1. T1 is short for __________.
Answers
·
Transmission 1
·
Transportation 1
·
Transmission System 1
· Transportation System 1
2. How
fast is a T1 line?
Answers
·
128 Mb/sec
·
1.544 Mb/sec
·
1 Mb/sec
·
44.763 Mb/sec
Explanation: Typically, the amount of data that can be sent via a T1
connection is 1.544 megabits per second (Mbps). A dedicated high-speed
connection is one that is often used for accessing the internet, communicating
over the phone, and transferring data. Bear in mind, however, that
technological advances have resulted in speedier solutions being more readily
available in today's world.
3. Select all statements
that are true of cable internet connections.
Answers
·
They’re shared bandwidth
connections
·
They’re wireless connections
·
They’re dial-up connections
· They’re broadband connections
4. What are the
subprotocols for PPP (Point to Point Protocol)? Select all that apply.
Answers
·
FCS
·
LCP
·
NCP
· Compression
5.
What do you call the demarcation point for fiber technologies?
Answers
·
ONT
·
FTTN
·
FTTX
·
DSLAM
Explanation: In the context of fiber technology, the demarcation point is often referred to as the "fiber demarcation point" or, more simply, the "fiber demarc." At this moment, the consumer is responsible for everything that goes wrong, while the service provider is no longer liable for anything. The network equipment belonging to the customer is given the optical signal coming from the network belonging to the service provider at the point when the fiber strands split apart. This is often the location of the network interface, which enables the client to connect their own devices, such as routers or switches, to the fiber optic network.
6. What does WAN stand
for?
Answers
·
Wired Area Network
·
Wireless Area Network
·
Wireless Local Area Network
·
Wide Area Network
Explanation: The abbreviation "WAN" stands for "Wide Area
Network." It's a form of network that spans a wide region, such a city,
nation, or even worldwide connections. Examples of this include the Internet
and phone networks. Local area networks (LANs) and other kinds of networks may
be connected across a greater geographical distance using wide area networks
(WANs). This makes it possible for users in various areas to communicate with
one another and share data.
7. In a WAN, what is the
area between a demarcation point and the ISP's core network known as?
Answers
·
a Local Area Network
·
A local link
·
a local loop
·
An access point
Explanation: It is common practice to refer to the portion of a wide
area network (WAN) that is between the demarcation point and the core network
of an ISP as the "last mile" or "local loop." This is the
very last piece of the communications network that connects with the end-user's
device so that they may get services. In the context of WANs, it may include a
number of different technologies, such as fiber optics, DSL, cable, or any
other method of connecting the user's premises to the infrastructure of the
service provider.
8. A point-to-point VPN
is also known as a ______________.
Answers
·
one-to-many VPN
·
site-to-site VPN
·
port forwarding VPN
·
data link VPN
Explanation: A point-to-point virtual private network (VPN) is sometimes
referred to as a "site-to-site VPN." In this sort of VPN setup, a
secure connection is created between two distinct locations, which are often
two offices or data centers. This form of VPN configuration may also be used to
link many sites together. This makes it possible for data to be securely sent
and encrypted between the two linked locations while it is being sent over the
internet or another public network.
9. Who handles sending
data from one site to another?
Answers
·
CTO
·
ISP
·
VPN
·
T-carrier line
Explanation: The routers and firewalls that are installed at each location in a point-to-point or site-to-site virtual private network (VPN) often take on the job of transferring data from one location to another inside the network. These network devices are set up to construct and administer a virtual private network (VPN), which ensures that data is encrypted before being sent between linked locations and remains safe throughout transmission. The creation of the virtual private network (VPN) tunnel and the transmission of data between the locations using an encrypted connection are both significantly aided by the use of routers or firewalls.
10. How many address
fields does an 802.11 header contain?
Answers
·
2
·
1
·
3
· 4
11. What are wireless
channels?
Answers
·
a point-to-point wireless connection
·
an example of an ad-hoc network
·
Individual, smaller
sections of the overall frequency band used by a wireless network
·
a collision domain
Explanation: The term "wireless channels" is used to describe
certain frequencies in the radio frequency spectrum that have been set aside
specifically for wireless communication. These channels are used in the context
of Wi-Fi networks to facilitate the wireless transmission of data between
various devices, such as routers and connected devices.
Channels in Wi-Fi are often segregated from one another by
a certain frequency range. The frequency bands of 2.4 and 5 gigahertz are the
ones that are most often utilized for Wi-Fi, and the channels that are
accessible change based on the regulatory domain.
