Term
switches are when transmissions are broken into smaller fixed-length pieces and individually transmitted.
A -Cell
B -Light
C -Circuit
D -Packet
|
|
Definition
Cell switches are when transmissions are broken into smaller fixed-length pieces and individually transmitted. |
|
|
Term
Which distance can communication run on a coaxial thinnet cable before the signal degrades?
A -100 meters
B -185 meters
C -500 meters
D -10 kilometers
|
|
Definition
Coaxial thinnet cable can carry a signal 185 meters before the signal degrades. |
|
|
Term
Wireless bridging is a forwarding technique used in a packet-switched computer network.
|
|
Definition
Wireless bridging is a forwarding technique used in a packet-switched computer network. |
|
|
Term
The data rate of a computer network connection is measured in units of _______________.
A -P2P
B -bits per second
C -wavelengths per second
D -radio frequencies per second
|
|
Definition
The data rate of a computer network connection is measured in units of bits per second. |
|
|
Term
To set up a wireless network, a __________ is required.
A -router
B -DSL cable
C -wireless bridge
D -network topology
|
|
Definition
To set up a wireless network, a router is required. |
|
|
Term
Which is an example of a network security zone?
A -FTZ
B -MCS
C -GNS
D -DMZ
|
|
Definition
DMZ is an example of a network security zone.
|
|
|
Term
Which are examples of interchangeable terms used to describe computer network design? Choose all that apply.
A -Internet engineering
B -Network engineering
C -Electrical engineering
D -Wavelength engineering
E -Communications engineering
|
|
Definition
Internet engineering, network engineering, and communications engineering are all examples of interchangeable terms used to describe computer network design.
|
|
|
Term
Which are the two types of telephone services?
A -T1
B -DNS
C -PSTN
D -POTS
|
|
Definition
PSTN and POTS are the two types of telephone service.
|
|
|
Term
IPv6 dual stack involves running IPv4 and IPv6 at different times.
True
False
|
|
Definition
IPv6 dual stack does not involve running IPv4 and IPv6 at different times. |
|
|
Term
The Network Fundamentals exam is part of the __________ certification path.
A -Master Level
B -Associate Level
C -Specialist Level
D -Professional Level
|
|
Definition
The Network Fundamentals exam is part of the Associate Level certification path. |
|
|
Term
Packets are part of which layer in the OSI model?
A -1
B -2
C -3
D -4
|
|
Definition
Packets are part of the third layer in the OSI model.
|
|
|
Term
Segments are specific to which layer of the OSI model?
A -1
B -2
C -3
D -4
|
|
Definition
Segments are specific to the fourth layer of the OSI model.
|
|
|
Term
An internetwork is a __________ of individual networks connected by networking devices.
A -stack
B -profile
C -collection
D -publication
|
|
Definition
An internetwork is a collection of individual networks connected by networking devices.
|
|
|
Term
Facebook, Twitter, and LinkedIn are examples of __________.
A -blogs
B -social media
C -local networks
D -social engineering
|
|
Definition
Facebook, Twitter, and LinkedIn are examples of social media. |
|
|
Term
Which cabling options are not as susceptible to external interference such as machinery and EMI?
A -E3
B -Wireless
C -Fiberoptic cable
D -Shielded twisted-pair cable
E -Unshielded twisted-pair cable
|
|
Definition
Coaxial cable, fiberoptic cable, and shielded twisted-pair cable are less susceptible if not completely immune to external electrical interference.
|
|
|
Term
Which are functions of the lower layer of the OSI model? Choose all that apply.
A -Routing
B -Encryption
C -Addressing
D -Flow control
|
|
Definition
Routing, addressing, and flow control are all functions of the lower layer of the OSI model.
|
|
|
Term
Which is considered the first communications network?
A -Telephone
B -Mail system
C -Pony Express
D -Telegraph system
|
|
Definition
The telegraph system is considered the first communications network.
|
|
|
Term
Which are uses of the layer 2 switches? Choose all that apply.
A -ATM
B -Ethernet
C -Physical layer
D -Fiberoptic cables
|
|
Definition
Layer 2 switches are used for Ethernet, fiberoptic cables, or ATMs. |
|
|
Term
Which is an example of an intranet?
A -VPN
B -Home network
C -Public wireless access
D -Two-way communication devices
|
|
Definition
A home network is an example of an intranet. |
|
|
Term
__________ provides high-speed networking over ordinary telephone lines.
A -T1
B -DSL
C -IDSN
D -POTS
|
|
Definition
DSL provides high-speed networking over ordinary telephone lines.
|
|
|
Term
Click the Exhibit button. Which option is the IPv4 address?
A -Option A
B -Option B
C -Option C
D -Option D
|
|
Definition
Click the Exhibit button to show which option is the IPv4 address. |
|
|
Term
Data straight-through cables are used to connect which items to the OSI?
A -Fans
B -Posts
C -Nodes
D -Messages
|
|
Definition
Data straight-through cables are used to connect nodes to the OSI.
|
|
|
Term
Coaxial cable is more expensive than which cable?
A -STP cable
B -UTP cable
C -Fiberoptic cable
D -Twisted-pair cable
|
|
Definition
Coaxial cable is more expensive than UTP cable. |
|
|
Term
Which technology is used by Windows systems for connections into a Microsoft network?
A -WNR
B -AARS
C -RRAS
D -MSNR
|
|
Definition
RRAS is used by Windows systems.
|
|
|
Term
The __________ is a computer that uses a name-service protocol to map an IP address to a domain name.
A -IP address
B -name server
C -domain name
D -static address
|
|
Definition
The name server is a computer that uses a name-service protocol to map an IP address to a domain name.
|
|
|
Term
Which information pertains to the Teredo protocol? Choose all that apply.
A -Local loopback address
B -Known as 6to4 conversion
C -Encapsulates IPv6 packets within IPv4 datagrams
D -Grants IPv6 connectivity to nodes behind IPv4 devices
|
|
Definition
The Teredo protocol is known as 6-to-4 conversion, encapsulates IPv6 packets within IPv4 datagrams, and grants IPv6 connectivity to nodes behind IPv4 devices.
|
|
|
Term
__________ are hardware or software devices that interchange data packets between computer networks.
A -Routers
B -MAC tables
C -Packet switches
D -Circuit switches
|
|
Definition
Routers are hardware or software devices that interchange data packets between computer networks.
|
|
|
Term
Where is STP cable primarily used?
A -China
B -Russia
C -Europe
D -United States
|
|
Definition
The STP cable is primarily used in Europe.
|
|
|
Term
Which is used to control the data flow in a ring network?
