Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
63 Cards in this Set
- Front
- Back
1) _____________ is the number of times per second a wave swings back and forth in a cycle from its beginning point to its ending point.
: Amplitude : Pitch : Skew : Frequency |
Frequency
|
|
2) What topology is found in most office LAN's?
: Mesh : Star : Bus : Ring |
Star
|
|
3) Twisted pair cabling provides the greatest immunity to noise, and practically eliminates interference.
: True : False |
False
|
|
Which of these represents the correct order of the components in a fiber optic transmitter?
Connector, Light source, Multiplexor Encoder, Light source, Connector Light source, Encoder, Amplifier Encoder, Multiplexor, Light source |
Encoder, Light source, Connector
|
|
Which radio signal characteristic describes how its shape relates to a reference signal?
Frequency Amplitude Phase Bandwidth |
Phase
|
|
What percentage range of the Fresnel Zone may be blocked before signal interference occurs?
10 percent to 20 percent 20 percent to 40 percent 40 percent to 50 percent 40 percent to 60 percent |
20 percent to 40 percent
|
|
Prior to August 31, 2000, the FCC required how many hops per pattern in an FHSS system?
15 30 60 75 |
75
|
|
A channel in a FHSS system is which one of the following?
|
A list of carrier frequencies the transmitter will use
|
|
Direct sequence spread spectrum systems hop between narrow frequency bands within a channel's frequency range.
True False |
False
|
|
Given the following DSSS channels, choose those channel sets that would experience cross-channel interference.
2, 4, and 7 1, 5, and 9 1, 6, and 11 4 and 8 2 and 7 |
Correct: 2, 4, and 7
Correct: 1, 5, and 9 Correct: 4 and 8 |
|
Which standard Ethernet specifications can send signals the farthest without amplification?
|
10Base-FL
|
|
Which of the following factors would lead you to consider using Token Ring or FDDI instead of Ethernet?
: Real-time applications : Internet access : Need for cost control : Need for high speed during low-traffic periods |
Real-time applications
|
|
When a wireless client locates the network it wishes to join, what is the first step in establishing a connection?
|
Authentication
|
|
At which OSI model layer does the IEEE 802.1x security standard work?
|
Data Link
|
|
Microsoft strengthened CHAP by adding
|
Encrypted challenge responses
|
|
Which of these is not a function performed by a bridge?
: Buffering : Forwarding : Filtering : Learning |
Buffering
|
|
If a packet-filtering router has no specific rule for an incoming packet, what does it do with it?
|
Applies a default parameter to forward or discard it
|
|
What is the biggest difference between Ethernet and LocalTalk?
|
LocalTalk dynamically assigns NIC addresses
|
|
Where does a network redirector operate?
|
On a client computer
|
|
What type of address includes both an IP node address and a port number?
|
TCP socket address
|
|
A broadcast address is which of the following?
: 1.0.0.0 : 1.1.1.1 : 192.68.0.1 : 225.225.225.225 |
225.225.225.225
|
|
Our WINS server needs a hardware upgrade that will take a few hours to finish. If you take it down during the work day, how will this affect your users?
|
The network will function, but broadcast traffic will increase
|
|
POP is used to transfer information from a mail server to a user’s computer so users can read, delete, and manage their e-mail.
True or False |
False
|
|
What type of protocol is used to conduct TFTP transfers?
|
UDP
|
|
What transport technology allows multiple remote network users to connect to a single server?
|
ICA
|
|
Which of these is not a DSL info channel?
: Conversion channel : Downstream digital channel : Upstream digital channel : Analog POTS channel |
Conversion channel
|
|
How many ISDN-BRI channels can be used for data transmission?
|
3
|
|
Nonfacility-associated signaling allows one D channel to control as many as _________________ B channels?
|
20,000
|
|
What size cells does ATM use?
|
53 bytes
|
|
Which NetWare tool allows easy administration of print and file services, DNS and DHCP, licensing, and user-based administration?
|
Novell iManager
|
|
Which UNIX element responds to remote client requests?
|
Daemon
|
|
What is the name of the encryption method that uses one encryption key to encrypt data, and another to decrypt it?
|
Public-key
|
|
What are the two types of ring topologies?
|
Pure
Star |
|
What type of network communications model exists when one node has much greater computing capacity than another?
|
Master/Slave
|
|
In a multimode fiber optic cable, multiple signals are sent down a single core by varying the angles of the light rays.
