MCQs > Engineering & Manufacturing > Engineering MCQs > Networks & Telecommunication MCQs

Networks & Telecommunication MCQ

Networks & Telecommunication

1. The data found in the system state backup is ___________ on the roles the server performs.

Answer

Correct Answer: Dependent

Note: This Question is unanswered, help us to find answer for this one

2. Isolated single-bit errors occur ____ percent of the time.

Answer

Correct Answer: 40 to 50

Note: This Question is unanswered, help us to find answer for this one

3. The cisco asa device and the snort freeware program are examples of __________?

Answer

Correct Answer: IPS/IDS devices

Note: This Question is unanswered, help us to find answer for this one

4. One way to hide partitions is with the windows disk partition utility, ____.

Answer

Correct Answer: Diskpart

Note: This Question is unanswered, help us to find answer for this one

5. Internet ip packets are to cleartext what encrypted ip packets are to ________.

Answer

Correct Answer: Ciphertext

Note: This Question is unanswered, help us to find answer for this one

6. In classful addressing, class c ipv4 address host information is located in the ____.

Answer

Correct Answer: Last 8 bits

Note: This Question is unanswered, help us to find answer for this one

7. In bluetooth, a master can have up to ________ slaves at any moment.

Answer

Correct Answer: None of the above

Note: This Question is unanswered, help us to find answer for this one

8. In most common implementation models, the content filter has two components: ____.

Answer

Correct Answer: Rating and filtering

Note: This Question is unanswered, help us to find answer for this one

9. In dns, a group of resources under the control of an organization is called a ________.

Answer

Correct Answer: Domain

Note: This Question is unanswered, help us to find answer for this one

10. In the nat networking mode, a vnic relies on the ____ to act as a nat device.

Answer

Correct Answer: Host machine

Note: This Question is unanswered, help us to find answer for this one

11. In the case of connecting two wlans, access points could be as far as ____ feet apart.

Answer

Correct Answer: 1000

Note: This Question is unanswered, help us to find answer for this one

12. In the 10gbase lr standard the l stands for ____

Answer

Correct Answer: Long reach

Note: This Question is unanswered, help us to find answer for this one

13. In the ____, or ad hoc, layouts configuration, there is no access point at the center of a cell.

Answer

Correct Answer: Peer-to-peer

Note: This Question is unanswered, help us to find answer for this one

14. In snmp, companies are often reluctant to use ________ commands because of security dangers.

Answer

Correct Answer: Set

Note: This Question is unanswered, help us to find answer for this one

15. In older windows versions, the filename was restricted to _______________ characters.

Answer

Correct Answer: Eight

Note: This Question is unanswered, help us to find answer for this one

16. During installation, one may decide to go with the default drivers because they _______________.

Answer

Correct Answer: Can be upgraded later

Note: This Question is unanswered, help us to find answer for this one

17. With _____________, the ap permits the owner to provide a list of valid addresses that can connect.

Answer

Correct Answer: MAC address filtering.

Note: This Question is unanswered, help us to find answer for this one

18. A hardware component that can be changed without disrupting operations is known as ____.

Answer

Correct Answer: Hot swappable

Note: This Question is unanswered, help us to find answer for this one

19. A directional antenna issues wireless signals along a(n) ____ direction.

Answer

Correct Answer: Single

Note: This Question is unanswered, help us to find answer for this one

20. A computer lab is an example of a(n) ________ type of network.

Answer

Correct Answer: LAN

Note: This Question is unanswered, help us to find answer for this one

21. A communication skill commonly used in active listening is ____.

Answer

Correct Answer: Paraphrasing

Note: This Question is unanswered, help us to find answer for this one

22. A ______________ is a voltage, frequency, pulse, or phase change in an analog transmission.

Answer

Correct Answer: Symbol

Note: This Question is unanswered, help us to find answer for this one

23. A _________ involves setting up two firewalls: an outer and an inner firewall.

Answer

Correct Answer: DMZ (demilitarized zone)

Note: This Question is unanswered, help us to find answer for this one

24. A ________ uses the internet communications infrastructure to build a secure and private network.

Answer

Correct Answer: VPN

Note: This Question is unanswered, help us to find answer for this one

25. A ________ attack is when a webserver is flooded with application layer web requests.

Answer

Correct Answer: HTTP flood

Note: This Question is unanswered, help us to find answer for this one

26. A ____ is a network device devoted to storage and delivery of frequently requested files.

Answer

Correct Answer: Cache engine

Note: This Question is unanswered, help us to find answer for this one

27. 802.11 standards are being developed to work in the ________ unlicensed band.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

28. _____________ is a common standard for use by layer 2 access vpns for encapsulation.

Answer

Correct Answer: L2TP

Note: This Question is unanswered, help us to find answer for this one

29. __________ was developed by phil zimmermann and uses the idea cipher for message encoding.