A -Cable Internet
B -Perimeter networks
C -Wireless modulation
D -Multistation Access Units
|
|
Definition
Multistation Access Units are used to control the data flow in a ring network.
|
|
|
Term
Which key is pressed after the ARP command is written to display a list of options associated with the command?
A -F7
B -F8
C -ENTER
D -CTRL+O
|
|
Definition
ENTER is pressed after the ARP command is written to display a list of options associated with the command. |
|
|
Term
Students passing notes in a classroom are similar to which network devices?
A -Hubs
B -Nodes
C -Sessions
D -Applications
|
|
Definition
Nodes are similar to students passing notes in class.
|
|
|
Term
Transmission speed is known by which other name?
A -Bandwidth
B -Fiberoptic
C -Network speed
D -Transmission rate
|
|
Definition
Transmission speed is also known as bandwidth. |
|
|
Term
Over how many meters can Ethernet run while using a coaxial cable?
A -100
B -200
C -400
D -500
|
|
Definition
An Ethernet connection can run for 500 meters using coaxial cable.
|
|
|
Term
RRAS can be used for which connections? Choose all that apply.
A -LAN to LAN
B -LAN to WEP
C -WAN to LAN
D -LAN to WAN
E -WEP to WAN
F -WAN to WAN
|
|
Definition
RRAS can be used for LAN to LAN, LAN to WAN, WAN to LAN and WAN to WAN connections.
|
|
|
Term
Which is DSL's main competition for Internet providers?
A -T1
B -IDSN
C -POTS
D -Cable Internet access
|
|
Definition
DSL's main competition for Internet providers is cable Internet access.
|
|
|
Term
The OSI model contains __________ layers. Choose all that apply.
A -end
B -upper
C -lower
D -middle
|
|
Definition
The OSI model contains upper and lower layers. |
|
|
Term
Wireless network messages are more susceptible to eavesdropping than wired networks.
True
False
|
|
Definition
Wireless network messages are more susceptible to eavesdropping than wired networks.
|
|
|
Term
Which option defines a switch?
A -A bridge with a number of ports
B -A tool which connects multiple network segments
C -A bridge between different wireless frequencies such as AM and FM
D -A network connection which makes voice band and radio band frequencies work together
|
|
Definition
A switch is a bridge with multiple ports.
|
|
|
Term
Click the Exhibit button. Which option represents the router?
A -Option A
B -Option B
C -Option C
D -Option D
|
|
Definition
Option D represents the router.
|
|
|
Term
Which are ways to allocate IP addresses? Choose all that apply.
A -Static
B -APIPA
C -Dynamic
D -Encapsulation
E -ARP command
|
|
Definition
Static, APIPA, and dynamic are ways to allocate IP addresses.
|
|
|
Term
A __________ network is two or more systems interlinked to allow for communications.
A -human
B -private
C -computer
D -distributed
|
|
Definition
A computer network is two or more systems interlinked to allow for communications. |
|
|
Term
By which method are metrics derived in dynamic routing?
A -Public key encryption determines path
B -Known paths are retrieved from a cache
C -Algorithms are used against the routing table
D -Sensors travel available connections to detect blocks
|
|
Definition
Algorithms are used against the routing table in dynamic routing. |
|
|
Term
Which are examples of data sharing? Choose all that apply.
A -Music downloads
B -Providing Web site links
C -Writing thoughts on a blog
D -Connecting to network files
E -Connecting to centralized servers
F -Connecting to Internet-based servers
|
|
Definition
Music downloads, connecting to network files, connecting to centralized servers, and connecting to Internet-based servers are all examples of data sharing. |
|
|
Term
Which medium allows a user to create a private network from one location to another?
A -ISDN
B -POTS
C -Dial-up connections
D -Virtual private network
|
|
Definition
An ISDN allows a user to create a private network from one location to another.
|
|
|
Term
The segment header consists of which elements? Choose all that apply.
A -FCC protocols
B -Source profiles
C -Layer directories
D -TCP source address
E -TCP destination address
|
|
Definition
The segment header consists of the TCP destination address and the TCP source address. |
|
|
Term
Which are functions of packet switching? Choose all that apply.
A -Most common form of data exchange
B -Makes the decision where data frames will be forwarded
C -Establishes a dedicated circuit for the duration of the transmission
D -Transmissions are broken into smaller non-fixed length pieces and individually transmitted
|
|
Definition
Packet switching is the most common form of data exchange, and transmissions are broken into smaller non-fixed length pieces and individually transmitted.
|
|
|
Term
Application layer data is encapsulated into which kind of segments? Choose all that apply.
A -TCP
B -FSC
C -FCC
D -UDP
|
|
Definition
Application layer data is encapsulated into TCP and UDP segments. |
|
|
Term
MTA exams may be taken from any location, including the student's home.
True
False
|
|
Definition
MTA exams may not be taken from every location, including the student's home. |
|
|
Term
In which direction do transmits move in the OSI model?
A -Up
B -Left
C -Right
D -Down
|
|
Definition
Transmits move down in the OSI model.
|
|
|
Term
Which type of network media transfers data without the use of a physical cable?
A -EMI
B -Distance
C -Wireless
D -Fiberoptic
|
|
Definition
Wireless networks transfer data without physical cables.
|
|
|
Term
What is the purpose of MAC tables?
A -Stores programs
B -Deletes all old files
C -Decides if information should be returned to sender
D -Make the decision where data frames will be forwarded
|
|
Definition
MAC tables make the decision where data frames will be forwarded.
|
|
|
Term
Which ports are considered well-known and are used for most purposes? Choose all that apply.
A -15
B -32
C -1000
D -1024
E -2001
|
|
Definition
Any port below 1024 is considered well-known or popular |
|
|
Term
Which type of server is used as a firewall by Microsoft?
A -TSR
B -ALG
C -MCS
D -TMG
|
|
Definition
The TMG server is used as a firewall by Microsoft.
|
|
|
Term
In order to connect to a VPN, the user needs to have a/an __________.
A -file assessor
B -domain name
C -network share
D -Active Directory
|
|
Definition
In order to connect to a VPN, the user needs to have a domain name. |
|
|
Term
Which options define IPv6 dual stack? Choose all that apply.
A -Port calibration
B -Packet calibration
C -IPv6 runs alongside IPv4
D -End nodes, routers, and switches run both protocols
E -Either can be used with the same amount of overhead
|
|
Definition
In IPv6 dual stack, IPv6 runs alongside IPv4, either can be used with the same amount of overhead, and end nodes, routers, and switches run both protocols.
|
|
|
Term
Which telephone service runs at 2.048 Mbps?
A -T1
B -E1
C -T3
D -E3
|
|
Definition
E1 telephone service runs at 2.048 Mbps. |
|
|
Term
A VPN may be used for which purposes? Choose all that apply.
