• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/63

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

63 Cards in this Set

  • Front
  • Back

At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?

Transport

Which of the following is an example of a video compression standard?

Motion Picture Experts Group–4 (MPEG–4).

In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

lowest ?

What data communication protocol uses characters or “handshaking” to control the link and represent information?

Binary synchronous protocol

In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

SYN

Which data communication protocol is based on bits and the position of the bits?

bit-oriented

Which data communication protocol is a transmission code that supports a variety of link types and topologies?

Synchronous Data Link Control (SDLC).

Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

Address Resolution Protocol (ARP)

Which Network layer protocol provides messaging that can help with troubleshooting?

ICMP

Which Transport layer protocol provides reliable data delivery services?

TCP

Which Application layer protocol is used to synchronize the clocks of computers on a network?

NTP

Which network Class has the most addresses for hosts?

Class A

How many subnet bits are required to support 90 subnets on a Class B network?

Seven

Internet protocol version 6 (IPv6) addresses are represented by

8 groups of hexadecimal numbers

Teredo has four tunneling components. Which one is not one of them?

Host-specific relay; Client; Server; Relay




d. Agent. (not a component)

Which device has multiport connectivity that directs data between nodes on a network?

Router

Which routing protocol do internet backbones use?

BGP

Which router port is used for initial configuration?

Console

When configuring a router, you control access to privileged EXEC mode by configuring which password?

Enable

On a router’s serial interface connection, what provides the timing signal for the communication link?

Data Communications Equipment (DCE)

Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

a public network

Which topology defines the way in which devices communicate and data is transmitted throughout the network?

Physical

Which topology has the stations connected in the form of a circle?

Ring

Which topology combines two or more different physical topologies in a single network?

Hybrid

Which device subdivides a network into smaller logical pieces, or segments?

Switch

The time it takes a switch to figure out where to forward a data unit is called its

Latency

Which of the following is not a distinct layer of a hierarchical network design?

Transport

How many broadcast domains forms a Virtual LAN (VLAN)?

1

What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

VLAN trunks

Which of the following will minimize EtherChannel configuration problems?

a. Disable all the interfaces after creating the EtherChannel.


b. Configure all interfaces to operate at the same speed and duplex mode.


c. Configure all interfaces for the same parameters as the last port configured.


d. Assign all interfaces in the EtherChannel to a different Virtual LAN (VLAN).

Which Institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

802.11g

Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

Planning

What identifier differentiates one wireless local area network (WLAN) from another?

Service Set Identifier (SSID)

A Management Information Base (MIB) is a collection of information that is organized

Hierarchically

Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

future growth

Which physical security action can you take to ensure network equipment supports the widest range of security services?

line console password

In general, you should deny direct dial-in access to a network device by disabling which port?

Auxiliary

Individual pulses within a digital signal are

bits

What is most commonly used in data systems to express signaling speed?

bits per second

Which option is a characteristic of synchronous data operation?

All data bits are the same length in time.

A digital signal that contains synchronizing bits within the signal stream describes

asynchronous operation

How many voltage levels does a binary signal have?

2

In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

(RZ) return to zero

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

maintain ones density standards

Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

How many bits are in the extended superframe format (ESF) framing sequence?

24

The signaling equipment has three types of communications signals that functions to

control and process calls

Which communications control signal uses a two-frequency dialing combination?

tone

In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

bit robbing

How is supervisory signaling information transferred in common channel signaling (CCS)?

separate network channel

Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?

Associated

What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

Modulation

The signal components that occur as bands above and below a carrier are called

modulating frequencies

To prevent frequency modulation (FM) radio stations from interfering with each other, the Federal Communications Commission (FCC) has set limits that allow each station to cause its oscillator frequency to deviate no more than

75kHz

Which form of modulation is insensitive to signal variations?

Binary phase shift keying (BPSK)

The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as

pulse position

Which type of pulse modulation is least affected by noise?

pulse code

Which form of multiplexing is very susceptible to signal deterioration?

Frequency division

What are the two major types of frame structures?

Low speed and CCITT

The method of multiplexing the T1 multiplexer uses is

time division

Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

Coarse wave division multiplexing

To create a better timing environment in communications networks, external timing distribution occurs through

station clocks

What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

tbd