Answer

Correct Answer: Pretty Good Privacy

Note: This Question is unanswered, help us to find answer for this one

30. __________ is the process of classifying idps alerts so that they can be more effectively managed.

Answer

Correct Answer: Alarm filtering

Note: This Question is unanswered, help us to find answer for this one

31. __________ are decoy systems designed to lure potential attackers away from critical systems.

Answer

Correct Answer: Honeypots

Note: This Question is unanswered, help us to find answer for this one

32. __________ are a component of the security triple.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

33. ________ is the percentage of time that a network is available for use.

Answer

Correct Answer: Availability

Note: This Question is unanswered, help us to find answer for this one

34. Boot camp is an installation tool that permits a choice between _______________.

Answer

Correct Answer: Mac OS X and Windows

Note: This Question is unanswered, help us to find answer for this one

35. Bittorrent can be used to distribute ____.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

36. Because nap is provided by _________, you need to install _________ to install nap.

Answer

Correct Answer: NPS, NPS

Note: This Question is unanswered, help us to find answer for this one

37. At its most primitive, a ____ is a repeater with more than one output port.

Answer

Correct Answer: Hub

Note: This Question is unanswered, help us to find answer for this one

38. As the length of a glass cable grows, the light signal attenuates due to reflection and ____.

Answer

Correct Answer: Refraction

Note: This Question is unanswered, help us to find answer for this one

39. ____ technology uses digital signaling in which the cable carries only one channel of digital data.

Answer

Correct Answer: Baseband coaxial

Note: This Question is unanswered, help us to find answer for this one

40. ____ scaling refers to adding more workstations (clients).

Answer

Correct Answer: Horizontal

Note: This Question is unanswered, help us to find answer for this one

41. ____ is the protocol used by usenet servers to send newsgroup messages over an ip network.

Answer

Correct Answer: NNTP

Note: This Question is unanswered, help us to find answer for this one

42. ____ cable ranges in size from approximately 6 to 10 mm or more (1/4 to 3/8 inch) in diameter.

Answer

Correct Answer: Thick coaxial

Note: This Question is unanswered, help us to find answer for this one

43. Typically, impulse noise is a(n) ____ burst of energy.

Answer

Correct Answer: Binary

Note: This Question is unanswered, help us to find answer for this one

44. The primary purpose of help desk performance statistics is to ____.

Answer

Correct Answer: Justify the value and expense of support services

Note: This Question is unanswered, help us to find answer for this one

45. Lab costs can be broken down into monthly, ____, and annual expenses.

Answer

Correct Answer: Quarterly

Note: This Question is unanswered, help us to find answer for this one

46. When routing tables adapt to network changes, the routing system is called ____.

Answer

Correct Answer: Adaptive

Note: This Question is unanswered, help us to find answer for this one

47. Together, the fcs and the header make up the ____-byte frame for the data.

Answer

Correct Answer: 18

Note: This Question is unanswered, help us to find answer for this one

48. To minimize the effect of echo, a device called a(n) ____ can be attached to a line.

Answer

Correct Answer: Echo suppressor

Note: This Question is unanswered, help us to find answer for this one

49. To map a drive from the command line use the command net ___________ drive: \\server\share.

Answer

Correct Answer: Use

Note: This Question is unanswered, help us to find answer for this one

50. The purpose of a(n) _____ is to respond to requests for web pages from web clients.

Answer

Correct Answer: Web server

Note: This Question is unanswered, help us to find answer for this one

51. The most reliable nmap scan is ____________ scan.

Answer

Correct Answer: Connect

Note: This Question is unanswered, help us to find answer for this one

52. The most popular mail server programs are sendmail and ____.

Answer

Correct Answer: Microsoft Outlook

Note: This Question is unanswered, help us to find answer for this one

53. The most common use for ____ is resolving host names to ip addresses.

Answer

Correct Answer: DNS

Note: This Question is unanswered, help us to find answer for this one

54. The most common example of ____ data is the human voice.

Answer

Correct Answer: Analog

Note: This Question is unanswered, help us to find answer for this one

55. The __________ disk image file format is associated with the virtualbox hypervisor.

Answer

Correct Answer: Vdi

Note: This Question is unanswered, help us to find answer for this one

56. The _______ command will print a list of the commands that you've previously executed.

Answer

Correct Answer: History

Note: This Question is unanswered, help us to find answer for this one

57. The ____ zone includes all internet web sites that are not specifically assigned to another zone.

Answer

Correct Answer: Internet

Note: This Question is unanswered, help us to find answer for this one

58. Statistical time division multiplexing is sometimes called ____ time division multiplexing.

Answer

Correct Answer: Asynchronous

Note: This Question is unanswered, help us to find answer for this one

59. More complex bus topologies consisting of multiple interconnected cable segments are termed ____.

Answer

Correct Answer: Tokens.