Users have the ability to pick alternative channels, which
allows them to avoid interference from other Wi-Fi networks in the area.
However, it is crucial to keep in mind that channels that are next to one
another may overlap to some degree. This means that proper channel design is
required in order to maximize performance and minimize interference in a
wireless network.
12. Which of the
following frequencies do wireless networks typically operate on? Select all
that apply.
Answers
·
5Ghz
·
1.544Ghz
·
88Mhz
·
2.4Ghz
13. WPA3 was built with
the intention of replacing which protocol?
Answers
·
IEEE 802.11
·
WLAN
·
WPA2
·
WEP
Explanation: Wi-Fi Protected Access 3, often known as WPA3, was developed with the purpose of succeeding its predecessor, WPA2, which was known as Wi-Fi Protected Access 2. WPA3 is intended to improve wireless network security by eliminating some of the flaws that plagued its predecessor, WPA2, as well as by introducing new protections against potential threats. The overall safety of connections made over Wi-Fi is increased as a result of this update's enhancements to encryption and authentication protocols.
14. An 802.11 frame
contains a number of fields. Which field describes the version of 802.11 that
is being used?
Answers
·
Duration
·
Address
·
Sequence control
·
Frame control
Explanation: "Frame Control" is the name of the field in an
802.11 frame that contains information about the version of 802.11 that is
currently being utilized. There is a subfield inside the Frame Control field
that is termed the "Protocol Version" field. This field provides
information on the version of the 802.11 standard to which the frame conforms.
Because of this, devices are able to appropriately understand and process the
frame in accordance with the version of the 802.11 protocol that has been
provided.
15. A modulator/demodulator is
better known as a what?
Answers
·
modem
·
computer
·
radio
·
telephone
Explanation: A modulator/demodulator is
most often referred to by its more common name, a "modem." The words
"modulator" and "demodulator" were combined to create the
term "modem," which stands for "modulator/demodulator." A
modem is a kind of communication equipment that converts analog impulses into
digital signals in order to send them and demodulates incoming digital signals
into analog signals in order to receive them. It is standard practice to use
modems in order to facilitate connection between computers and the internet via
telephone lines, cable networks, fiber optics, or any of the other available
communication methods.
16. Which of the following
attributes describe a broadband internet connection? (Choose all that apply)
Answers
·
Universally
available
·
Not dial-up
·
Exclusively
for business
·
Always on
17.
A T1 line consists of how many telephone channels?
Answers
·
28
·
24
·
100
·
16
18. What is the more accurate name
for a DSL modem?
Answers
·
CMTS
·
DSLAM
·
ONT
·
POTS
Explanation: A DSL modem is more accurately referred to as a
"DSL router" or a "DSL gateway." Although the term
"modem" is often used to refer to these devices, a DSL router or
gateway will generally incorporate additional functionalities in addition to
the fundamental modulation and demodulation operations. These devices often
feature routing capabilities, which enable them to control the connection
between a DSL line and various devices operating inside a local area network
(LAN). These characteristics allow them to manage the connection between the
DSL line and many devices. The phrase "DSL modem" is still often
used, however the words "DSL router" and "DSL gateway" more
accurately describe the extended capability of DSL connections.
19. With which of the following
models do many users share a certain amount of bandwidth until the
transmissions reach the ISP's core network?
Answers
·
Wireless
transmissions
·
Central
Office (CO) connection
·
Dedicated
bandwidth
·
Shared bandwidth
Explanation: The concept that numerous
users share a set amount of bandwidth before the transmissions reach the core
network of the ISP is generally referred to as "Cable Modem" or
"Cable Internet." Multiple customers in a neighborhood or local region
share the available bandwidth on the cable infrastructure until it reaches the
core network of the Internet Service Provider (ISP) while using cable internet
services. This occurs until the user reaches the core network of the ISP. This
kind of configuration is sometimes referred to as a "cable modem
network" or "cable broadband." In contrast to dedicated
bandwidth models, such as fiber-optic connections or some business-grade
services, this kind of bandwidth is shared among several users.
20. What does FTTP stand for?
Answers
·
Fiber
to the People
·
Fiber to the Premises
·
File
Transfer Telephone Protocol
·
Fiber
Telephone Total Package
Explanation: The abbreviation
"FTTP" refers for "Fiber to the Premises." It is a sort of
fiber-optic communication delivery that includes sending high-speed fiber-optic
cables directly to individual homes, companies, or other locations. This may be
done in conjunction with other types of fiber-optic communication delivery.
