Preview only show first 10 pages with watermark. For full document please download

Itchapter-8

   EMBED


Share

Transcript

I.T.Chapter-8 Which utility can be used to determine end-to-end connectivity between source and destination? Ipconfig Nbstat Netstat Ping A network administrator wants to connect a new building to an existing network using cable that can provide a secure connection and is not susceptible to electrical interference. The new building is approximately 800 meters away from the existing network. Which cable type should the administrator choose? Category 5 STP Category 6 UTP coaxial fiber optic Which three factors are reasons to choose a client/server model for a network instead of peer-to-peer? (Choose three.) The network is small with less than eight users. The company network requires secure access to confidential information. The users need a central database to store inventory and sales information. Each user understands how to safely share files across a network. The data gathered by the employees is critical and should be backed up on a regular basis. All employees passed a strict background check as part of the corporate hiring practices. The network administrator for a marketing company is concerned about the performance of the network. A company technician discovers a high volume of network traffic between computers and the departmental media server. Which device could be used to divide the network and improve performance? hub repeater switch wireless access point Which protocol is used to automatically configure network devices? DHCP IPCONFIG DNS FTP Which two factors are used to determine the different categories of UTP cabling? (Choose two.) The distance a signal can travel through the cable. The number of twists in the wires inside the cable. The number of wires inside the cable. The type of shielding used inside the cable. The type of connectors required to terminate the cable. Which two characteristics describe Ethernet technology? (Choose two.) supported by IEEE 802.3 standards supported by IEEE 802.5 standards typically uses an average of 16 Mb/s for data transfer rates uses a bus logical topology uses a ring topology Which wireless IEEE standard operates in a radio frequency of 2.4 GHz and supports a maximum bandwidth of 54 Mbps? 802.11a 802.11b 802.11g 802.11z Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing? Application Data Link Network Physical Presentation A company has a remote branch office that has no access to any high-speed WAN or broadband services. The network administrator is considering Power Line Communication (PLC) to connect the branch office to the main office. What are two advantages of PLC? (Choose two.) It is less expensive than using an analog PSTN modem. It can provide dedicated connections with speeds that exceed most LAN technologies. It can provide bandwidth in excess of the bandwidth that is provided by analog PSTN modems. It provides a more secure network connection through the use of encryption technologies. It can carry both voice and data signals across power lines. What is the maximum range a data signal can travel through a 1000BASE-T network segment? 3280 ft (1000 m) 1640 ft (500 m) 984 ft (300 m) 607 ft (185 m) 328 ft (100 m) Which topology has only one central point of failure, is easy to troubleshoot, and is most commonly implemented in newer networks? bus mesh ring star Which term describes the process of adding headers to data as it moves through the layers of the OSI model? demultiplexing encapsulation encoding encryption segmentation Which technique is used to ensure that data from one computer does not collide with data from any other computer in a CSMA/CD network? Computers receive a token that allows them to send a message. They then pass the token to the next computer. Computers listen to the network for clearance to send data. Each computer that is connected to the network transmits data on a different frequency. Each time slot on the network is allocated to a different computer. A computer can only transmit in the allocated time slots. Which device enables computers to be attached to a network without segmenting the network? bridge hub router switch Refer to the exhibit. Which type of network cable is shown? 10BASE5 10BASE-T Category 5 UTP Category 6 STP fiber-optic Which type of media is appropriate to use for LAN connectivity in an electrically noisy industrial environment? coaxial fiber-optic RF UTP Which network topology will allow all devices to continue to communicate with each other should a network cable fail? bus extended star mesh ring star Which Windows XP command displays the route taken by packets crossing an IP network? iproute netview nslookup ping tracert A company is investigating the use of an ISDN service to act as backup for the ASDL service they use to communicate with branch offices. They discover that the ISDN BRI service uses two 64 kb/s B channels. Which function do the B channels perform? perform basic addressing pass control information carry the data stream broadcast timing data Which digital technology provides an upstream speed that is typically less than the downstream speed? ADSL HDSL IDSL SDSL