Note: This Question is unanswered, help us to find answer for this one

60. Mapping, monitoring speed, and determining altitude all are uses of ______.

Answer

Correct Answer: GPS

Note: This Question is unanswered, help us to find answer for this one

61. Many network engineers consider ____ to be superior to mgcp.

Answer

Correct Answer: MEGACO

Note: This Question is unanswered, help us to find answer for this one

62. Longitudinal parity is sometimes called longitudinal redundancy check or ____ parity.

Answer

Correct Answer: Horizontal

Note: This Question is unanswered, help us to find answer for this one

63. A unique characteristic of the 802.11 data frame is its ____ field.

Answer

Correct Answer: Sequence Control

Note: This Question is unanswered, help us to find answer for this one

64. A(n) _____ is an attack that takes advantage of a vulnerability.

Answer

Correct Answer: Firewall

Note: This Question is unanswered, help us to find answer for this one

65. A(n) ________ server is a server that stores and manages files for network users.

Answer

Correct Answer: File.

Note: This Question is unanswered, help us to find answer for this one

66. A(n) _____ is always running off its battery while the main power runs the battery charger.

Answer

Correct Answer: On-line UPS.

Note: This Question is unanswered, help us to find answer for this one

67. A(n) ____ is a network tool that collects copies of packets from the network and analyzes them.

Answer

Correct Answer: Packet sniffer

Note: This Question is unanswered, help us to find answer for this one

68. A(n) ____ handles all in-house calls and places calls onto outside telephone lines.

Answer

Correct Answer: Private branch exchange (PBXs)

Note: This Question is unanswered, help us to find answer for this one

69. A____ is a small electronic device that issues a signal on a wire pair.

Answer

Correct Answer: Tone generator

Note: This Question is unanswered, help us to find answer for this one

70. A vpn ____ authenticates vpn clients and establishes tunnels for vpn connections.

Answer

Correct Answer: Concentrator

Note: This Question is unanswered, help us to find answer for this one

71. Clients are able to exchange signals with satellites as long as they have a ____ path.

Answer

Correct Answer: Line-of-sight

Note: This Question is unanswered, help us to find answer for this one

72. Chip spreading codes are ____ bits in length.

Answer

Correct Answer: 64

Note: This Question is unanswered, help us to find answer for this one

73. A(n) ____ stores login information in an encrypted form on a users device.

Answer

Correct Answer: Password manager

Note: This Question is unanswered, help us to find answer for this one

74. The tcp connection termination process requires ____ packets.

Answer

Correct Answer: Four

Note: This Question is unanswered, help us to find answer for this one

75. When a new application designed for windows vista or windows 7 prints, it uses ____-based printing.

Answer

Correct Answer: XPS

Note: This Question is unanswered, help us to find answer for this one

76. With no options, ____ displays the current listing of bash environment and shell script variables.

Answer

Correct Answer: Set

Note: This Question is unanswered, help us to find answer for this one

77. When using the chmod command, the mode rwx can be represented by the number ____.

Answer

Correct Answer: 7

Note: This Question is unanswered, help us to find answer for this one

78. Wans typically send data over ____ available communications networks.

Answer

Correct Answer: Publicly

Note: This Question is unanswered, help us to find answer for this one

79. Two-way amplifiers are needed for cable ________ service.

Answer

Correct Answer: Data

Note: This Question is unanswered, help us to find answer for this one

80. To send a print job to a printer, you must first use the ____ command and specify what to print.

Answer

Correct Answer: Lp

Note: This Question is unanswered, help us to find answer for this one

81. To establish a satellite internet connection, each subscriber must have a ____.

Answer

Correct Answer: Dish antenna

Note: This Question is unanswered, help us to find answer for this one

82. Tier 1 providers own long-distance, high-speed fiber-optic networks called ______________.

Answer

Correct Answer: Backbones

Note: This Question is unanswered, help us to find answer for this one

83. There are four layers to ios. the__________ layer is how applications interact with the ios.

Answer

Correct Answer: Core services

Note: This Question is unanswered, help us to find answer for this one

84. The serial interface on the back of the connectivity device is often labeled ____.

Answer

Correct Answer: Console.