Internet access provided by FTTP is both quicker and more dependable than that
offered by more conventional copper-based networks.
21. A section of the radio spectrum
that’s been agreed upon to be used for certain communications is known as a
what?
Answers
·
A
channel
·
A frequency band
·
A
wireless LAN
·
A
collision domain
Explanation: A "frequency
band" or simply a "band" refers to a sector of the radio
spectrum that has been designated for certain communications and has been
mutually agreed upon by the parties involved. Each band is an area of the
electromagnetic spectrum that contains a variety of frequencies used for a
certain purpose, such as broadcasting, mobile communications, Wi-Fi, or other
wireless technologies. The management of these allocations helps to prevent
interference and ensures that the radio spectrum may be used effectively for a
variety of purposes.
22. In which type of wireless
configuration do nodes communicate directly with each other, rather than with
an access point or any other supporting infrastrucuture?
Answers
·
Ad-hoc
·
Mesh
network
·
802.11b
·
2.4Ghz
Explanation: An "ad-hoc"
network is a kind of wireless network setup that does not depend on an access
point or other supporting infrastructure. Instead, the nodes in the network
interact directly with each other. Devices, also known as nodes, in an ad-hoc wireless
network connect with each other on a peer-to-peer basis; there is no need for a
central access point in this kind of network. This kind of network is often
used for connections that are momentary or impromptu in nature, such as those
that arise in circumstances in which electronic equipment need to interact with
one another but cannot depend on a predetermined infrastructure.
23. How many bits long is a WPA2
key?
Answers
·
128
·
64
·
256
·
512
24. Cellular networking is also
known as ____ networking.
Answers
·
computer
·
mobile
·
wide
area
·
organic
Explanation: There are a few other names for cellular
networking, including "mobile networking" and "cellular
communication." Communication is made possible in cellular networks by use
of an interconnected system of cell sites, also known as base stations, which
are responsible for providing radio coverage to a given region. Connecting
mobile devices, such as smartphones and tablets, to these cell sites enables
voice and data communication to take place even when the user is moving about.
The idea that the coverage area is broken up into many cells, each of which is
supplied by a base station, is where the name "cellular" originates
from.
Shuffle Q/A 1
25. A ___ rate is the rate a dial-up
connection can send data across a phone line.
Answers
·
voice
·
data
·
baud
·
transfer
Answers
·
Fast
Internet
·
Ethernet
·
Plain
Old Telephone System (POTS)
·
Broadband
27. How many T1 lines make
up one T3 line?
Answers
·
24
·
100
·
28
·
3
Answers
·
Frame
Control Field
·
Sequence
Control Field
·
Duration
Field
·
Preamble
Answers
·
Media Access Control (MAC) filtering
·
WiFi
Protected Access (WPA)
·
Wired
Equivalent Privacy (WEP)
·
5Ghz
Channel
Answers
·
Radio Waves
·
LAN
Connections
·
Cables
·
Local
Loops
Answers
·
Broadband
·
World
Wide Web
·
USENET
·
Bulletin
Board
Answers
·
Simple
Differential Subscriber Line
·
System
Digital Subscriber Line
·
Subscriber
Digital Service Line
·
Symmetric Digital Subscriber Line
Answers
·
Optical
Network Tether
·
Optional
Network Traffic
·
Optical
Network Telephone
·
Optical Network Terminator
Answers
·
Router
·
Bridge
·
Gateway
·
Switch
Answers
·
Fiber
Optic
·
Cable
Broadband
·
Twisted
Pair Copper
·
Coaxial
Answers
·
TV
·
Coaxial
·
Copper
·
Fiber
Answers
·
Yes
·
No
·
Sometimes
Answers
·
802.11a
·
802.11b
·
802.11g
·
802.11ac
39. Which of
the following is NOT a form of broadband?
Answers
·
Fiber
·
POTS
·
DSL
·
Cable Internet
Explanation: The term "broadband" does not apply to dial-up connections. Internet access via dial-up is a slower and more traditional method that requires a telephone line in order to create a connection to the internet. It is defined by the necessity to dial a phone number, which leads to the temporary tie-up of the phone line during internet usage, and it functions at slower speeds in comparison to broadband technologies. Additionally, it is distinguished by the fact that it works. Broadband, on the other hand, refers to high-speed internet access technologies including digital subscriber line (DSL), cable, fiber-optic, satellite, and wireless connections. Broadband also includes internet access via satellite.
40. Which type of
network contains one or more access points that act as a bridge between wired
and wireless networks?