A -Create wide area network links
B -Connect wireless clients to public hotspots
C -Create remote connections to corporate offices
D -Connect users to private sites with different GHz ranges.
E -Create immediate peer-to-peer links for quick file transfer
|
|
Definition
A VPN may be used for creating wide area network links, connecting wireless clients to public hotspots, and creating remote connections to corporate offices.
|
|
|
Term
Which options can be configured through the Dynamic Host Configuration Protocol? Choose all that apply.
A -Domain name
B -Mesh topology
C -DNS server address
D -Time server address
E -Loopback addressing
F -Default gateway address
|
|
Definition
Domain name, DNS server address, time server address, and default gateway address can be configured through the Dynamic Host Configuration Protocol.
|
|
|
Term
Which are options of different routers? Choose all that apply.
A -Static
B -Dynamic
C -Protocol
D -Packet switches
|
|
Definition
Static and dynamic are the two types of routers.
|
|
|
Term
A firewall is known as a/an __________ device.
A -area
B -access
C -perimeter
D -distribution
|
|
Definition
A firewall is known as a perimeter device. |
|
|
Term
IPv6 uses a 128-bit addressing scheme.
True
False
|
|
Definition
IPv6 uses a 128-bit addressing scheme |
|
|
Term
Which TCP/IP network tool is a terminal emulation program?
A -TELNET
B -TCP port
C -PATHPING
D -Gateway interface
|
|
Definition
The network command TELNET is a TCP/IP terminal emulation program.
|
|
|
Term
Which are familiar TCP protocols? Choose all that apply.
A -FTP
B -SSH
C -P2P
D -SMTP
E -Telnet
|
|
Definition
FTP, SSH, SMTP, and Telnet are popular protocols.
|
|
|
Term
Which are advantages of a wired LAN? Choose all that apply.
A -Security
B -Reserves IP addresses
C -Built with inexpensive hardware
D -Superior speed and performance
|
|
Definition
Advantages of wired LANs include increased security, superior speed and performance, and the fact that they are built with inexpensive hardware.
|
|
|
Term
TCP handles the higher-level protocols in an Internet Protocol set.
True
False
|
|
Definition
TCP does not handle the higher-level protocols in an Internet Protocol set.
|
|
|
Term
Which are characteristics of WPA encryption? Choose all that apply.
A -Based on 802.11i
B -Stronger security than with WEP
C -Based on cable Internet technology
D -Easiest to deploy to a home wireless network
|
|
Definition
Being based on 802.11i, having stronger security than with WEP, and being easiest to deploy to a home wireless network are all characteristics of WPA encryption.
|
|
|
Term
Which options are included with the physical design of network topologies? Choose all that apply.
A -The actual devices
B -The cabling of the devices
C -The location of the devices
D -The virtual structure of the network
|
|
Definition
The actual devices, the cabling of the devices, and the location of the devices are all options that are included with the physical design of network topologies.
|
|
|
Term
Which term is primarily used for IP protocol testing?
A -Host address
B -Network address
C -Classful IP addressing
D -Local loopback address
|
|
Definition
The local loopback address is primarily used for IP protocol testing.
|
|
|
Term
Which are benefits of T1? Choose all that apply.
A -High speed
B -Low bandwidth
C -High bandwidth
D -24 channels running at 64 Kbps each
|
|
Definition
Benefits of T1 are high speed, high bandwidth, and 24 channels running at 64 Kbps each. |
|
|
Term
Which organization works to establish global standards for communications and information exchange?
A -ITU
B -IOC
C -ISO
D -IETF
|
|
Definition
ISO works to establish global standards for communications and information exchange. |
|
|
Term
The ___________ segments of layer 4 are encapsulated into packets.
A -ACC/FSC
B -UDP/FSC
C -TCP/UDP
D -ACC/UDP
|
|
Definition
The TCP/UDP segments of layer 4 are encapsulated into packets.
|
|
|
Term
Which factors explain the rarity of STP cable use? Choose all that apply.
A -High cost
B -Slow Mbps
C -Difficult to install
D -Vulnerable to electromagnetic interference
|
|
Definition
STP cable is rare due to its high cost and difficulty to install. |
|
|
Term
Which is another name for a perimeter Network?
A -TCP
B -VPN
C -Firewall
D -Demilitarized zone
|
|
Definition
Perimeter networks are also called demilitarized zones.
|
|
|
Term
Which type of routing learns routes automatically from other routes in a network?
A -Static
B -Dynamic
C -Reversible
D -Unidirectional
|
|
Definition
Dynamic routing learns routes automatically. |
|
|
Term
Which is the correct definition for the term, ISDN?
A -Integrated System Digital Network
B -Individual Services Digital Network
C -Integrated Services Demo Network
D -Integrated Services Digital Network
|
|
Definition
Integrated Services Digital Network is the correct definition for the term ISDN.
|
|
|
Term
Which statement describes a network?
A -Communications engineering
B -A collection of interconnected objects
C -Remote access made available to a group of people
D -The invisible frame used to implement relationships between electrical objects
|
|
Definition
A collection of interconnected objects describes a network. |
|
|
Term
Which are disadvantages of a wireless local area network? Choose all that apply.
A -Security is difficult
B -Lower bandwidth
C -Slower data transfer rate
D -Connecting to routers
|
|
Definition
The disadvantages of a wireless local area network are difficulties with security, lower bandwidth, and slower data transfer rate.
|
|
|
Term
Which option defines mobile broadband?
A -Limits the service provider coverage area
B -The data rate of a computer network connection
C -Connecting voice band and radio band frequencies
D -High-speed wireless Internet connection services designed to be used from arbitrary locations
|
|
Definition
Mobile broadband is defined as high-speed wireless Internet connection services designed to be used from arbitrary locations. |
|
|
Term
An unmanaged switch will have an IP address.
True
False
|
|
Definition
An unmanaged switch will never have an IP address.
|
|
|
Term
Which is a disadvantage of a wired LAN?
A -Identifying the IPv4
B -Connecting to routers
C -Running network cables
D -Communicating with PCs
|
|
Definition
Running network cables is a disadvantage of a wired LAN.
|
|
|
Term
A hub is used to connect __________.
A -network ports
B -network routers
C -network segments
D -network MAC addresses
|
|
Definition
A hub is used to connect network segments. |
|
|
Term
Which options are displayed when using a PING command? Choose all that apply.
A -Packet statistics
B -Approximate round trip time
C -Current entries in verbose mode
D -Host and associates related to the Internet address
|
|
Definition
Packet statistics and approximate round trip time are options displayed when using a PING command.
|
|
|
Term
The __________ was originally designed in 1957 for the Department of Defense.
A -LAN
B -intranet
C -Internet
D -extranet
|
|
Definition
The Internet was originally designed in 1957 for the Department of Defense.
|
|
|
Term
Which is the most common type of networking cable?