Note: This Question is unanswered, help us to find answer for this one

85. The records in the ____ file are provided to support reverse dns lookups.

Answer

Correct Answer: . db.addr

Note: This Question is unanswered, help us to find answer for this one

86. The original and flawed wireless security protocol is known as _____.

Answer

Correct Answer: WEP

Note: This Question is unanswered, help us to find answer for this one

87. The most scrutinized cipher in history is the ________.

Answer

Correct Answer: Data Encryption Standard (DES)

Note: This Question is unanswered, help us to find answer for this one

88. The lp command uses the ____ option to specify the destination printer name.

Answer

Correct Answer: -d

Note: This Question is unanswered, help us to find answer for this one

89. The linux kernel is stored in the ____ directory.

Answer

Correct Answer: Boot

Note: This Question is unanswered, help us to find answer for this one

90. The linux command _______ can be used to list the current disk devices connected to the computer.

Answer

Correct Answer: Fdisk -l

Note: This Question is unanswered, help us to find answer for this one

91. The internet key ______________ protocol enables computers to make an sa.

Answer

Correct Answer: Exchange

Note: This Question is unanswered, help us to find answer for this one

92. The ____ option can be used with the tar command to extract a specified archive.

Answer

Correct Answer: -x

Note: This Question is unanswered, help us to find answer for this one

93. The ____ denotes the type of organization or country the address specifies.

Answer

Correct Answer: TLD

Note: This Question is unanswered, help us to find answer for this one

94. One of the most common transmission flaws affecting data signals is ____.

Answer

Correct Answer: Noise

Note: This Question is unanswered, help us to find answer for this one

95. Netboot is a tool that allows one to _______________.

Answer

Correct Answer: Boot a Mac OS X machine remotely.

Note: This Question is unanswered, help us to find answer for this one

96. Mpeg-1 and mpeg-2or simply mpegare common examples of ____ compression.

Answer

Correct Answer: Code division

Note: This Question is unanswered, help us to find answer for this one

97. Most wired home networks use ________ cable, which is most susceptible to interference.

Answer

Correct Answer: Unshielded twisted-pair.

Note: This Question is unanswered, help us to find answer for this one

98. Most linux distributions today use ____ as their package manager.

Answer

Correct Answer: RPM

Note: This Question is unanswered, help us to find answer for this one

99. Modern lans use ____ or higher wiring.

Answer

Correct Answer: Cat 5

Note: This Question is unanswered, help us to find answer for this one

100. Many computers can share a smaller pool of routable ip addresses with _______________.

Answer

Correct Answer: DNAT.

Note: This Question is unanswered, help us to find answer for this one

101. Linux uses the freeware ____ shell as its default command interpreter.

Answer

Correct Answer: Bash

Note: This Question is unanswered, help us to find answer for this one

102. Linux requires ____ partition(s) at minimum.

Answer

Correct Answer: Two

Note: This Question is unanswered, help us to find answer for this one

103. The points where circuits interconnect with other circuits is known as ____.

Answer

Correct Answer: Cross-connect facilities

Note: This Question is unanswered, help us to find answer for this one

104. The parking brake brakes the __________ wheels.

Answer

Correct Answer: Rear

Note: This Question is unanswered, help us to find answer for this one

105. In a ____ attack, a person redirects or captures secure transmissions as they occur.

Answer

Correct Answer: Man-in-the-middle

Note: This Question is unanswered, help us to find answer for this one

106. If a receiver correctly receives packets 2, 3, and 4, it will respond with a(an) ____ .

Answer

Correct Answer: ACK 5

Note: This Question is unanswered, help us to find answer for this one

107. In a ____ vpn, tunnels connect multiple sites on a wan.

Answer

Correct Answer: Site-to-site

Note: This Question is unanswered, help us to find answer for this one

108. In ____ transmission, data can move in both directions at the same time, such as with a telephone.

Answer

Correct Answer: Full-duplex

Note: This Question is unanswered, help us to find answer for this one

109. In ____ both computers verify the credentials of the other

Answer

Correct Answer: Mutual authentication

Note: This Question is unanswered, help us to find answer for this one

110. Image files can be reduced by as much as ____% of the original when using lossless compression.

Answer

Correct Answer: 40
50

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

111. Ieee created the 100-mbps ethernet 802.3u protocol also called ____ ethernet.

Answer

Correct Answer: Fast

Note: This Question is unanswered, help us to find answer for this one

112. ____ is the technology behind the popular digital subscriber line (dsl) system.

Answer

Correct Answer: Discrete multitone

Note: This Question is unanswered, help us to find answer for this one

113. ____ ensures that the network does not become saturated at any one point.

Answer

Correct Answer: Congestion control

Note: This Question is unanswered, help us to find answer for this one

114. ____ cabling has become the preferred medium for star-wired bus topologies.

Answer

Correct Answer: Twisted pair

Note: This Question is unanswered, help us to find answer for this one

115. ____ are used to select unique documents from anywhere in the world.

Answer

Correct Answer: Uniform Resource Locators (URLs)

Note: This Question is unanswered, help us to find answer for this one

116. ____ are discrete waveforms, rather than continuous waveforms.

