Sei sulla pagina 1di 6

I.T.

Chapter‐8 
Which utility can be used to determine end-to-end connectivity between source and
destination?
Ipconfig
Nbstat
Netstat
Ping
 
A network administrator wants to connect a new building to an existing network using
cable that can provide a secure connection and is not susceptible to electrical
interference. The new building is approximately 800 meters away from the existing
network. Which cable type should the administrator choose?
Category 5 STP
Category 6 UTP
coaxial
fiber optic
 
Which three factors are reasons to choose a client/server model for a network instead of
peer-to-peer? (Choose three.)
The network is small with less than eight users.
The company network requires secure access to confidential information.
The users need a central database to store inventory and sales information.
Each user understands how to safely share files across a network.
The data gathered by the employees is critical and should be backed up on a
regular basis.
All employees passed a strict background check as part of the corporate hiring
practices.
 

`ˆÌi`Ê܈̅Ê̅iÊ`i“œÊÛiÀȜ˜ÊœvÊ
  ˜vˆÝÊ*ÀœÊ* Ê `ˆÌœÀÊ
1
/œÊÀi“œÛiÊ̅ˆÃʘœÌˆVi]ÊۈÈÌ\Ê
ÜÜÜ°ˆVi˜ˆ°Vœ“É՘œVŽ°…Ì“
 
The network administrator for a marketing company is concerned about the
performance of the network. A company technician discovers a high volume of network
traffic between computers and the departmental media server. Which device could be
used to divide the network and improve performance?
hub
repeater
switch
wireless access point
 
Which protocol is used to automatically configure network devices?
DHCP
IPCONFIG
DNS
FTP
 
Which two factors are used to determine the different categories of UTP cabling?
(Choose two.)
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.
 
Which two characteristics describe Ethernet technology? (Choose two.)
supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
uses a bus logical topology
uses a ring topology
 

`ˆÌi`Ê܈̅Ê̅iÊ`i“œÊÛiÀȜ˜ÊœvÊ
  ˜vˆÝÊ*ÀœÊ* Ê `ˆÌœÀÊ
2
/œÊÀi“œÛiÊ̅ˆÃʘœÌˆVi]ÊۈÈÌ\Ê
ÜÜÜ°ˆVi˜ˆ°Vœ“É՘œVŽ°…Ì“
 
Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a
maximum bandwidth of 54 Mbps?
802.11a
802.11b
802.11g
802.11z
 
Which layer of the OSI model is primarily concerned with accessing the physical media
and physical addressing?
Application
Data Link
Network
Physical
Presentation
 
A company has a remote branch office that has no access to any high-speed WAN or
broadband services. The network administrator is considering Power Line
Communication (PLC) to connect the branch office to the main office. What are two
advantages of PLC? (Choose two.)
It is less expensive than using an analog PSTN modem.
It can provide dedicated connections with speeds that exceed most LAN
technologies.
It can provide bandwidth in excess of the bandwidth that is provided by
analog PSTN modems.
It provides a more secure network connection through the use of encryption
technologies.
It can carry both voice and data signals across power lines.
 
What is the maximum range a data signal can travel through a 1000BASE-T network
segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)
328 ft (100 m)
 

`ˆÌi`Ê܈̅Ê̅iÊ`i“œÊÛiÀȜ˜ÊœvÊ
  ˜vˆÝÊ*ÀœÊ* Ê `ˆÌœÀÊ
3
/œÊÀi“œÛiÊ̅ˆÃʘœÌˆVi]ÊۈÈÌ\Ê
ÜÜÜ°ˆVi˜ˆ°Vœ“É՘œVŽ°…Ì“
Which topology has only one central point of failure, is easy to troubleshoot, and is most
commonly implemented in newer networks?
bus
mesh
ring
star
 
Which term describes the process of adding headers to data as it moves through the
layers of the OSI model?
demultiplexing
encapsulation
encoding
encryption
segmentation
 
Which technique is used to ensure that data from one computer does not collide with
data from any other computer in a CSMA/CD network?
Computers receive a token that allows them to send a message. They then pass the
token to the next computer.
Computers listen to the network for clearance to send data.
Each computer that is connected to the network transmits data on a different
frequency.
Each time slot on the network is allocated to a different computer. A computer can
only transmit in the allocated time slots.
 
Which device enables computers to be attached to a network without segmenting the
network?
bridge
hub
router
switch
 

`ˆÌi`Ê܈̅Ê̅iÊ`i“œÊÛiÀȜ˜ÊœvÊ
  ˜vˆÝÊ*ÀœÊ* Ê `ˆÌœÀÊ
4
/œÊÀi“œÛiÊ̅ˆÃʘœÌˆVi]ÊۈÈÌ\Ê
ÜÜÜ°ˆVi˜ˆ°Vœ“É՘œVŽ°…Ì“
Refer to the exhibit. Which type of network cable is shown?
10BASE5
10BASE-T
Category 5 UTP
Category 6 STP
fiber-optic

 
Which type of media is appropriate to use for LAN connectivity in an electrically noisy
industrial environment?
coaxial
fiber-optic
RF
UTP
 

`ˆÌi`Ê܈̅Ê̅iÊ`i“œÊÛiÀȜ˜ÊœvÊ
  ˜vˆÝÊ*ÀœÊ* Ê `ˆÌœÀÊ
5
/œÊÀi“œÛiÊ̅ˆÃʘœÌˆVi]ÊۈÈÌ\Ê
ÜÜÜ°ˆVi˜ˆ°Vœ“É՘œVŽ°…Ì“
Which network topology will allow all devices to continue to communicate with each
other should a network cable fail?
bus
extended star
mesh
ring
star
 
Which Windows XP command displays the route taken by packets crossing an IP
network?
iproute
netview
nslookup
ping
tracert
 
A company is investigating the use of an ISDN service to act as backup for the ASDL
service they use to communicate with branch offices. They discover that the ISDN BRI
service uses two 64 kb/s B channels. Which function do the B channels perform?
perform basic addressing
pass control information
carry the data stream
broadcast timing data
 
Which digital technology provides an upstream speed that is typically less than the
downstream speed?
ADSL
HDSL
IDSL
SDSL
 

`ˆÌi`Ê܈̅Ê̅iÊ`i“œÊÛiÀȜ˜ÊœvÊ
  ˜vˆÝÊ*ÀœÊ* Ê `ˆÌœÀÊ
6
/œÊÀi“œÛiÊ̅ˆÃʘœÌˆVi]ÊۈÈÌ\Ê
ÜÜÜ°ˆVi˜ˆ°Vœ“É՘œVŽ°…Ì“

Potrebbero piacerti anche