Вы находитесь на странице: 1из 4

IT Essential chapter 8

1. Which utility can be used to determine end-to-end connectivity


between source and destination?
Ipconfig
Nbstat
Netstat
Ping

2. A network administrator wants to connect a new building to an


existing network using cable that provide a secure connection and is
not susceptible to electrical interference. The new building
approximately 800 meters away from the existing network. Which
cable type should the administrator choose?
Category 5 STP
Category 6 UTP
coaxial
fiber optic

3. Which three factors are reasons to choose a client/server model for a


network instead of peer-(Choose three.)
The network is small with less than eight users.
The company network requires secure access to confidential
information.
The users need a central database to store inventory and sales
information.
Each user understands how to safely share files across a network.
The data gathered by the employees is critical and should be
backed up on a regular basis.
All employees passed a strict background check as part of the
corporate hiring practices.

4. The network administrator for a marketing company is concerned


about the performance of the network. A company technician
discovers a high volume of network traffic between computers
departmental media server. Which device could be used to divide the
network and improve performance?
hub
repeater
switch
wireless access point

5. Which protocol is used to automatically configure network devices?


DHCP
IPCONFIG
DNS
FTP

6. Which two factors are used to determine the different categories of


UTP cabling? (Choose two.)

1
The distance a signal can travel through the cable.
The number of twists in the wires inside the cable.
The number of wires inside the cable.
The type of shielding used inside the cable.
The type of connectors required to terminate the cable.

7. Which two characteristics describe Ethernet technology? (Choose


two.)
supported by IEEE 802.3 standards
supported by IEEE 802.5 standards
typically uses an average of 16 Mb/s for data transfer rates
uses a bus logical topology
uses a ring topology

8. Which wireless IEEE standard operates in a radio frequency of 2.4


GHz and supports a maximum bandwidth of 54 Mbps?
802.11a
802.11b
802.11g
802.11z

9. Which layer of the OSI model is primarily concerned with accessing


the physical media and physical addressing?
Application
Data Link
Network
Physical
Presentation

10. A company has a remote branch office that has no access to any
high-speed WAN or broadband services. The network administrator is
considering Power Line Communication (PLC) to connect branch
office to the main office. What are two advantages of PLC? (Choose
two.)
It is less expensive than using an analog PSTN modem.
It can provide dedicated connections with speeds that exceed most
LAN technologies.
It can provide bandwidth in excess of the bandwidth that is
provided by analog PSTN modems.
It provides a more secure network connection through the use of
encryption technologies.
It can carry both voice and data signals across power lines.

11. What is the maximum range a data signal can travel through a
1000BASE-T network segment?
3280 ft (1000 m)
1640 ft (500 m)
984 ft (300 m)
607 ft (185 m)

2
328 ft (100 m)

12. Which topology has only one central point of failure, is easy to
troubleshoot, and is most commonly implemented in newer
networks?
bus
mesh
ring
star

13. Which term describes the process of adding headers to data as it


moves through the layers of the OSI model?
demultiplexing
encapsulation
encoding
encryption
segmentation

14. Which technique is used to ensure that data from one computer does
not collide with data from any other computer in a CSMA/CD
network?
Computers receive a token that allows them to send a message.
They then pass the token to the next computer.
Computers listen to the network for clearance to send data.
Each computer that is connected to the network transmits data on a
different frequency.
Each time slot on the network is allocated to a different computer. A
computer can only transmit in the allocated time slots.

15. Which device enables computers to be attached to a network without


segmenting the network?
bridge
hub
router
switch

16. Refer to the exhibit. Which type of network cable is shown?


10BASE5
10BASE-T
Category 5 UTP
Category 6 STP
fiber-optic

17. Which type of media is appropriate to use for LAN connectivity in an


electrically noisy industrial environment?
coaxial
fiber-optic
RF
UTP

3
18. Which network topology will allow all devices to continue to
communicate with each other should a network cable fail?
bus
extended star
mesh
ring
star

19. Which Windows XP command displays the route taken by packets


crossing an IP network?
iproute
netview
nslookup
ping
tracert

20. A company is investigating the use of an ISDN service to act as


backup for the ASDL service they use to communicate with branch
offices. They discover that the ISDN BRI service uses two 64 kb/s B
channels. Which function do the B channels perform?
perform basic addressing
pass control information
carry the data stream
broadcast timing data

21. Which digital technology provides an upstream speed that is typically


less than the downstream speed?
ADSL
HDSL
IDSL
SDSL

Вам также может понравиться