A -STP
B -UTP
C -Fiber
D -Coaxial
|
|
Definition
UTP cables are the most common. |
|
|
Term
Which are causes of wireless network outages? Choose all that apply.
A -Inside larger buildings
B -Nearby water sources
C -Harsh weather conditions
D -Obstructions from geography
E -Limits of service provider coverage area
|
|
Definition
Operating inside larger buildings, obstructions from geography, and limits of service provider coverage areas are all causes of wireless network outages.
|
|
|
Term
Routing protocols control the ___________ of information between routers so the routers can select the proper path for traffic.
A -closing
B -booking
C -opening
D -exchange
|
|
Definition
Routing protocols control the exchange of information between routers so the routers can select the proper path for traffic.
|
|
|
Term
A virtual computer is a separately purchased piece of hardware used to install server applications.
True
False
|
|
Definition
A virtual computer is software, not hardware.
|
|
|
Term
Unshielded twisted-pair cable is the most common because it is the most __________.
A -reliant
B -durable
C -trustworthy
D -inexpensive
|
|
Definition
Unshielded twisted-pair cable is the most common because it is the most inexpensive.
|
|
|
Term
UDP provides ___________ end-to-end packet delivery.
A -source
B -model
C -reliable
D -unreliable
|
|
Definition
UDP provides unreliable end-to-end packet delivery.
|
|
|
Term
Fiberoptic signals may easily be intercepted.
True
False
|
|
Definition
Fiberoptic signals are not at all susceptible to interception.
|
|
|
Term
An unmanaged switch allows data to go through __________.
A -an open port
B -a closed port
C -with administrative control
D -without administrative control
|
|
Definition
An unmanaged switch allows data to go through without administrative control.
|
|
|
Term
With ISDN, users can use phone lines at the same time the machine is communicating with the wide area network without losing the connection.
True
False
|
|
Definition
With ISDN, users can use phone lines at the same time the machine is communicating with the wide area network without losing the connection.
|
|
|
Term
Which option is the meaning of TCP?
A -Teredo Control Ports
B -Telnet Command Protocol
C -Transmission Control Protocol
D -Tunneling Configuration Protocol
|
|
Definition
TCP stands for Transmission Control Protocol.
|
|
|
Term
Which is the fastest possible dial-up speed?
A -14 Kbps
B -28 Kbps
C -64 Kbps
D -11 Mbps
|
|
Definition
Dial-up at its fastest is still only 64 Kbps.
|
|
|
Term
Which are the layers of the OSI model? Choose all that apply.
A -Session layer
B -Physical layer
C -Data-link layer
D -Network layer
E -Transport layer
F -Broadband layer
G -Application layer
H -Presentation layer
|
|
Definition
The layers of the OSI model are session, physical, data-link, network, transport, application, and presentation. |
|
|
Term
A hub is also known by which name?
A -Open repeater
B -Network repeater
C -Multiport repeater
D -Communication repeater
|
|
Definition
A hub is also known as a multiport repeater. |
|
|
Term
How many channels can be accessed from a T1 telephone line for a WAN?
A -1
B -24
C -48
D -96
|
|
Definition
A T1 line has 24 channels.
|
|
|
Term
Which method is favored for allocating IP addresses?
A -DHCP
B -Static
C -APIPA
D -IPCONFIG
|
|
Definition
DHCP is favored for allocating IP addresses.
|
|
|
Term
Which is the most important device within a perimeter network?
A -Router
B -Modem
C -Firewall
D -Hard drive
|
|
Definition
The firewall is the most important device within a perimeter network. |
|
|
Term
n which direction do receives move in the OSI model?
A -Up
B -Left
C -Right
D -Down
|
|
Definition
Receives move up in the OSI model.
|
|
|
Term
Which are examples of reserved private IP addresses? Choose all that apply.
A -8978.01
B -10.0.0.0
C -24.36.11
D -172.16.0.0
E -172.168.0.0
|
|
Definition
10.0.0.0, 172.16.0.0, 172.16.0.0 are all examples of reserved private IP addresses.
|
|
|
Term
Click the Exhibit button. Which option is the network card's physical address?
A -Option A
B -Option B
C -Option C
D -Option D
|
|
Definition
00-1C-BF-62-06-E3 is the network card's physical address.
|
|
|
Term
__________ is a number permanently assigned to a computer or network device by the network administrator.
A -IPv4
B -IPv5
C -Static IP address
D -Standard IP address
|
|
Definition
A static IP address is a number permanently assigned to a computer or network device by the network administrator.
|
|
|
Term
What is the function of a WEP key?
A -Limits the service provider coverage area
B -Uses network topology to protect network data
C -Adjusts networks to conform with wireless security standards
D -Uses a passphrase to hide the contents of messages from intruders
|
|
Definition
The function of a WEP key is to use a passphrase to hide the contents of messages from intruders.
|
|
|
Term
Which are sets of rules that direct the way computers exchange information?
A -Tools
B -Orders
C -Profiles
D -Protocols
|
|
Definition
Protocols are sets of rules that direct the way computers exchange information.
|
|
|
Term
Which are knowledge recommendations for the Networking Fundamentals exam? Choose all that apply.
A -General computer skills
B -Computer systems certification
C -Foundational knowledge of the exam domains
D -Some experience with technologies such as Windows Server, network management tools, and DNS
|
|
Definition
General computer skills, foundational knowledge of the exam domains, and some experience with technologies such as Windows Server, network management tools, and DNS are all knowledge recommendations for the Networking Fundamentals exam.
|
|
|
Term
Which is the least expensive cable discussed?
A -STP
B -UTP
C -Fiber
D -Coaxial
|
|
Definition
The least expensive cable discussed is UTP cable.
|
|
|
Term
Which is the function of a DNS server?
A -A local file on a computer used to map IP addresses to domain names
B -A computer that uses a name-service protocol to map an IP address to a name
C -A server used for the name conversion process, used for fully qualified domain names
D -Used only in a Microsoft Windows network for NetBIOS name mapping to IP address
|
|
Definition
A DNS server is used for the name conversion process, used for fully qualified domain names.
|
|
|
Term
__________ establishes a dedicated circuit for the duration of the transmission.
A -MAC table
B -Cell switching
C -Circuit switching
D -Packet switching
|
|
Definition
Circuit switching establishes a dedicated circuit for the duration of the transmission.
|
|
|
Term
All computers have one special IP address known as __________.
