Networks & Telecommunication MCQ
Networks & Telecommunication
1. The data found in the system state backup is ___________ on the roles the server performs.
Answer
Correct Answer:
Dependent
Note: This Question is unanswered, help us to find answer for this one
2. Isolated single-bit errors occur ____ percent of the time.
Note: This Question is unanswered, help us to find answer for this one
3. The cisco asa device and the snort freeware program are examples of __________?
Answer
Correct Answer:
IPS/IDS devices
Note: This Question is unanswered, help us to find answer for this one
4. One way to hide partitions is with the windows disk partition utility, ____.
Note: This Question is unanswered, help us to find answer for this one
5. Internet ip packets are to cleartext what encrypted ip packets are to ________.
Answer
Correct Answer:
Ciphertext
Note: This Question is unanswered, help us to find answer for this one
6. In classful addressing, class c ipv4 address host information is located in the ____.
Answer
Correct Answer:
Last 8 bits
Note: This Question is unanswered, help us to find answer for this one
7. In bluetooth, a master can have up to ________ slaves at any moment.
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
8. In most common implementation models, the content filter has two components: ____.
Answer
Correct Answer:
Rating and filtering
Note: This Question is unanswered, help us to find answer for this one
9. In dns, a group of resources under the control of an organization is called a ________.
Note: This Question is unanswered, help us to find answer for this one
10. In the nat networking mode, a vnic relies on the ____ to act as a nat device.
Answer
Correct Answer:
Host machine
Note: This Question is unanswered, help us to find answer for this one
11. In the case of connecting two wlans, access points could be as far as ____ feet apart.
Note: This Question is unanswered, help us to find answer for this one
12. In the 10gbase lr standard the l stands for ____
Answer
Correct Answer:
Long reach
Note: This Question is unanswered, help us to find answer for this one
13. In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.
Answer
Correct Answer:
Peer-to-peer
Note: This Question is unanswered, help us to find answer for this one
14. In snmp, companies are often reluctant to use ________ commands because of security dangers.
Note: This Question is unanswered, help us to find answer for this one
15. In older windows versions, the filename was restricted to _______________ characters.
Note: This Question is unanswered, help us to find answer for this one
16. During installation, one may decide to go with the default drivers because they _______________.
Answer
Correct Answer:
Can be upgraded later
Note: This Question is unanswered, help us to find answer for this one
17. With _____________, the ap permits the owner to provide a list of valid addresses that can connect.
Answer
Correct Answer:
MAC address filtering.
Note: This Question is unanswered, help us to find answer for this one
18. A hardware component that can be changed without disrupting operations is known as ____.
Answer
Correct Answer:
Hot swappable
Note: This Question is unanswered, help us to find answer for this one
19. A directional antenna issues wireless signals along a(n) ____ direction.
Note: This Question is unanswered, help us to find answer for this one
20. A computer lab is an example of a(n) ________ type of network.
Note: This Question is unanswered, help us to find answer for this one
21. A communication skill commonly used in active listening is ____.
Answer
Correct Answer:
Paraphrasing
Note: This Question is unanswered, help us to find answer for this one
22. A ______________ is a voltage, frequency, pulse, or phase change in an analog transmission.
Note: This Question is unanswered, help us to find answer for this one
23. A _________ involves setting up two firewalls: an outer and an inner firewall.
Answer
Correct Answer:
DMZ (demilitarized zone)
Note: This Question is unanswered, help us to find answer for this one
24. A ________ uses the internet communications infrastructure to build a secure and private network.
Note: This Question is unanswered, help us to find answer for this one
25. A ________ attack is when a webserver is flooded with application layer web requests.
Answer
Correct Answer:
HTTP flood
Note: This Question is unanswered, help us to find answer for this one
26. A ____ is a network device devoted to storage and delivery of frequently requested files.
Answer
Correct Answer:
Cache engine
Note: This Question is unanswered, help us to find answer for this one
27. 802.11 standards are being developed to work in the ________ unlicensed band.
Answer
Correct Answer:
Both A and B
Note: This Question is unanswered, help us to find answer for this one
28. _____________ is a common standard for use by layer 2 access vpns for encapsulation.
Note: This Question is unanswered, help us to find answer for this one
29. __________ was developed by phil zimmermann and uses the idea cipher for message encoding.
