
Term
A small program that claims to be something it's not(like a game), but when run it does damage (sending emails & erasing files) A.Executable B.E-Mail C.Worms D.Trojan Horse |
|
Definition
|
|
Term
Packet Filtering, Proxy, & Stateful Inspection are examples of: A.Virus' B.Admin Rights C.Firewall Rules D.Virus Entries |
|
Definition
|
|
Term
Software uses computer networks & security holes to replicate itself. A.E-Mail B.Worms C.Spyware D.Trojan Horse |
|
Definition
|
|
Term
Virus software that piggybacks on real programs; When program runs, so does virus. A.Executable B.E-Mail C.Worms D.Trojan Horse |
|
Definition
|
|
Term
Inserts copies of itself into other program files & copies itself. A.Replication B.Event Watching C.Camouflage D. Delivery |
|
Definition
|
|
Term
Checks for conditions (usually specific date) when conditions are met delivers its destructive payload. A.Replication B.Event Watching C.Camouflage D. Delivery |
|
Definition
|
|
Term
Disguise themselves to avoid antivirus detection. May falsify info in header so program file appears to be the correct size. A.Replication B.Event Watching C.Camouflage D. Delivery |
|
Definition
|
|
Term
When triggering condition is met, virus unleashes payload. May be harmless or destructive. A.Replication B.Event Watching C.Camouflage D. Delivery |
|
Definition
|
|
Term
NAT: A.Network Addressability Tunnel B.Network Address Transition C.Network Address Translation D.Network Addressibility Transition |
|
Definition
|
|
Term
Technique by which several hosts or computers share a single ip address for access to the internet. Uses one set of IP's for internal & 2nd set for external traffic. A.NAT B.PAT C.VPN D.LAN |
|
Definition
|
|
Term
Forwards requests for a particular IP port pair to another IP port pair. A.NAT B.PAT C.VPN D.LAN |
|
Definition
|
|
Term
PAT: A.Port Addressability Tunnel B.Port Address Transition C.Port Addressibility Transition D.Port Address Translation |
|
Definition
|
|
Term
FTP uses what Port? A.20 B.21 C.80 or 8080 D.Both A&B |
|
Definition
|
|
Term
FTP generally uses which port for data transfer? A.20 B.21 C.80 or 8080 D.110 |
|
Definition
|
|
Term
Web traffic uses port? A.20 B.21 C.80 or 8080 D.110 |
|
Definition
|
|
Term
POP3 uses port? A.20 B.21 C.80 or 8080 D.110 |
|
Definition
|
|
Term
AIM uses port? A.5190 B.21 C.80 or 8080 D.110 |
|
Definition
|
|
Term
Assignable ports range from? A.1-256 B.1-512 C.1-65535 D.1-68025 |
|
Definition
|
|
Term
Start Continuous Pings: A.Ping (IP) B.Ping (IP)-l C.Ping (IP)-(# of pings) D.Ping (IP)-t |
|
Definition
|
|
Term
How to stop continuous ping: A.esc B.CTR C C.CTR/ALT/DEL D.END |
|
Definition
|
|
Term
Do a specific # of pings: A.Ping (IP) B.Ping (IP)-l C.Ping (IP)-(# of pings) D.Ping (IP)-t |
|
Definition
|
|
Term
HTTP port traffic: A.20 B.21 C.24 D.80 |
|
Definition
|
|
Term
Trace-Route: A.traceroute (IP) B.traceroute (IP)+# C.tracert(IP)+# D.tracert (IP) |
|
Definition
|
|
Term
When is Multi Line Hunt Group Set-up? A.Upon Provisioning B.Done @ time of work order creation C.After Job is complete D.Any of the above |
|
Definition
|
|
Term
3 parts of Fiber Optic Cable: A.Core, Fiber, Sheathing B.Fiber, Core, Coating C.Cladding, Center Conductor, Coating D. Coating, Cladding, Core |
|
Definition
|
|
Term
Used to provide regions with access to national HSD peers & to global Internet access via one or more transit providers. A.VPN B.Internet C.Internet Backbone D.WAN |
|
Definition
|
|
Term
Carries Comcast traffic from CRAN to CRAN. Comcast's Private Backbone. A.VPN B.Cbone C.Internet Backbone D.PAT |
|
Definition
|
|
Term
TP: A.Test Points B.Telnet Provider C.Telcom Provider D.Telphone Provider |
|
Definition
|
|
Term
FTP generally uses which port to listen to commands? A.20 B.21 C.80 or 8080 D.110 |
|
Definition
|
|
Term
DHCP: A.Digital Host Configuration Protocol B.Dynamic Host Configuration Proxy C.Dynamic Host Configuration Protocol D.Dynamic High-Speed Configuration Protocol |
|
Definition
|
|
Term
FQDN: A.Fully Qualified Domain Name B.First Qualified Domain Name C.Functional Quality Domain Name D.Fiber Quality Domain Name |