A -IPv4 addressing
B -static IP addressing
C -dynamic IP addressing
D -local loopback addressing
|
|
Definition
All computers have one special IP address known as local loopback addressing.
|
|
|
Term
__________ switches are when transmissions are broken into smaller fixed-length pieces and individually transmitted.
A -Cell
B -Light
C -Circuit
D -Packet
|
|
Definition
Cell switches are when transmissions are broken into smaller fixed-length pieces and individually transmitted.
|
|
|
Term
Which steps are taken by DHCP when a computer starts? Choose all that apply.
A -IP offer
B -IP request
C -IP protocol
D -IP discovery
E -IP password
F -IP transparency
G -IP acknowledgement
|
|
Definition
IP offer, IP request, IP discovery, and IP acknowledgment are taken by DHCP when a computer starts.
|
|
|
Term
Classful IP addressing divides the IPv4 address space into __________address classes.
A -2
B -4
C -5
D -8
|
|
Definition
Classful IP addressing divides the IPv4 address space into 5 address classes. |
|
|
Term
Which are common forms of network media connections? Choose all that apply.
A -Coaxial
B -Wireless
C -Single line
D -Rotational
E -Fiber optics
F -Twisted-pair
|
|
Definition
Coaxial, wireless, fiber optics, and twisted-pair are common forms of network media connections.
|
|
|
Term
Which is the directly connected route or default route for any router?
A -IP address
B -Subnet mask
C -Routing table
D -Default gateway
|
|
Definition
A router has an IP address known as a default gateway, which is the default route for the router.
|
|
|
Term
Which define the capabilities of a VLAN? Choose all that apply.
A -Can manage an unmanaged switch
B -Can virtually create collision domains
C -Can virtually create broadcast domains
D -Can be used without a managed switch
E -Can group users that need additional security
|
|
Definition
VLANs can virtually create broadcast domains and group users that need additional security.
|
|
|
Term
Which technology is used to hide the IP addresses of the internal LAN systems from external LAN systems in a home or office network?
A -BTA
B -NSZ
C -HSN
D -NAT
|
|
Definition
NAT technology is used to hide the IP addresses of the internal LAN systems from external LAN systems in a home or office network.
|
|
|
Term
The OSI model is divided into which categories? Choose all that apply.
A -Model layer
B -Upper layers
C -Lower layers
D -System layer
|
|
Definition
The OSI model is divided into upper and lower layers.
|
|
|
Term
__________ networks are networks that are created without the use of wires.
A -DSL
B -GHZ range
C -Transport layer
D -Wireless telecommunications |
|
Definition
Wireless telecommunications networks are networks that are created without the use of wires. |
|
|
Term
An address allows networks or PCs to __________ with each other.
A -crop
B -seed
C -multiply
D -communicate
|
|
Definition
An address allows networks or PCs to communicate with each other. |
|
|
Term
Which are characteristics of managed switches? Choose all that apply.
A -Will have an IP address
B -Greater number of uplinks
C -Transmission speed considerations
D -Give users full administrative control
E -Ports can be controlled and monitored
F -More expensive than unmanaged switches
G -Must have a managed switch to create a VLAN
|
|
Definition
Managed switches will have an IP address, give users full administrative control, have ports that can be controlled and monitored, are more expensive than unmanaged switches, and must have a managed switch to create a VLAN. |
|
|
Term
Extranet is also known as __________ communication.
A -wired
B -wireless
C -peer-to-peer
D -business-to-business
|
|
Definition
Extranet is also known as business-to-business communication. |
|
|
Term
Which network access method is considered the most reliable?
A -Bus network
B -Star network
C -Ring network
D -Mesh network
|
|
Definition
A mesh network is considered the most reliable network |
|
|
Term
The __________ layer determines which application on the receiving side will respond to data going up in the OSI model.
A -physical
B -transport
C -application
D -presentation
|
|
Definition
The transport layer determines which application on the receiving side will respond to data going up in the OSI model. |
|
|
Term
IP addresses can be configured automatically and manually.
True
False
|
|
Definition
P addresses can be configured automatically and manually.
|
|
|
Term
Which are attributes of a VPN? Choose all that apply.
A -Secure
B -Encrypted
C -Open to public
D -Requires authentication
E -Exists outside the Internet
|
|
Definition
Secure, encrypted, and requires authentication are all attributes of a VPN.
|
|
|
Term
Which octet of an IP address is used to identify a class?
A -Any
B -Last
C -First
D -Middle
|
|
Definition
The first octet of an IP address is used to identify a class |
|
|
Term
Which command displays whether or not a computer is DHCP-enabled?
A -ARP
B -NETSTAT
C -IPCONFIG
D -IPCONFIG /ALL
|
|
Definition
IPCONFIG /ALL displays whether or not a computer is DHCP-enabled.
|
|
|
Term
Which is the definition of a host file?
A -A local file on a computer used to map IP addresses to domain names
B -A computer that uses a name-service protocol to map an IP address to a name
C -A server used for the name conversion process, used for fully qualified domain names
D -A firewall used to communicate with the Windows Internet Name Service (WINS)
|
|
Definition
A host file is a local file on a computer used to map IP addresses to domain names.
|
|
|
Term
Which term has a numeric value that identifies a computer on a network?
A -APIPA
B -IP address
C -Name server
D -Domain name
|
|
Definition
The IP address has a numeric value that identifies a computer on a network.
|
|
|
Term
Which is not allowed by an APIPA address if no default gateway is configured?
A -Intranet access
B -Internet access
C -Static IP addressing
D -Dynamic addressing
|
|
Definition
Internet access is not allowed by an APIPA address if no default gateway is configured. |
|
|
Term
Which are advantages of a wireless LAN? Choose all that apply.
A -Widely available
B -No need for cables
C -Can be used at home
D -Multiple IP addresses
|
|
Definition
Advantages of a wireless LAN include being widely available, having no need for cables, and being able to be used at home. |
|
|
Term
Which are benefits of using a T3 phone line? Choose all that apply.
A -24 channels
B -672 channels
C -Very high speed
D -Very high bandwidth
|
|
Definition
672 channels, very high speed, and very high bandwidth are the benefits of using a T3 phone line.
|
|
|
Term
Which is the meaning of the term, LAN?
A -Live area network
B -Local area network
C -Leased area network
D -Limited access network
|
|
Definition
Local area network is the meaning of the term LAN. |
|
|
Term
Which is the meaning of the term, LAN?
A -Live area network
B -Local area network
C -Leased area network
D -Limited access network
|
|
Definition
Local area network is the meaning of the term LAN. |
|
|
Term
A layer 2 switch is a device that processes and routes data at the __________ of the OSI model.
A -physical layer
B -data-link layer
C -network layer
D -transport layer
|
|
Definition
A layer 2 switch is a device that processes and routes data at the data-link layer of the OSI model.
|
|
|
Term
Which method is used to transmit data in fiber optic cables?