Answer
Correct Answer:
Pretty Good Privacy
Note: This Question is unanswered, help us to find answer for this one
30. __________ is the process of classifying idps alerts so that they can be more effectively managed.
Answer
Correct Answer:
Alarm filtering
Note: This Question is unanswered, help us to find answer for this one
31. __________ are decoy systems designed to lure potential attackers away from critical systems.
Answer
Correct Answer:
Honeypots
Note: This Question is unanswered, help us to find answer for this one
32. __________ are a component of the security triple.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
33. ________ is the percentage of time that a network is available for use.
Answer
Correct Answer:
Availability
Note: This Question is unanswered, help us to find answer for this one
34. Boot camp is an installation tool that permits a choice between _______________.
Answer
Correct Answer:
Mac OS X and Windows
Note: This Question is unanswered, help us to find answer for this one
35. Bittorrent can be used to distribute ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
36. Because nap is provided by _________, you need to install _________ to install nap.
Note: This Question is unanswered, help us to find answer for this one
37. At its most primitive, a ____ is a repeater with more than one output port.
Note: This Question is unanswered, help us to find answer for this one
38. As the length of a glass cable grows, the light signal attenuates due to reflection and ____.
Answer
Correct Answer:
Refraction
Note: This Question is unanswered, help us to find answer for this one
39. ____ technology uses digital signaling in which the cable carries only one channel of digital data.
Answer
Correct Answer:
Baseband coaxial
Note: This Question is unanswered, help us to find answer for this one
40. ____ scaling refers to adding more workstations (clients).
Answer
Correct Answer:
Horizontal
Note: This Question is unanswered, help us to find answer for this one
41. ____ is the protocol used by usenet servers to send newsgroup messages over an ip network.
Note: This Question is unanswered, help us to find answer for this one
42. ____ cable ranges in size from approximately 6 to 10 mm or more (1/4 to 3/8 inch) in diameter.
Answer
Correct Answer:
Thick coaxial
Note: This Question is unanswered, help us to find answer for this one
43. Typically, impulse noise is a(n) ____ burst of energy.
Note: This Question is unanswered, help us to find answer for this one
44. The primary purpose of help desk performance statistics is to ____.
Answer
Correct Answer:
Justify the value and expense of support services
Note: This Question is unanswered, help us to find answer for this one
45. Lab costs can be broken down into monthly, ____, and annual expenses.
Answer
Correct Answer:
Quarterly
Note: This Question is unanswered, help us to find answer for this one
46. When routing tables adapt to network changes, the routing system is called ____.
Note: This Question is unanswered, help us to find answer for this one
47. Together, the fcs and the header make up the ____-byte frame for the data.
Note: This Question is unanswered, help us to find answer for this one
48. To minimize the effect of echo, a device called a(n) ____ can be attached to a line.
Answer
Correct Answer:
Echo suppressor
Note: This Question is unanswered, help us to find answer for this one
49. To map a drive from the command line use the command net ___________ drive: \\server\share.
Note: This Question is unanswered, help us to find answer for this one
50. The purpose of a(n) _____ is to respond to requests for web pages from web clients.
Answer
Correct Answer:
Web server
Note: This Question is unanswered, help us to find answer for this one
51. The most reliable nmap scan is ____________ scan.
Note: This Question is unanswered, help us to find answer for this one
52. The most popular mail server programs are sendmail and ____.
Answer
Correct Answer:
Microsoft Outlook
Note: This Question is unanswered, help us to find answer for this one
53. The most common use for ____ is resolving host names to ip addresses.
Note: This Question is unanswered, help us to find answer for this one
54. The most common example of ____ data is the human voice.
Note: This Question is unanswered, help us to find answer for this one
55. The __________ disk image file format is associated with the virtualbox hypervisor.
Note: This Question is unanswered, help us to find answer for this one
56. The _______ command will print a list of the commands that you've previously executed.
Note: This Question is unanswered, help us to find answer for this one
57. The ____ zone includes all internet web sites that are not specifically assigned to another zone.
Note: This Question is unanswered, help us to find answer for this one
58. Statistical time division multiplexing is sometimes called ____ time division multiplexing.
Answer
Correct Answer:
Asynchronous
Note: This Question is unanswered, help us to find answer for this one
59. More complex bus topologies consisting of multiple interconnected cable segments are termed ____.
Note: This Question is unanswered, help us to find answer for this one
60. Mapping, monitoring speed, and determining altitude all are uses of ______.
Note: This Question is unanswered, help us to find answer for this one
61. Many network engineers consider ____ to be superior to mgcp.
Note: This Question is unanswered, help us to find answer for this one
62. Longitudinal parity is sometimes called longitudinal redundancy check or ____ parity.
Answer
Correct Answer:
Horizontal
Note: This Question is unanswered, help us to find answer for this one
63. A unique characteristic of the 802.11 data frame is its ____ field.
Answer
Correct Answer:
Sequence Control
Note: This Question is unanswered, help us to find answer for this one
64. A(n) _____ is an attack that takes advantage of a vulnerability.
Note: This Question is unanswered, help us to find answer for this one
65. A(n) ________ server is a server that stores and manages files for network users.
Note: This Question is unanswered, help us to find answer for this one
66. A(n) _____ is always running off its battery while the main power runs the battery charger.
Answer
Correct Answer:
On-line UPS.
Note: This Question is unanswered, help us to find answer for this one
67. A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.
Answer
Correct Answer:
Packet sniffer
Note: This Question is unanswered, help us to find answer for this one
68. A(n) ____ handles all in-house calls and places calls onto outside telephone lines.
Answer
Correct Answer:
Private branch exchange (PBXs)
Note: This Question is unanswered, help us to find answer for this one
69. A____ is a small electronic device that issues a signal on a wire pair.
Answer
Correct Answer:
Tone generator
Note: This Question is unanswered, help us to find answer for this one
70. A vpn ____ authenticates vpn clients and establishes tunnels for vpn connections.
Answer
Correct Answer:
Concentrator
Note: This Question is unanswered, help us to find answer for this one
71. Clients are able to exchange signals with satellites as long as they have a ____ path.
Answer
Correct Answer:
Line-of-sight
Note: This Question is unanswered, help us to find answer for this one
72. Chip spreading codes are ____ bits in length.
Note: This Question is unanswered, help us to find answer for this one
73. A(n) ____ stores login information in an encrypted form on a users device.
Answer
Correct Answer:
Password manager
Note: This Question is unanswered, help us to find answer for this one
74. The tcp connection termination process requires ____ packets.
Note: This Question is unanswered, help us to find answer for this one
75. When a new application designed for windows vista or windows 7 prints, it uses ____-based printing.
Note: This Question is unanswered, help us to find answer for this one
76. With no options, ____ displays the current listing of bash environment and shell script variables.
Note: This Question is unanswered, help us to find answer for this one
77. When using the chmod command, the mode rwx can be represented by the number ____.
Note: This Question is unanswered, help us to find answer for this one
78. Wans typically send data over ____ available communications networks.
Note: This Question is unanswered, help us to find answer for this one
79. Two-way amplifiers are needed for cable ________ service.
Note: This Question is unanswered, help us to find answer for this one
80. To send a print job to a printer, you must first use the ____ command and specify what to print.
Note: This Question is unanswered, help us to find answer for this one
81. To establish a satellite internet connection, each subscriber must have a ____.
Answer
Correct Answer:
Dish antenna
Note: This Question is unanswered, help us to find answer for this one
82. Tier 1 providers own long-distance, high-speed fiber-optic networks called ______________.
Answer
Correct Answer:
Backbones
Note: This Question is unanswered, help us to find answer for this one
83. There are four layers to ios. the__________ layer is how applications interact with the ios.
Answer
Correct Answer:
Core services
Note: This Question is unanswered, help us to find answer for this one
84. The serial interface on the back of the connectivity device is often labeled ____.
Note: This Question is unanswered, help us to find answer for this one
85. The records in the ____ file are provided to support reverse dns lookups.
Answer
Correct Answer:
. db.addr
Note: This Question is unanswered, help us to find answer for this one
86. The original and flawed wireless security protocol is known as _____.
Note: This Question is unanswered, help us to find answer for this one
87. The most scrutinized cipher in history is the ________.
Answer
Correct Answer:
Data Encryption Standard (DES)
Note: This Question is unanswered, help us to find answer for this one
88. The lp command uses the ____ option to specify the destination printer name.
Note: This Question is unanswered, help us to find answer for this one
89. The linux kernel is stored in the ____ directory.
Note: This Question is unanswered, help us to find answer for this one
90. The linux command _______ can be used to list the current disk devices connected to the computer.
Note: This Question is unanswered, help us to find answer for this one
91. The internet key ______________ protocol enables computers to make an sa.
Note: This Question is unanswered, help us to find answer for this one
92. The ____ option can be used with the tar command to extract a specified archive.
Note: This Question is unanswered, help us to find answer for this one
93. The ____ denotes the type of organization or country the address specifies.
Note: This Question is unanswered, help us to find answer for this one
94. One of the most common transmission flaws affecting data signals is ____.
Note: This Question is unanswered, help us to find answer for this one
95. Netboot is a tool that allows one to _______________.
Answer
Correct Answer:
Boot a Mac OS X machine remotely.