T/F |
True
|
|
What is the process when energy is transferred back and forth from one field to another?
|
Oscillation
|
|
"Power output of the IR" refers to the power output of what?
|
the last cable or connector before the antenna
|
|
A channel in a FHSS system is which one of the following?
: The length of time a radio is tuned to a frequency : The time needed to tune a radio to a new frequency : The frequency range over which the system operates : A list of carrier frequencies the transmitter will use |
A list of carrier frequencies the transmitter will use
|
|
An FHSS transmitter uses a hop time of 300us. Which statement is true concerning this system?
: It will remain on a single frequency for 300us : It takes 300us to tune to a new frequency : It will take 300us to synchronize patterns with the receiver : It must change frequencies every 300us |
It takes 300us to tune to a new frequency
|
|
Given the following DSSS channels, choose those channel sets that would experience cross-channel interference.
: 2, 4, and 7 : 1, 5, and 9 : 1, 6, and 11 : 4 and 8 : 2 and 7 |
: 2, 4, and 7
: 1, 5, and 9 : 4 and 8 |
|
Which OSI model layer allows for orderly and complete transfer of information between parties?
|
Session
|
|
What is the approximate amount of overhead of CSMA/CA on a wireless network?
|
50 percent
|
|
What is the most common use of short-range infrared transmissions?
: Building-to-building : In-room computer networks : Data exchange between handheld devices : All of these are common uses of short-range infrared transmissions |
All of these are common uses of short-range infrared transmissions
|
|
What LAN type do Layer 2 switches mainly support?
: Ethernet : Token Ring : Fiber Distributed Data Interface : All of these are supported by Layer 2 switches |
All of these are supported by Layer 2 switches
|
|
What VLAN membership technique works well for a specialized application like VoIP?
|
VLAN Frame tagging
|
|
What type of firewall best provides restricted access to public servers and services located outside of the internal network?
|
Demilitarized zone
|
|
Which of these is not a way a firewall filters traffic?
: By IP address. : By port number. : By application data. : A firewall filters traffic by all these items. |
A firewall filters traffic by all these items.
|
|
Which statement concerning IPX is true?
: It is a connection-oriented protocol : NetWare 5 uses it by default : SPX makes it reliable : It efficiently routes SAP updates |
SPX makes it reliable
|
|
What users may belong to the same AppleTalk zone?
: Any nodes on the LAN : All nodes in a single collision domain : All nodes in a single broadcast domain : All nodes with AppleTalk addresses that contain the same network number |
Any nodes on the LAN
|
|
Because nodes on a private network have no direct access to the Internet, private networks may use any addressing scheme that is convenient.
T / F |
True
|
|
Which of the following information would a typical entry in a routing table include?
: Destination address : Hop count : Owner : Time : All of the above |
All of the above
|
|
When you log on to your ISP, your e-mail messages are displayed on a Web page, and you can select which messages you want to read, delete, or download. What protocol is being used by your Web browser and your ISP's -mail system?
|
IMAP4
|
|
What part of a cable modem separates data signals from broadcast streams?
|
Tuner
|
|
What type of device is required to attach a non-ISDN device to an ISDN network?
|
Terminal adapter
|
|
Which of the following are NOT benefits of setting up a Web proxy for a large LAN?
: Faster Web surfing : Low hardware costs : Reduced WAN link costs : Content is guaranteed to be current |
Low Hardware Costs
Content is guaranteed to be current |
|
Which of the following is serving as a proxy?
:A Web server that caches frequently-requested pages : A file server that caches frequently-reqested files : A firewall that caches frequently-requested files : All of the above |
All of the above
|
|
What does NetWare use for migration between server platforms?
|
Import/conversion export
|
|
Which NetWare component offers the capability of accessing files and directories from any computer that has a Java-enabled Web browser?
|
Novell Storage Services
Novell iFolder |
|
What is the name of the OS X kernel?
|
XNU
|
|
A well designed security policy will create a secure network environment where end-users will need little or no training on security procedures.
T / F |
False
|
|
An Increase in network security is often accompanied by:
: A decrease in user convenience : A decrease in network performance : An increase in costs : All of the above : None of the above |
All of the above
|
|
Why do most DSL Internet connections now use PPOE?
|
To support multiple users on a single connection
|
|
One type of dedicated access is through the use of a dial-up modem.
T / F |
True
|