Answers
·
WAN
·
WLAN
·
VLAN
·
LAN
Explanation: A "Wireless Local Area Network" (often abbreviated as WLAN) is a sort of network that acts as a bridge between wired and wireless networks. This type of network may comprise one or more access points that perform this function. Access points in a wireless local area network (WLAN) make it easier for wireless devices (such laptops, smartphones, or tablets) to communicate with the wired network infrastructure. In this sense, access points act as a bridge that connects wireless connection to the larger network. WLANs are used in a variety of settings, including homes, workplaces, and public locations, giving users the option to connect to a network wirelessly wherever they are.
41. Cellular network
towers (or cells) are configured in such a way so that they avoid what type of
problem?
Answers
·
Signal strength
·
Overlap
·
Speed
·
Distance
Explanation: Cellular network towers, also known as cells, are set up in such a way as to circumvent the interference issue. When designing cellular networks, the coverage area is often divided into smaller cells, with each cell being responsible for its own dedicated tower or base station. This cellular structure assists in the management and distribution of radio frequencies in an effective manner, which in turn serves to reduce the risk of interference between adjoining cells.
Cellular networks are able to provide communication services of a dependable and high-quality thanks to efforts made to reduce interference. Additionally, the employment of smaller cells makes it possible for improved frequency reuse, which maximizes the utilization of the available radio spectrum.
42. What is a benefit of
a mesh network?
Answers
·
More access points can be
deployed without additional cable
·
No internet connectivity
·
All clients act as an access point
·
No access points are needed
Explanation: The
resilience and self-healing capabilities of a mesh network are two of the most
important advantages it offers. Each node (device) in a mesh network is linked,
resulting in the availability of various routes for data transmission. The
network is able to automatically divert traffic via other pathways in the event
that one of the nodes or pathways fails. The network's stability and resistance
to disruption are both improved because to its self-healing characteristic.
43. What security
standard quickly replaced WEP in most places?
Answers
·
MAC filtering
·
WLAN
·
Ad-hoc
·
WiFi Protected Access
(WPA)
Explanation: As a faster and more reliable security standard for
wireless local area networks, WPA (Wi-Fi Protected Access) swiftly took the
place of WEP (Wired Equivalent Privacy). To be more specific, WPA was
established as a stopgap measure in the place of the more robust WPA2 (Wi-Fi
Protected Access 2) protocol, which was being worked on simultaneously. WPA was
developed to overcome the flaws that were present in WEP and to offer
additional security features. These enhanced security features included
improved key management and more robust encryption mechanisms.
In the end, WPA2 became the standard that was widely accepted for protecting Wi-Fi networks. It provides sophisticated encryption methods such as AES, which stands for "Advanced Encryption Standard." Since then, the most recent generation, known as WPA3, has been released. It enhances the already formidable security capabilities of Wi-Fi networks even more.
44. What connects lots
of different cable connections to an ISP's core network?
Answers
·
CMTS
·
DSLAM
·
POTS
·
ONT
Explanation: In a cable broadband infrastructure, a CMTS (Cable Modem
Termination System) is used to link a wide variety of cable connections to the
core network of an Internet service provider. The Customer Managing Terminal
Station (CMTS) is an essential part of cable modem networks. Its primary
function is to act as an interface between the cable modems located on
consumers' premises and the core network of the Internet Service Provider
(ISP).
The Cable Modem Termination System (CMTS) is responsible for managing and controlling the connection between cable modems and the core network. This facilitates the smooth movement of data and gives various users within a cable network access to the internet. It is a very important component in the process by which broadband services are transmitted over cable networks.
45. What security
standard quickly replaced WEP in most places?
Answers
·
MAC filtering
·
WLAN
·
WiFi Protected Access
(WPA)
·
Ad-hoc
Explanation: WPA, which stands for Wi-Fi Protected Access, swiftly took
the place of WEP, which stood for Wired Equivalent Privacy, as the predominant
security standard for Wi-Fi networks almost everywhere. WPA was developed to
overcome the flaws that were present in WEP and to offer additional security
features. These enhanced security features included improved key management and
more robust encryption mechanisms. WPA (Wi-Fi Protected Access) was an
intermediate solution, but WPA2 (Wi-Fi Protected Access 2) eventually became
the widely established standard for safeguarding Wi-Fi networks. WPA2 offers
sophisticated encryption methods such as AES (sophisticated Encryption
Standard), whereas WPA was just a temporary fix. Since then, the most recent
generation, known as WPA3, has been released. It enhances the already
formidable security capabilities of Wi-Fi networks even more.