Note: This Question is unanswered, help us to find answer for this one
96. Mpeg-1 and mpeg-2or simply mpegare common examples of ____ compression.
Answer
Correct Answer:
Code division
Note: This Question is unanswered, help us to find answer for this one
97. Most wired home networks use ________ cable, which is most susceptible to interference.
Answer
Correct Answer:
Unshielded twisted-pair.
Note: This Question is unanswered, help us to find answer for this one
98. Most linux distributions today use ____ as their package manager.
Note: This Question is unanswered, help us to find answer for this one
99. Modern lans use ____ or higher wiring.
Note: This Question is unanswered, help us to find answer for this one
100. Many computers can share a smaller pool of routable ip addresses with _______________.
Note: This Question is unanswered, help us to find answer for this one
101. Linux uses the freeware ____ shell as its default command interpreter.
Note: This Question is unanswered, help us to find answer for this one
102. Linux requires ____ partition(s) at minimum.
Note: This Question is unanswered, help us to find answer for this one
103. The points where circuits interconnect with other circuits is known as ____.
Answer
Correct Answer:
Cross-connect facilities
Note: This Question is unanswered, help us to find answer for this one
104. The parking brake brakes the __________ wheels.
Note: This Question is unanswered, help us to find answer for this one
105. In a ____ attack, a person redirects or captures secure transmissions as they occur.
Answer
Correct Answer:
Man-in-the-middle
Note: This Question is unanswered, help us to find answer for this one
106. If a receiver correctly receives packets 2, 3, and 4, it will respond with a(an) ____ .
Note: This Question is unanswered, help us to find answer for this one
107. In a ____ vpn, tunnels connect multiple sites on a wan.
Answer
Correct Answer:
Site-to-site
Note: This Question is unanswered, help us to find answer for this one
108. In ____ transmission, data can move in both directions at the same time, such as with a telephone.
Answer
Correct Answer:
Full-duplex
Note: This Question is unanswered, help us to find answer for this one
109. In ____ both computers verify the credentials of the other
Answer
Correct Answer:
Mutual authentication
Note: This Question is unanswered, help us to find answer for this one
110. Image files can be reduced by as much as ____% of the original when using lossless compression.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
111. Ieee created the 100-mbps ethernet 802.3u protocol also called ____ ethernet.
Note: This Question is unanswered, help us to find answer for this one
112. ____ is the technology behind the popular digital subscriber line (dsl) system.
Answer
Correct Answer:
Discrete multitone
Note: This Question is unanswered, help us to find answer for this one
113. ____ ensures that the network does not become saturated at any one point.
Answer
Correct Answer:
Congestion control
Note: This Question is unanswered, help us to find answer for this one
114. ____ cabling has become the preferred medium for star-wired bus topologies.
Answer
Correct Answer:
Twisted pair
Note: This Question is unanswered, help us to find answer for this one
115. ____ are used to select unique documents from anywhere in the world.
Answer
Correct Answer:
Uniform Resource Locators (URLs)
Note: This Question is unanswered, help us to find answer for this one
116. ____ are discrete waveforms, rather than continuous waveforms.