Answer

Correct Answer: Digital signals

Note: This Question is unanswered, help us to find answer for this one

117. When a new eap authentication is added, software does not have to be changed on the ________.

Answer

Correct Answer: Authenticator

Note: This Question is unanswered, help us to find answer for this one

118. Frequency shift keying is subject to ____.

Answer

Correct Answer: Intermodulation distortion

Note: This Question is unanswered, help us to find answer for this one

119. Firewalls fall into ____ major processing mode categories

Answer

Correct Answer: Five

Note: This Question is unanswered, help us to find answer for this one

120. An example of a popular client email software is ____.

Answer

Correct Answer: Microsoft Outlook

Note: This Question is unanswered, help us to find answer for this one

121. An eap failure message is sent to the ________.

Answer

Correct Answer: Authenticator

Note: This Question is unanswered, help us to find answer for this one

122. Among all possible biometrics, ____ is(are) considered truly unique.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

123. Active directory keeps a naming convention for the domain that mirrors ______.

Answer

Correct Answer: DNS

Note: This Question is unanswered, help us to find answer for this one

124. A striped volume is a ____ solution.

Answer

Correct Answer: RAID 0

Note: This Question is unanswered, help us to find answer for this one

125. A single access point and the set of hosts it serves is called a(n) ________.

Answer

Correct Answer: BSS

Note: This Question is unanswered, help us to find answer for this one

126. A signature-based idps is sometimes called a(n) ____________________-based idps.

Answer

Correct Answer: Knowledge

Note: This Question is unanswered, help us to find answer for this one

127. A packet will definitely get through if it has ________.

Answer

Correct Answer: QoS reserved capacity

Note: This Question is unanswered, help us to find answer for this one

128. A nos that contains a back dooris an example of a risk associated with ____.

Answer

Correct Answer: Protocols and software

Note: This Question is unanswered, help us to find answer for this one

129. A network _____ represents a networks physical layout.

Answer

Correct Answer: Topology

Note: This Question is unanswered, help us to find answer for this one

130. _______ is a specialized viewer software program.

Answer

Correct Answer: IrfanView

Note: This Question is unanswered, help us to find answer for this one

131. Despite its widespread availability,________typically provide(s) the least depth of news coverage

Answer

Correct Answer: Television

Note: This Question is unanswered, help us to find answer for this one

132. To eliminate the possibility of a broadcast storm, switches and bridges implement the ____.

Answer

Correct Answer: STP (Spanning Tree Protocol)

Note: This Question is unanswered, help us to find answer for this one

133. The windows server 2012 r2 edition which is designed for servers with up to 64 processors is _____:

Answer

Correct Answer: Windows Server 2012 R2 Datacenter

Note: This Question is unanswered, help us to find answer for this one

134. The vi editor is typically running in one of ____ modes.

Answer

Correct Answer: 3

Note: This Question is unanswered, help us to find answer for this one

135. The emr from a computer monitor can be picked up as far away as ____ mile.

Answer

Correct Answer: 1/2

Note: This Question is unanswered, help us to find answer for this one

136. Bluetooth differs from wimax in that bluetooth __________.

Answer

Correct Answer: Can only link up to eight devices within a 10-meter area

Note: This Question is unanswered, help us to find answer for this one

137. The server core installation option in windows server 2012 r2 effectively removes _______:

Answer

Correct Answer: Graphical User Interface

Note: This Question is unanswered, help us to find answer for this one

138. The fastest method to search for files in the linux directory tree is to use the ____ command.

Answer

Correct Answer: Locate

Note: This Question is unanswered, help us to find answer for this one

139. The domain controllers are the computers that store and run the _______________.

Answer

Correct Answer: Active Directory database

Note: This Question is unanswered, help us to find answer for this one

140. The elapsed time for data to make a round trip from point a to point b and back is called ____.

Answer

Correct Answer: Latency

Note: This Question is unanswered, help us to find answer for this one

141. The core component of the gui in linux is referred to as ____.

Answer

Correct Answer: X Windows

Note: This Question is unanswered, help us to find answer for this one

142. A(n) ____ policy controls password characteristics for local user accounts.

Answer

Correct Answer: Password

Note: This Question is unanswered, help us to find answer for this one

143. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.

Answer

Correct Answer: Df

Note: This Question is unanswered, help us to find answer for this one

144. The dominant architecture used to secure network access today is the __________ firewall.

Answer

Correct Answer: Screened subnet.

Note: This Question is unanswered, help us to find answer for this one

145. The logical printer that users can access in windows is known as a _______.

Answer

Correct Answer: Printer

Note: This Question is unanswered, help us to find answer for this one

146. In the fhs, the _____ directory contains the linux kernel and files used by the boot loader.

Answer

Correct Answer: /boot

Note: This Question is unanswered, help us to find answer for this one

147. The typical query one dns server sends to a root name server is called a(n) _______.

Answer

Correct Answer: Recursive query

Note: This Question is unanswered, help us to find answer for this one

148. The most common 1-gigabit ethernet standard in use today is ____.

Answer

Correct Answer: 1000Base-LX.