A -Infrared beams
B -LED light pulses
C -Electric wavelengths
D -Gamma ray emissions
|
|
Definition
n fiber optics, data is transmitted as LED light impulses.
|
|
|
Term
Which option was the first widely accepted wireless networking standard?
A -802
B -802.11
C -802.11b
D -802.11g
|
|
Definition
802.11b was the first widely accepted wireless networking standard.
|
|
|
Term
Which items may cause EMI? Choose all that apply.
A -Microwave ovens
B -Metal water bottles
C -Exposed sheet rock
D -Small electric motors
|
|
Definition
Microwave ovens and small electric motors may cause EMI.
|
|
|
Term
|
Definition
APIPA is used when no DHCP server is present.
|
|
|
Term
Which action does TRACERT perform?
A -History of computer's previous owners
B -Locations of where a computer was repaired
C -Interchanges data packets between computer networks
D -Trace how many routers there are from one location to another
|
|
Definition
TRACERT is used to trace how many routers there are from one location to another. |
|
|
Term
Which option describes a coaxial cable?
A -Eight color-coded copper wires which are twisted around one another
B -A metallic foil or copper braid which surrounds a copper conductor
C -A cable which has an extra coating around the wire pairs to prevent EMI
D -A hollow outer cylindrical conductor surrounding a single inner wire made of two conducting elements
|
|
Definition
A hollow outer cylindrical conductor surrounding a single inner wire made of two conducting elements describes a coaxial cable. |
|
|
Term
Which form of LANs are the wave of the future?
A -Wired LANs
B -Cabled LANs
C -Wireless LANs
D -Cableless LANs
|
|
Definition
Wireless LANs are the wave of the future.
|
|
|
Term
What are the purposes of IPv4 addressing? Choose all that apply.
A -Core standard for the Internet
B -A unique identifier for a computer or device
C -Used by Microsoft Windows for communication
D -Wire-based protocol used on Ethernet networks
|
|
Definition
IPv4 is a core standard for the Internet, includes a unique identifier for a computer or device, and is used by Microsoft Windows for communication.
|
|
|
Term
Which network is a commonly used access method in homes and offices?
A -Bus network
B -Star network
C -Ring network
D -Mesh network
|
|
Definition
A star network is commonly used in homes and offices.
|
|
|
Term
How many layers are in the OSI model?
A -1
B -3
C -5
D -7
|
|
Definition
There are 7 layers in the OSI model.
|
|
|
Term
Which type of twisted-pair cabling prevents against electromagnetic interference?
A -Shielded
B -Bi-lateral
C -Rotational
D -Unshielded
|
|
Definition
Shielded twisted-pair cabling prevents against electromagnetic interference.
|
|
|
Term
The __________ should be associated to the IP address.
A -IP address
B -name server
C -static address
D -domain name
|
|
Definition
The domain name should be associated to the IP address.
|
|
|
Term
Wireless frequencies are a public resource regulated by the __________.
A -Integrated Digital Network Service
B -Federal Communications Commission
C -Bureau of Wireless Security Standards
D -Institute of Electrical and Electronics Engineers
|
|
Definition
Wireless frequencies are a public resource regulated by the Federal Communications Commission.
|
|
|
Term
Which protocols are considered the newest wireless standards? Choose all that apply.
A -802.11
B -802.11b
C -802.11g
D -802.11n
E -802.11a
|
|
Definition
802.11g and 802.11n are the newest wireless standards.
|
|
|
Term
Which class address can contain millions of networks?
A -Class A
B -Class B
C -Class C
D -Class D
|
|
Definition
Class C addresses can contain millions of networks |
|
|
Term
Which are examples of important network components? Choose all that apply.
A -RAM
B -Hubs
C -Routers
D -Network cards
E -Media transfer
F -Wiring and cabling
G -Protocols and services
H -Wireless access points
|
|
Definition
Hubs, routers, network cards, wiring and cabling, protocols and services, and wireless access points are all examples of important network components.
|
|
|
Term
For what does MAC stand?
A -Media Access Center
B -Media Access Control
C -Media Amount Control
D -Multiple Access Control |
|
Definition
MAC stands for Media Access Control.
|
|
|
Term
In which year was the Internet developed?
A -1958
B -1969
C -1980
D -1991
|
|
Definition
1969 is the year in which the Internet was developed.
|
|
|
Term
Which is the number of networks a router will always be connected to?
A -1
B -2
C -3
D -4
|
|
Definition
A router will always be connected to two networks.
|
|
|
Term
A VLAN is recommended after how many devices are connected to a single LAN?
A -50
B -100
C -200
D -500
|
|
Definition
A VLAN is recommended after 200 devices are connected to a single LAN. |
|
|
Term
Which column in statistics using the PATHPING command shows packets lost in transit?
A -1
B -6
C -8
D -12
|
|
Definition
Packets lost in transit are shown in the sixth column.
|
|
|
Term
A/An __________ switch is considered to be less intelligent.
A -Cisco
B -lesson
C -managed
D -unmanaged
|
|
Definition
An unmanaged switch is considered to be less intelligent.
|
|
|
Term
Which item is necessary for computers and routers to communicate with others?
A -IP address
B -File directory
C -Access codes
D -Public encryption
|
|
Definition
IP addresses are necessary for computers and routers to communicate with others.
|
|
|
Term
In which year were standards created for cabling used in telecommunications applications?
A -1988
B -1991
C -1995
D -2000
|
|
Definition
In 1991, standards for cabling were introduced for telecommunication applications.
|
|
|
Term
Which option defines a VLAN?
A -Collision domain created by switches
B -Broadcast domain created by switches
C -Broadcast domain created by crossover cables
D -Straight-through cable connected to the same medium
|
|
Definition
A VLAN is a broadcast domain created by switches.
|
|
|
Term
Which are the two types of wireless LANs?
A -Mapped
B -Directional
C -Peer-to-peer
D -Infrastructure
|
|
Definition
Peer-to-peer and infrastructure are the two types of wireless LANs. |
|
|
Term
Which type of wireless LAN requires more equipment?
A -Mapped
B -Directional
C -Peer-to-peer
D -Infrastructure
|
|
Definition
An infrastructure type of wireless LAN requires more equipment |
|
|
Term
Which UTP cable type is the fastest standard?
A -Cat 1
B -Cat 2
C -Cat 4
D -Cat 6
|
|
Definition
Cat 6 is the fastest standard UTP cable type.
|
|
|
Term
Which is the greatest disadvantage with wireless connections?
A -Expensive
B -Low Mbps
C -Hassle to set up
D -Susceptible to EMI
|
|
Definition
The greatest disadvantage of wireless networks is their vulnerability to EMI.
|
|
|
Term
TCP provides which type of control?