Answer
Correct Answer:
Digital signals
Note: This Question is unanswered, help us to find answer for this one
117. When a new eap authentication is added, software does not have to be changed on the ________.
Answer
Correct Answer:
Authenticator
Note: This Question is unanswered, help us to find answer for this one
118. Frequency shift keying is subject to ____.
Answer
Correct Answer:
Intermodulation distortion
Note: This Question is unanswered, help us to find answer for this one
119. Firewalls fall into ____ major processing mode categories
Note: This Question is unanswered, help us to find answer for this one
120. An example of a popular client email software is ____.
Answer
Correct Answer:
Microsoft Outlook
Note: This Question is unanswered, help us to find answer for this one
121. An eap failure message is sent to the ________.
Answer
Correct Answer:
Authenticator
Note: This Question is unanswered, help us to find answer for this one
122. Among all possible biometrics, ____ is(are) considered truly unique.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
123. Active directory keeps a naming convention for the domain that mirrors ______.
Note: This Question is unanswered, help us to find answer for this one
124. A striped volume is a ____ solution.
Note: This Question is unanswered, help us to find answer for this one
125. A single access point and the set of hosts it serves is called a(n) ________.
Note: This Question is unanswered, help us to find answer for this one
126. A signature-based idps is sometimes called a(n) ____________________-based idps.
Answer
Correct Answer:
Knowledge
Note: This Question is unanswered, help us to find answer for this one
127. A packet will definitely get through if it has ________.
Answer
Correct Answer:
QoS reserved capacity
Note: This Question is unanswered, help us to find answer for this one
128. A nos that contains a back dooris an example of a risk associated with ____.
Answer
Correct Answer:
Protocols and software
Note: This Question is unanswered, help us to find answer for this one
129. A network _____ represents a networks physical layout.
Note: This Question is unanswered, help us to find answer for this one
130. _______ is a specialized viewer software program.
Answer
Correct Answer:
IrfanView
Note: This Question is unanswered, help us to find answer for this one
131. Despite its widespread availability,________typically provide(s) the least depth of news coverage
Answer
Correct Answer:
Television
Note: This Question is unanswered, help us to find answer for this one
132. To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.
Answer
Correct Answer:
STP (Spanning Tree Protocol)
Note: This Question is unanswered, help us to find answer for this one
133. The windows server 2012 r2 edition which is designed for servers with up to 64 processors is _____:
Answer
Correct Answer:
Windows Server 2012 R2 Datacenter
Note: This Question is unanswered, help us to find answer for this one
134. The vi editor is typically running in one of ____ modes.
Note: This Question is unanswered, help us to find answer for this one
135. The emr from a computer monitor can be picked up as far away as ____ mile.
Note: This Question is unanswered, help us to find answer for this one
136. Bluetooth differs from wimax in that bluetooth __________.
Answer
Correct Answer:
Can only link up to eight devices within a 10-meter area
Note: This Question is unanswered, help us to find answer for this one
137. The server core installation option in windows server 2012 r2 effectively removes _______:
Answer
Correct Answer:
Graphical User Interface
Note: This Question is unanswered, help us to find answer for this one
138. The fastest method to search for files in the linux directory tree is to use the ____ command.
Note: This Question is unanswered, help us to find answer for this one
139. The domain controllers are the computers that store and run the _______________.
Answer
Correct Answer:
Active Directory database
Note: This Question is unanswered, help us to find answer for this one
140. The elapsed time for data to make a round trip from point a to point b and back is called ____.
Note: This Question is unanswered, help us to find answer for this one
141. The core component of the gui in linux is referred to as ____.
Answer
Correct Answer:
X Windows
Note: This Question is unanswered, help us to find answer for this one
142. A(n) ____ policy controls password characteristics for local user accounts.
Note: This Question is unanswered, help us to find answer for this one
143. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
Note: This Question is unanswered, help us to find answer for this one
144. The dominant architecture used to secure network access today is the __________ firewall.
Answer
Correct Answer:
Screened subnet.
Note: This Question is unanswered, help us to find answer for this one
145. The logical printer that users can access in windows is known as a _______.
Note: This Question is unanswered, help us to find answer for this one
146. In the fhs, the _____ directory contains the linux kernel and files used by the boot loader.
Note: This Question is unanswered, help us to find answer for this one
147. The typical query one dns server sends to a root name server is called a(n) _______.
Answer
Correct Answer:
Recursive query
Note: This Question is unanswered, help us to find answer for this one
148. The most common 1-gigabit ethernet standard in use today is ____.
Answer
Correct Answer:
1000Base-LX.
Note: This Question is unanswered, help us to find answer for this one
149. Fibre channel can support the interconnection of up to ____ devices only.
Note: This Question is unanswered, help us to find answer for this one
150. A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
Note: This Question is unanswered, help us to find answer for this one
151. Another name for diagnostic software tools is ____.
Answer
Correct Answer:
Utilitysoftware
Note: This Question is unanswered, help us to find answer for this one
152. Another name for cellular networking is ______ networking.
Answer
Correct Answer:
Wide area, organic, computer, or (mobile).