Note: This Question is unanswered, help us to find answer for this one

149. Fibre channel can support the interconnection of up to ____ devices only.

Answer

Correct Answer: 126

Note: This Question is unanswered, help us to find answer for this one

150. A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.

Answer

Correct Answer: Image

Note: This Question is unanswered, help us to find answer for this one

151. Another name for diagnostic software tools is ____.

Answer

Correct Answer: Utilitysoftware

Note: This Question is unanswered, help us to find answer for this one

152. Another name for cellular networking is ______ networking.

Answer

Correct Answer: Wide area, organic, computer, or (mobile).

Note: This Question is unanswered, help us to find answer for this one

153. Configuring a central store of admx files help solve the problem of ________.

Answer

Correct Answer: "SYSVOL bloat"

Note: This Question is unanswered, help us to find answer for this one

154. Local gpos contain fewer options than domain gpos. local gpos do not support ______.

Answer

Correct Answer: Folder redirection or Group Policy software installation

Note: This Question is unanswered, help us to find answer for this one

155. ____ is a serial connection or bus that can carry multiple channels of data at the same time.

Answer

Correct Answer: Fibre Channel

Note: This Question is unanswered, help us to find answer for this one

156. The original first-generation cell phones were ____ and designed for voice data only.

Answer

Correct Answer: Analog

Note: This Question is unanswered, help us to find answer for this one

157. Using a wireless network without the network owner's permission is known as ________.

Answer

Correct Answer: Piggybacking.

Note: This Question is unanswered, help us to find answer for this one

158. Early local area networks transmitted data at only ____ million bits per second.

Answer

Correct Answer: 10

Note: This Question is unanswered, help us to find answer for this one

159. The ____ command will confirm the system directory that you are currently in.

Answer

Correct Answer: Pwd

Note: This Question is unanswered, help us to find answer for this one

160. Strong encryption now requires ________-bit keys.

Answer

Correct Answer: 256

Note: This Question is unanswered, help us to find answer for this one

161. Rerouting traffic using arp poisoning is an attack on ________ of a network.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

162. In 802.11i, ________ authentication always uses ssl/tls.

Answer

Correct Answer: Outer

Note: This Question is unanswered, help us to find answer for this one

163. If more users move to an access point, this decreases ________.

Answer

Correct Answer: Individual throughput

Note: This Question is unanswered, help us to find answer for this one

164. Cars often have ________ networks.

Answer

Correct Answer: Wi-Fi and Bluetooth

Note: This Question is unanswered, help us to find answer for this one

165. The internet2 (i2) project started in ____.

Answer

Correct Answer: 1987

Note: This Question is unanswered, help us to find answer for this one

166. The physical address assigned to each network adapter is called its ________ address.

Answer

Correct Answer: Media access control (MAC)

Note: This Question is unanswered, help us to find answer for this one

167. The wi-fi alliance calls 802.1x mode ________ mode.

Answer

Correct Answer: Enterprise.

Note: This Question is unanswered, help us to find answer for this one

168. To drive around a city looking for working access points that are unprotected is ________.

Answer

Correct Answer: War driving

Note: This Question is unanswered, help us to find answer for this one

169. A ________ network can contain servers as well as individual computers.

Answer

Correct Answer: Client/server.

Note: This Question is unanswered, help us to find answer for this one

170. A(n) ____________________ printer has its own nic.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

171. A(n) _____________ is not a common type of dedicated server.

Answer

Correct Answer: Collision server

Note: This Question is unanswered, help us to find answer for this one

172. The transmission control protocol (tcp) operates at the osi model's ____ layer.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

173. The more twists per foot in a pair of wires, the more resistant the pair will be to ____.

Answer

Correct Answer: Cross talk

Note: This Question is unanswered, help us to find answer for this one

174. Technical management of the internet's domain name system is coordinated by ____.

Answer

Correct Answer: ICANN

Note: This Question is unanswered, help us to find answer for this one

175. Most home networks use ________ cable, which is most susceptible to interference.

Answer

Correct Answer: Unshielded twisted-pair

Note: This Question is unanswered, help us to find answer for this one

176. Getting a hash value with a ____ is much faster and easier than with a(n) ____.

Answer

Correct Answer: Hexadecimal editor, computer forensics tool

Note: This Question is unanswered, help us to find answer for this one

177. ___________ ensures that the network is operating as efficiently as possible.