A -Ebb
B -Flow
C -Design
D -Balance
|
|
Definition
TCP provides flow control.
|
|
|
Term
IP configuration can be accessed under which control panel item?
A -Network
B -Network Panel
C -Network and Sharing Center
D -Identify and repair network problems
|
|
Definition
IP configuration can be found under the Network and Sharing Center control panel item.
|
|
|
Term
Fluorescent lighting may cause EMI in an unshielded twisted-pair cable.
True
False
|
|
Definition
Fluorescent lighting may cause EMI to an unshielded twisted-pair cable.
|
|
|
Term
The frame header will consist of which two elements?
A -Router
B -Systems layer
C -MAC source address
D -MAC destination address
|
|
Definition
The frame header consists of the MAC source address and the MAC destination address.
|
|
|
Term
Which two groups define a network address?
A -Host address
B -Home address
C -E-mail address
D -Network address
|
|
Definition
Host address and network address define a network address.
|
|
|
Term
On which level of the OSI model is wireless telecommunication implemented?
A -Physical layer
B -Network layer
C -Data-link layer
D -Transport layer
|
|
Definition
Wireless telecommunication is implemented on the physical layer of the OSI model.
|
|
|
Term
What is the function of wireless modulation?
A -Bridges different wireless frequencies such as AM and FM
B -Designs wireless Internet connections for arbitrary locations
C -Makes voice band and radio band frequencies work together
D -Adjusts networks to conform with wireless security standards
|
|
Definition
The function of wireless modulation is to make voice band and radio band frequencies work together.
|
|
|
Term
Which option describes the term, EIA?
A -Energy Impact Alliance
B -Energy Indexing Annuity
C -Electronics Industries Alliance
D -Electronic Information Administration
|
|
Definition
EIA stands for Electronics Industries Alliance.
|
|
|
Term
A mesh network is self-_________.
A -healing
B -hosting
C -sufficient
D -conscious
|
|
Definition
A mesh network is self-healing.
|
|
|
Term
__________ is/are multiple switches within an environment to make a redundant link, so if a switch fails, they are still able to connect with the destination.
A -Ethernet
B -Physical layer
C -Layer 3 switches
D -Switch link redundancy
|
|
Definition
Switch redundancy is multiple switches within an environment to make a redundant link, so if a switch fails, they are still able to connect with the destination.
|
|
|
Term
For what does the term IETF stand?
A -Internet Enterprise Term Field
B -Internet Enterprise Task Force
C -Internet Engineering Term Field
D -Internet Engineering Task Force
|
|
Definition
IETF stands for Internet Engineering Task Force.
|
|
|
Term
Data straight-through cables are used to connect nodes to which OSI levels? Choose all that apply.
A -1
B -2
C -3
D -5
E -7
|
|
Definition
Data straight-through cables are used to connect nodes to first, second, and third OSI levels.
|
|
|
Term
A MAC address is broken down into chunks consisting of how many bytes each?
A -1
B -2
C -3
D -4
|
|
Definition
A MAC address is broken down into chunks of 3 bytes each.
|
|
|
Term
Which topics are included in the Understanding Network Infrastructures knowledge domain? Choose all that apply.
A -Access methods
B -Wide area networks
C -Wireless networking
D -Local area networks
E -Internet, intranet, and extranet
|
|
Definition
Access methods, wide area networks, wireless networking, local area networks, and Internet, intranet, and extranet are all topics which are included in the Understanding Network Infrastructures knowledge domain.
|
|
|
Term
What is IPSec?
A -A function which speeds up IP configuration
B -A message sent by the DHCP to accept an IP address
C -A DHCP feature which sends an IP request to the server
D -A protocol suite for securing Internet Protocol communications
|
|
Definition
IPSec is a protocol suite for securing Internet Protocol communications.
|
|
|
Term
Which term is used to describe electromagnetic waves or radio frequencies which carry a signal over an entire communication path?
A -Wireless
B -GHz ranges
C -Telecommunication
D -Perimeter networks
|
|
Definition
The term wireless is used to describe electromagnetic waves or radio frequencies which carry a signal over an entire communication path.
|
|
|
Term
__________ is a number randomly assigned to a computer or network device by a DHCP server.
A -IPv4
B -Static IP address
C -Domain IP address
D -Dynamic IP address
|
|
Definition
A dynamic IP address is a number randomly assigned to a computer or network device by a DHCP server.
|
|
|
Term
Wired local area networks are based on a technology known as ___________.
A -SCSI
B -modem
C -Ethernet
D -innovation
|
|
Definition
Wired local area networks are based on a technology known as Ethernet.
|
|
|
Term
Which cables are resistant to electromagnetic interference? Choose all that apply.
A -TV
B -STP
C -UTP
D -Radio
E -Coaxial
|
|
Definition
STP and coaxial cables are resistant to electromagnetic interference.
|
|
|
Term
Which is a database of information that routers have discovered from other routers?
A -TRACERT
B -IP address
C -Round table
D -Routing table
|
|
Definition
Information is stored in a routing table.
|
|
|
Term
Layer 2 and layer 3 switches are similar, except in which way?
A -Layer 3 utilizes IP addresses
B -Layer 2 utilizes IP addresses
C -Layer 2 is not similar to layer 3
D -Layer 3 utilizes MAC addresses
|
|
Definition
Layer 3 utilizes IP addresses.
|
|
|
Term
In dynamic routing, the best route to a destination is known as a/an __________.
A -aisle
B -band
C -metric
D -thoroughfare
|
|
Definition
In dynamic routing, the best path to a destination is known as a metric. |
|
|
Term
Which layers of the OSI model perform application-specific functions like data formatting, encryption, and connection management?
A -None
B -Upper
C -Lower
D -Middle
|
|
Definition
The upper layers of the OSI model perform application-specific functions like data formatting, encryption, and connection management.
|
|
|
Term
Which are characteristics of cable and DSL Internet connections? Choose all that apply
A -Neither technology is better than the other
B -Cable is considered better technology than DSL
C -Cable and DSL are considered broadside technology
D -Cable and DSL are considered broadband technology
|
|
Definition
Neither technology is necessarily better than the other, and both are considered broadband technology.
|
|
|
Term
Neither technology is necessarily better than the other, and both are considered broadband technology.
|
|
Definition
TCP ports are used most for network purposes.
|
|
|
Term
Which type of cable can connect a PC directly to another PC?
A -Flip
B -Flavor
C -Crossfire
D -Crossover
|
|
Definition
Crossover cable can connect a PC directly to another PC. |
|
|
Term
A wide area network spans a small geographic area.