Note: This Question is unanswered, help us to find answer for this one
153. Configuring a central store of admx files help solve the problem of ________.
Answer
Correct Answer:
"SYSVOL bloat"
Note: This Question is unanswered, help us to find answer for this one
154. Local gpos contain fewer options than domain gpos. local gpos do not support ______.
Answer
Correct Answer:
Folder redirection or Group Policy software installation
Note: This Question is unanswered, help us to find answer for this one
155. ____ is a serial connection or bus that can carry multiple channels of data at the same time.
Answer
Correct Answer:
Fibre Channel
Note: This Question is unanswered, help us to find answer for this one
156. The original first-generation cell phones were ____ and designed for voice data only.
Note: This Question is unanswered, help us to find answer for this one
157. Using a wireless network without the network owner's permission is known as ________.
Answer
Correct Answer:
Piggybacking.
Note: This Question is unanswered, help us to find answer for this one
158. Early local area networks transmitted data at only ____ million bits per second.
Note: This Question is unanswered, help us to find answer for this one
159. The ____ command will confirm the system directory that you are currently in.
Note: This Question is unanswered, help us to find answer for this one
160. Strong encryption now requires ________-bit keys.
Note: This Question is unanswered, help us to find answer for this one
161. Rerouting traffic using arp poisoning is an attack on ________ of a network.
Answer
Correct Answer:
Both A and B
Note: This Question is unanswered, help us to find answer for this one
162. In 802.11i, ________ authentication always uses ssl/tls.
Note: This Question is unanswered, help us to find answer for this one
163. If more users move to an access point, this decreases ________.
Answer
Correct Answer:
Individual throughput
Note: This Question is unanswered, help us to find answer for this one
164. Cars often have ________ networks.
Answer
Correct Answer:
Wi-Fi and Bluetooth
Note: This Question is unanswered, help us to find answer for this one
165. The internet2 (i2) project started in ____.
Note: This Question is unanswered, help us to find answer for this one
166. The physical address assigned to each network adapter is called its ________ address.
Answer
Correct Answer:
Media access control (MAC)
Note: This Question is unanswered, help us to find answer for this one
167. The wi-fi alliance calls 802.1x mode ________ mode.
Answer
Correct Answer:
Enterprise.
Note: This Question is unanswered, help us to find answer for this one
168. To drive around a city looking for working access points that are unprotected is ________.
Answer
Correct Answer:
War driving
Note: This Question is unanswered, help us to find answer for this one
169. A ________ network can contain servers as well as individual computers.
Answer
Correct Answer:
Client/server.
Note: This Question is unanswered, help us to find answer for this one
170. A(n) ____________________ printer has its own nic.
Note: This Question is unanswered, help us to find answer for this one
171. A(n) _____________ is not a common type of dedicated server.
Answer
Correct Answer:
Collision server
Note: This Question is unanswered, help us to find answer for this one
172. The transmission control protocol (tcp) operates at the osi model's ____ layer.
Note: This Question is unanswered, help us to find answer for this one
173. The more twists per foot in a pair of wires, the more resistant the pair will be to ____.
Answer
Correct Answer:
Cross talk
Note: This Question is unanswered, help us to find answer for this one
174. Technical management of the internet's domain name system is coordinated by ____.
Note: This Question is unanswered, help us to find answer for this one
175. Most home networks use ________ cable, which is most susceptible to interference.
Answer
Correct Answer:
Unshielded twisted-pair
Note: This Question is unanswered, help us to find answer for this one
176. Getting a hash value with a ____ is much faster and easier than with a(n) ____.
Answer
Correct Answer:
Hexadecimal editor, computer forensics tool
Note: This Question is unanswered, help us to find answer for this one
177. ___________ ensures that the network is operating as efficiently as possible.