|
Definition
|
|
Term
DMZ: A.Demark Zone B.Demiliterized Zone C.Demarkation Zone D.None of the Above |
|
Definition
|
|
Term
NAS: A.Naval Air Systems B.Network Airport Service C.Network Attached Storage D.Network Attenuation Storage |
|
Definition
|
|
Term
Multi-Line Hunt Group: A.*63 & *83 B.*73 & *83 C.*110 & *111 D.*230 & *231 |
|
Definition
|
|
Term
Multi-Line Hunt Group (All Lines): A.*63 & *83 B.*73 & *83 C.*110 & *111 D.*232 & *233 |
|
Definition
|
|
Term
Call Hold: A.*52 B.*62 C.*55 D.*65 |
|
Definition
|
|
Term
Speed Dial 30 A.*67 B.*74 C.*75 D.*88 |
|
Definition
|
|
Term
Speed Dial 8 A.*67 B.*74 C.*75 D.*88 |
|
Definition
|
|
Term
Retrieve a Parked Call: A.*67 B.*74 C.*75 D.*88 |
|
Definition
|
|
Term
Caller ID Blocking (per call): A.*67 B.*74 C.*75 D.*88 |
|
Definition
|
|
Term
Anonymous Call Rejection: A.*63/*83 B.*72/*73 C.*77/*87 D.*230/*231 |
|
Definition
|
|
Term
Call Forward Variable: A.*63/*83 B.*72/*73 C.*77/*87 D.*230/*231 |
|
Definition
|
|
Term
Call Forward Selective: A.*63/*83 B.*72/*73 C.*77/*87 D.*230/*231 |
|
Definition
|
|
Term
Terminal Make Busy: A.*63/*83 B.*72/*73 C.*77/*87 D.*230/*231 |
|
Definition
|
|
Term
Direct to Voicemail: A.*23 Flash then *52 B. *23 Flash then *62 C. *22 Flash then *55 D. *22 Flash then *68 |
|
Definition
|
|
Term
To Park a Call: A.*23 Flash then *52 B. *23 Flash then *62 C. *22 Flash then *55 D. *22 Flash then *68 |
|
Definition
|
|
Term
Temporarly Cancel Call Waiting: A.*50 B.*60 C.*70 D.*80 |
|
Definition
|
|
Term
Do Not Disturb: A.*62/*63 B.*78/*79 C.*82/*83 D.*98/*99 |
|
Definition
|
|
Term
Caller ID Blocking/Allow per Call: A.*62/*63 B.*64/*74 C.*65/*75 D.*67/*82 |
|
Definition
|
|
Term
Base Maps: A.Shows streets with pole & pedestal locations. B.Provide the layout of the system in a condensed form. C.Resembles a street map, complete with featurs like lakes & rivers, streets, & boundaries. D.Shows the locations of the electronic equipment, including the headend & any hubs, also amplifiers, power supplies, & taps. |
|
Definition
|
|
Term
Strand Maps: A.Shows streets with pole & pedestal locations. B.Provide the layout of the system in a condensed form. C.Resembles a street map, complete with featurs like lakes & rivers, streets, & boundaries. D.Shows the locations of the electronic equipment, including the headend & any hubs, also amplifiers, power supplies, & taps. |
|
Definition
|
|
Term
Design Map: A.Shows streets with pole & pedestal locations. B.Provide the layout of the system in a condensed form. C.Resembles a street map, complete with featurs like lakes & rivers, streets, & boundaries. D.Shows the locations of the electronic equipment, including the headend & any hubs, also amplifiers, power supplies, & taps. |
|
Definition
|
|
Term
Amplifier Schematics or "Tree" Map: A.Shows streets with pole & pedestal locations. B.Provide the layout of the system in a condensed form. C.Resembles a street map, complete with featurs like lakes & rivers, streets, & boundaries. D.Shows the locations of the electronic equipment, including the headend & any hubs, also amplifiers, power supplies, & taps. |
|
Definition
|
|
Term
The Second Logical Backbone: A.Comcast Backbone B.CBone C.IBone D.Backbone |
|
Definition
|
|
Term
Another Name Of A Corrected Map: A.Strand Map B.As-Built C.Design Map D.Base Map |
|
Definition
|
|
Term
What is the pathway used for the actual light transmission? A.Center Conductor B.Fiber C.Cladding D.Core |
|
Definition
|
|
Term
How many hours a month are required to put into as a champion? A.4hrs. B.8hrs. C.20hrs. D.40hrs. |
|
Definition
|
|
Term
Digital compression separates pictures into how many types of video information? A.2 B.3 C.4 D.5 |
|
Definition
|
|
Term
What is DTCP? A.Digital Transport Cable Protection B.Digital Transfer Cable Provisioning C.Digital Transfer Content Protection D.Digital Transmission Content Protection |
|
Definition
|
|
Term
Wireless Connection Speeds A.10&48Mbps B.11&54Mbps C.10&64Mbps D.11&64Mbps |
|
Definition
|
|
Term
Wireless Network, data is transmitted via? A.WIFI B.Microwave C.Smoke signals D.Radio Waves |
|
Definition
|
|