Answer

Correct Answer: Performance management

Note: This Question is unanswered, help us to find answer for this one

178. The distance between corresponding points on a wave's cycle is called its ____.

Answer

Correct Answer: Wavelength

Note: This Question is unanswered, help us to find answer for this one

179. Regarding security templates, a strategy plan should consider ______.

Answer

Correct Answer: Computer roles

Note: This Question is unanswered, help us to find answer for this one

180. The data transfer speed of a wide area network (wan) depends on the speed of _____.

Answer

Correct Answer: Its interconnections

Note: This Question is unanswered, help us to find answer for this one

181. A(n) ____ connection is one in which the transfer speeds in both directions are equal.

Answer

Correct Answer: Symmetric

Note: This Question is unanswered, help us to find answer for this one

182. The test statement ____ would be used to determine if a is numerically greater than b.

Answer

Correct Answer: [ A –gt B ]

Note: This Question is unanswered, help us to find answer for this one

183. ____ technology may someday replace today?s bar code system for identifying items in inventory.

Answer

Correct Answer: RFID

Note: This Question is unanswered, help us to find answer for this one

184. ________ permits two or more people to communicate over the internet in real time.

Answer

Correct Answer: Instant messaging

Note: This Question is unanswered, help us to find answer for this one

185. The delegation of control wizard is capable of ________ permissions.

Answer

Correct Answer: Granting

Note: This Question is unanswered, help us to find answer for this one

186. Raid 0 uses disk ____, which spreads files over several disk drives.

Answer

Correct Answer: Striping

Note: This Question is unanswered, help us to find answer for this one

187. If a firewall cannot keep up with traffic volume, it will ________.

Answer

Correct Answer: Drop packets it cannot process

Note: This Question is unanswered, help us to find answer for this one

188. Wireless radio transmission speed is usually measured in terms of ________.

Answer

Correct Answer: Frequency

Note: This Question is unanswered, help us to find answer for this one

189. The highest-level dns servers are called ________.

Answer

Correct Answer: Root servers.

Note: This Question is unanswered, help us to find answer for this one

190. In vpns designed to frustrate evil twin attacks, the shared secret ________.

Answer

Correct Answer: Is not transmitted

Note: This Question is unanswered, help us to find answer for this one

191. If a firewall has to drop packets because it cannot keep up with traffic volume, this is ________.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

192. Eavesdropping usually is more of a concern for ________ lans than for ________ lans.

Answer

Correct Answer: Wireless, wired

Note: This Question is unanswered, help us to find answer for this one

193. To allow multiple users to share a single medium, fdm assigns each user a separate ____.

Answer

Correct Answer: Channel

Note: This Question is unanswered, help us to find answer for this one

194. A ________ sends data between two networks.

Answer

Correct Answer: Bridge

Note: This Question is unanswered, help us to find answer for this one

195. ____ is a popular cable type used as a network backbone by major telecommunications companies.

Answer

Correct Answer: Fiber optics

Note: This Question is unanswered, help us to find answer for this one

196. Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

Answer

Correct Answer: Corruption

Note: This Question is unanswered, help us to find answer for this one

197. Most files on a linux system that contain configuration information are ____ files.

Answer

Correct Answer: Text

Note: This Question is unanswered, help us to find answer for this one

198. Log files are typically stored in the ____ directory.

Answer

Correct Answer: /var/log

Note: This Question is unanswered, help us to find answer for this one

199. A dynamic disk requires ____ mb of storage for the disk management database

Answer

Correct Answer: 1

Note: This Question is unanswered, help us to find answer for this one

200. Firewalls can be used on web ____.

Answer

Correct Answer: Web Servers and Web Clients

Note: This Question is unanswered, help us to find answer for this one

201. The longest transmission distances are possible with ________.

Answer

Correct Answer: Single-mode fiber

Note: This Question is unanswered, help us to find answer for this one

202. When three resistors are combined in series, the total resistance of the combination is __________.

Answer

Correct Answer: Greater than any of the individual resistance values

Note: This Question is unanswered, help us to find answer for this one

203. Telecommunications around the world are shifting to ________ networks.

Answer

Correct Answer: Wi-Fi

Note: This Question is unanswered, help us to find answer for this one

204. Each vm is known as a ____

Answer

Correct Answer: Guest

Note: This Question is unanswered, help us to find answer for this one

205. A physical topology ____

Answer

Correct Answer: Depicts a network in broad scope

Note: This Question is unanswered, help us to find answer for this one

206. Ethernet standards are specified at the ________ layer.

Answer

Correct Answer: Physical

Note: This Question is unanswered, help us to find answer for this one

207. Public places where you can wirelessly connect to the internet are known as ________.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

208. A(n) _____ enables communication between a video card and memory.

Answer

Correct Answer: Internal bus

Note: This Question is unanswered, help us to find answer for this one

209. A(n) ____ idps is focused on protecting network information assets.

Answer

Correct Answer: Network-based

Note: This Question is unanswered, help us to find answer for this one

210. A transparent bridge creates the internal port table by using a form of ____.

Answer

Correct Answer: Backward learning

Note: This Question is unanswered, help us to find answer for this one

211. ____ operates at the network layer and manages multicasting

Answer

Correct Answer: IGMP

Note: This Question is unanswered, help us to find answer for this one

212. ____ media operate on line-of-sight.