Answer
Correct Answer:
Performance management
Note: This Question is unanswered, help us to find answer for this one
178. The distance between corresponding points on a wave's cycle is called its ____.
Answer
Correct Answer:
Wavelength
Note: This Question is unanswered, help us to find answer for this one
179. Regarding security templates, a strategy plan should consider ______.
Answer
Correct Answer:
Computer roles
Note: This Question is unanswered, help us to find answer for this one
180. The data transfer speed of a wide area network (wan) depends on the speed of _____.
Answer
Correct Answer:
Its interconnections
Note: This Question is unanswered, help us to find answer for this one
181. A(n) ____ connection is one in which the transfer speeds in both directions are equal.
Answer
Correct Answer:
Symmetric
Note: This Question is unanswered, help us to find answer for this one
182. The test statement ____ would be used to determine if a is numerically greater than b.
Answer
Correct Answer:
[ A –gt B ]
Note: This Question is unanswered, help us to find answer for this one
183. ____ technology may someday replace today?s bar code system for identifying items in inventory.
Note: This Question is unanswered, help us to find answer for this one
184. ________ permits two or more people to communicate over the internet in real time.
Answer
Correct Answer:
Instant messaging
Note: This Question is unanswered, help us to find answer for this one
185. The delegation of control wizard is capable of ________ permissions.
Note: This Question is unanswered, help us to find answer for this one
186. Raid 0 uses disk ____, which spreads files over several disk drives.
Note: This Question is unanswered, help us to find answer for this one
187. If a firewall cannot keep up with traffic volume, it will ________.
Answer
Correct Answer:
Drop packets it cannot process
Note: This Question is unanswered, help us to find answer for this one
188. Wireless radio transmission speed is usually measured in terms of ________.
Answer
Correct Answer:
Frequency
Note: This Question is unanswered, help us to find answer for this one
189. The highest-level dns servers are called ________.
Answer
Correct Answer:
Root servers.
Note: This Question is unanswered, help us to find answer for this one
190. In vpns designed to frustrate evil twin attacks, the shared secret ________.
Answer
Correct Answer:
Is not transmitted
Note: This Question is unanswered, help us to find answer for this one
191. If a firewall has to drop packets because it cannot keep up with traffic volume, this is ________.
Answer
Correct Answer:
Both A and B
Note: This Question is unanswered, help us to find answer for this one
192. Eavesdropping usually is more of a concern for ________ lans than for ________ lans.
Answer
Correct Answer:
Wireless, wired
Note: This Question is unanswered, help us to find answer for this one
193. To allow multiple users to share a single medium, fdm assigns each user a separate ____.
Note: This Question is unanswered, help us to find answer for this one
194. A ________ sends data between two networks.
Note: This Question is unanswered, help us to find answer for this one
195. ____ is a popular cable type used as a network backbone by major telecommunications companies.
Answer
Correct Answer:
Fiber optics
Note: This Question is unanswered, help us to find answer for this one
196. Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.
Answer
Correct Answer:
Corruption
Note: This Question is unanswered, help us to find answer for this one
197. Most files on a linux system that contain configuration information are ____ files.
Note: This Question is unanswered, help us to find answer for this one
198. Log files are typically stored in the ____ directory.
Note: This Question is unanswered, help us to find answer for this one
199. A dynamic disk requires ____ mb of storage for the disk management database
Note: This Question is unanswered, help us to find answer for this one
200. Firewalls can be used on web ____.
Answer
Correct Answer:
Web Servers and Web Clients
Note: This Question is unanswered, help us to find answer for this one
201. The longest transmission distances are possible with ________.
Answer
Correct Answer:
Single-mode fiber
Note: This Question is unanswered, help us to find answer for this one
202. When three resistors are combined in series, the total resistance of the combination is __________.
Answer
Correct Answer:
Greater than any of the individual resistance values
Note: This Question is unanswered, help us to find answer for this one
203. Telecommunications around the world are shifting to ________ networks.
Note: This Question is unanswered, help us to find answer for this one
204. Each vm is known as a ____
Note: This Question is unanswered, help us to find answer for this one
205. A physical topology ____
Answer
Correct Answer:
Depicts a network in broad scope
Note: This Question is unanswered, help us to find answer for this one
206. Ethernet standards are specified at the ________ layer.
Note: This Question is unanswered, help us to find answer for this one
207. Public places where you can wirelessly connect to the internet are known as ________.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
208. A(n) _____ enables communication between a video card and memory.
Answer
Correct Answer:
Internal bus
Note: This Question is unanswered, help us to find answer for this one
209. A(n) ____ idps is focused on protecting network information assets.
Answer
Correct Answer:
Network-based
Note: This Question is unanswered, help us to find answer for this one
210. A transparent bridge creates the internal port table by using a form of ____.
Answer
Correct Answer:
Backward learning
Note: This Question is unanswered, help us to find answer for this one
211. ____ operates at the network layer and manages multicasting
Note: This Question is unanswered, help us to find answer for this one
212. ____ media operate on line-of-sight.