True
False
|
|
Definition
A wide area network spans a large geographic area.
|
|
|
Term
_________ is the newest version of IP, designed as the successor to IPv4.
A -IPv6
B -IPv4
C -Static address
D -Domain name
|
|
Definition
IPv6 is the newest version of IP, designed as the successor to IPv4. |
|
|
Term
The DoD model is the same as the OSI model.
True
False
|
|
Definition
The DoD model is not the same as the OSI model.
|
|
|
Term
Which are characteristics of UTP cables? Choose all that apply.
A -Pairs of wires are twisted
B -Signals are carried along one pair
C -Signals are carried using both pairs
D -Contains eight individual color-coded copper wires
E -Uses an RJ-45 connector as the computer connection
|
|
Definition
UTP cables are pairs of wires that are twisted, carry signals using both pairs, contain eight individual color-coded copper wires, and use an RJ-45 connector as the computer connection.
|
|
|
Term
In the command prompt, the IPv4 address is written in which notation?
A -Primary
B -Longhand
C -Dotted decimal
D -Dotted decibels
|
|
Definition
In the command prompt, the IPv4 address is written in dotted decimal.
|
|
|
Term
Which command is used to trace associated routers as well as to display the IP address, location, and time it took to trace each router sometimes with remote access?
A -ARP
B -NETSTAT
C -TRACERT
D -TRACEROUTE
|
|
Definition
TRACERT is used to trace associated routers as well as to display the IP address, location, and time it took to trace each router. |
|
|
Term
Which was the first instance of Ethernet cables used in 10Base-5 and 10Base-2 networks?
A -Coaxial
B -EMI cable
C -Holstered
D -Xerox cable
|
|
Definition
The first Ethernet cables used in 10Base-5 and 10Base-2 networks were coaxial.
|
|
|
Term
Routing __________ are used to determine the default route the data packets will take.
A -premiers
B -protocols
C -packages
D -percentages
|
|
Definition
Routing protocols are used to determine the default route the data packets will take.
|
|
|
Term
Which option is the first wireless networking standard created by the IEEE?
A -802
B -P2P
C -802.11
D -802.11n
|
|
Definition
802.11 is the first wireless networking standard created by the IEEE.
|
|
|
Term
What is a MAC address?
A -A memory method
B -A feature which automatically saves a file
C -A utility which automatically replies to e-mails
D -A unique identifier assigned to network interfaces
|
|
Definition
A MAC address is a unique identifier assigned to network interfaces.
|
|
|
Term
How many ranges of addresses exist which are known as private IP addresses?
A -1
B -2
C -3
D -4
|
|
Definition
There are three ranges of addresses that exist which are known as private IP addresses.
|
|
|
Term
A computer is more secure when there are not active connections present.
True
False
|
|
Definition
A computer is more secure when there are not active connections present.
|
|
|
Term
Which medium creates internetworks?
A -Router
B -Modem
C -End system
D -Model system
|
|
Definition
The router medium creates internetworks.
|
|
|
Term
IPSec protects data flow between a pair of __________.
A -hosts
B -servers
C -TCP ports
D -IP addresses
|
|
Definition
IPSec protects data flow between a pair of hosts.
|
|
|
Term
The IANA performs which function?
A -Assigns user names
B -Assigns IP addresses
C -Identifies IPv4 elements
D -Identifies IPv4 addresses
|
|
Definition
The IANA assigns IP addresses.
|
|
|
Term
Which are functions of the NETSTAT command? Choose all that apply.
A -Troubleshoots security
B -Reports approximate round trip time
C -Configures each entry into verbose mode
D -Troubleshoots active connections to a computer
|
|
Definition
Troubleshoots security and troubleshoots active connections to a computer are functions of the NETSTAT command.
|
|
|
Term
Routers are not used for wireless networks.
True
False
|
|
Definition
Routers are used for wireless networks.
|
|
|
Term
Which are the types of available switches? Choose all that apply.
A -Cell
B -Light
C -Circuit
D -Packet
|
|
Definition
Available switches include cell, circuit, and packet.
|
|
|
Term
Transmission speed is the rate data moves across which type of channel?
A -Open
B -Speed
C -Network
D -Communication
|
|
Definition
Transmission speed is the rate data moves across the communication channel.
|
|
|
Term
How many bytes long is a MAC address?
A -3
B -4
C -6
D -8
|
|
Definition
A MAC address is 6 bytes long.
|
|
|
Term
Which is another name for a subnet mask?
A -Port mask
B -Packet mask
C -Network mask
D -Gateway mask
|
|
Definition
The subnet mask is sometimes called the network mask.
|
|
|
Term
Which type of network media is unaffected by EMI?
A -Coaxial
B -Fiberoptic
C -Shielded twisted pair
D -Unshielded twisted pair
|
|
Definition
Fiber optics are unaffected by EMI.
|
|
|
Term
At what layer is a hub device found in the OSI layer?
A -1
B -4
C -6
D -7
|
|
Definition
Hubs are on the first layer of the OSI.
|
|
|
Term
Which segments constitute a frame? Choose all that apply.
A -Frame header
B -Frame column
C -Frame countdown
D -Frame sequence check
|
|
Definition
A frame header and sequence check make up a frame.
|
|
|
Term
Which option defines NAT?
A -Network Address Tool
B -Network Address Transit
C -Network Address Translation
D -Network Address Transcription
|
|
Definition
NAT stands for Network Address Translation.
|
|
|
Term
DSL requires the use of a broadband modem.
True
False
|
|
Definition
DSL requires the use of a broadband modem.
|
|
|
Term
Which option is a cause of collision domains?
A -Data is being sent on a shared medium
B -Data packets being sent are too complex
C -Two domains are connected by one router
D -Too many networks are running on a single backbone cable
|
|
Definition
When data is being sent on a shared medium, collision domains can occur.
|
|
|
Term
Which items may be used to provide communication security? Choose all that apply.
A -Firewalls
B -Headphones
C -Security zones
D -Enclosed cubicles
E -Virtual private networks
|
|
Definition
Firewalls, security zones, and virtual private networks are all items which may be used to provide communication security.
|
|
|
Term
Which are parts of a static IP address? Choose all that apply.
A -OPP
B -DNS
C -Subnet mask
D -Default bridge
E -Default gateway
|
|
Definition
Apart from the IP address itself, the address also consists of a subnet mask and a default gateway.
|
|
|
Term
Which option shows how fast data can be transferred within a WAN on a T3 telephone line?
A -1.544 Gbps
B -1.544 Mbps
C -44.736 Gbps
D -44.736 Mbps
|
|
Definition
Data can be transferred 44.736 Mbps with T3.
|
|
|
Term
What is the function of Telnet?
A -Programs a router
B -Configures the DHCP
C -Reports approximate round trip time
D -Configures each TCP/IP entry into verbose mode
|
|
Definition
Telnet programs a router. |
|
|