Answer

Correct Answer: Terrestrial microwave

Note: This Question is unanswered, help us to find answer for this one

213. You can configure the windows firewall to allow or block specific _________.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

214. Wireless networks usually use ____ signals to send data.

Answer

Correct Answer: Radio

Note: This Question is unanswered, help us to find answer for this one

215. Wireless network devices use ________ to communicate with each other.

Answer

Correct Answer: Radio waves

Note: This Question is unanswered, help us to find answer for this one

216. To exchange information, two antennas must be tuned to the same __________.

Answer

Correct Answer: Frequency

Note: This Question is unanswered, help us to find answer for this one

217. The windows server 2012 edition which is designed for servers with up to 64 processors is _____:

Answer

Correct Answer: Windows Server 2012 R2 Datacenter

Note: This Question is unanswered, help us to find answer for this one

218. Jitter is a problem for ________.

Answer

Correct Answer: Both A and B

Note: This Question is unanswered, help us to find answer for this one

219. To boldface text in html, you would enclose your text in ________.

Answer

Correct Answer: and

Note: This Question is unanswered, help us to find answer for this one

220. Most large-scale delivery services use a ____ system to connect source and destination nodes.

Answer

Correct Answer: Store and forward

Note: This Question is unanswered, help us to find answer for this one

221. Wi-fi access points are connected to networks via ____.

Answer

Correct Answer: Network cable

Note: This Question is unanswered, help us to find answer for this one

222. To create a positive online learning experience, _____.

Answer

Correct Answer: Trainees should be allowed to skip over material that they are competent in

Note: This Question is unanswered, help us to find answer for this one

223. The sql injection statement ____ determines the names of different fields in a database.

Answer

Correct Answer: Whatever’ AND email IS NULL;

Note: This Question is unanswered, help us to find answer for this one

224. The snmp manager stores the information it receives from get commands ________.

Answer

Correct Answer: In the MIB

Note: This Question is unanswered, help us to find answer for this one

225. The shell that is used by default in linux is the ____ shell.

Answer

Correct Answer: BASH

Note: This Question is unanswered, help us to find answer for this one

226. The process of deciding which path data takes on a network is called _____.

Answer

Correct Answer: Routing

Note: This Question is unanswered, help us to find answer for this one

227. Rfid technology is most useful in areas where ____ is used.

Answer

Correct Answer: Automatic identification

Note: This Question is unanswered, help us to find answer for this one

228. Most internet connections use ____ transmission.

Answer

Correct Answer: Full-duplex

Note: This Question is unanswered, help us to find answer for this one

229. In lans, ________ typically is for ________.

Answer

Correct Answer: Trunk lines

Note: This Question is unanswered, help us to find answer for this one

230. A ________ is a formatted message that passes through networks.

Answer

Correct Answer: Packet

Note: This Question is unanswered, help us to find answer for this one

231. A _____ sends messages through several connected lans or to a wide-area network.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

232. A ____ is a hardware device that allows several nodes to share one communication channel.

Answer

Correct Answer: Multiplexer

Note: This Question is unanswered, help us to find answer for this one

233. ____ storage allocation allows files to use any storage space available on the disk.

Answer

Correct Answer: Noncontiguous

Note: This Question is unanswered, help us to find answer for this one

234. ____ multiplexing is the multiplexing technique used to support sonet.

Answer

Correct Answer: Synchronous time division

Note: This Question is unanswered, help us to find answer for this one

235. ____ lets a router represent an entire local area network to the internet as a single ip address.

Answer

Correct Answer: NAT

Note: This Question is unanswered, help us to find answer for this one

236. ____ is most frequently associated with data classification schemes.

Answer

Correct Answer: Need to know

Note: This Question is unanswered, help us to find answer for this one

237. ____ is an example of a circuit-switched network.

Answer

Correct Answer: A telephone system

Note: This Question is unanswered, help us to find answer for this one

238. ____ is a set of protocols created to support the secure transfer of data at the ip layer.

Answer

Correct Answer: IPsec (IP security)

Note: This Question is unanswered, help us to find answer for this one

239. ____ describes a popular serial data transmission method

Answer

Correct Answer: EIA/TIA RS-232 (Recommended Standard 232)

Note: This Question is unanswered, help us to find answer for this one

search