Answer
Correct Answer:
Terrestrial microwave
Note: This Question is unanswered, help us to find answer for this one
213. You can configure the windows firewall to allow or block specific _________.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
214. Wireless networks usually use ____ signals to send data.
Note: This Question is unanswered, help us to find answer for this one
215. Wireless network devices use ________ to communicate with each other.
Answer
Correct Answer:
Radio waves
Note: This Question is unanswered, help us to find answer for this one
216. To exchange information, two antennas must be tuned to the same __________.
Answer
Correct Answer:
Frequency
Note: This Question is unanswered, help us to find answer for this one
217. The windows server 2012 edition which is designed for servers with up to 64 processors is _____:
Answer
Correct Answer:
Windows Server 2012 R2 Datacenter
Note: This Question is unanswered, help us to find answer for this one
218. Jitter is a problem for ________.
Answer
Correct Answer:
Both A and B
Note: This Question is unanswered, help us to find answer for this one
219. To boldface text in html, you would enclose your text in ________.
Note: This Question is unanswered, help us to find answer for this one
220. Most large-scale delivery services use a ____ system to connect source and destination nodes.
Answer
Correct Answer:
Store and forward
Note: This Question is unanswered, help us to find answer for this one
221. Wi-fi access points are connected to networks via ____.
Answer
Correct Answer:
Network cable
Note: This Question is unanswered, help us to find answer for this one
222. To create a positive online learning experience, _____.
Answer
Correct Answer:
Trainees should be allowed to skip over material that they are competent in
Note: This Question is unanswered, help us to find answer for this one
223. The sql injection statement ____ determines the names of different fields in a database.
Answer
Correct Answer:
Whatever’ AND email IS NULL;
Note: This Question is unanswered, help us to find answer for this one
224. The snmp manager stores the information it receives from get commands ________.
Answer
Correct Answer:
In the MIB
Note: This Question is unanswered, help us to find answer for this one
225. The shell that is used by default in linux is the ____ shell.
Note: This Question is unanswered, help us to find answer for this one
226. The process of deciding which path data takes on a network is called _____.
Note: This Question is unanswered, help us to find answer for this one
227. Rfid technology is most useful in areas where ____ is used.
Answer
Correct Answer:
Automatic identification
Note: This Question is unanswered, help us to find answer for this one
228. Most internet connections use ____ transmission.
Answer
Correct Answer:
Full-duplex
Note: This Question is unanswered, help us to find answer for this one
229. In lans, ________ typically is for ________.
Answer
Correct Answer:
Trunk lines
Note: This Question is unanswered, help us to find answer for this one
230. A ________ is a formatted message that passes through networks.
Note: This Question is unanswered, help us to find answer for this one
231. A _____ sends messages through several connected lans or to a wide-area network.
Note: This Question is unanswered, help us to find answer for this one
232. A ____ is a hardware device that allows several nodes to share one communication channel.
Answer
Correct Answer:
Multiplexer
Note: This Question is unanswered, help us to find answer for this one
233. ____ storage allocation allows files to use any storage space available on the disk.
Answer
Correct Answer:
Noncontiguous
Note: This Question is unanswered, help us to find answer for this one
234. ____ multiplexing is the multiplexing technique used to support sonet.
Answer
Correct Answer:
Synchronous time division
Note: This Question is unanswered, help us to find answer for this one
235. ____ lets a router represent an entire local area network to the internet as a single ip address.
Note: This Question is unanswered, help us to find answer for this one
236. ____ is most frequently associated with data classification schemes.
Answer
Correct Answer:
Need to know
Note: This Question is unanswered, help us to find answer for this one
237. ____ is an example of a circuit-switched network.
Answer
Correct Answer:
A telephone system
Note: This Question is unanswered, help us to find answer for this one
238. ____ is a set of protocols created to support the secure transfer of data at the ip layer.
Answer
Correct Answer:
IPsec (IP security)
Note: This Question is unanswered, help us to find answer for this one
239. ____ describes a popular serial data transmission method
Answer
Correct Answer:
EIA/TIA RS-232 (Recommended Standard 232)
Note: This Question is unanswered, help us to find answer for this one
Engineering MCQs | Topic-wise