1. T1 is short for __________.
Answers
· Transmission 1
· Transportation 1
· Transmission System 1
· Transportation System 1
2. How fast is a T1 line?
Answers
· 128 Mb/sec
· 1.544 Mb/sec
· 1 Mb/sec
· 44.763 Mb/sec
Explanation: Typically, the amount of data that can be sent via a T1 connection is 1.544 megabits per second (Mbps). A dedicated high-speed connection is one that is often used for accessing the internet, communicating over the phone, and transferring data. Bear in mind, however, that technological advances have resulted in speedier solutions being more readily available in today's world.
3. Select all statements that are true of cable internet connections.
Answers
· They’re shared bandwidth connections
· They’re wireless connections
· They’re dial-up connections
· They’re broadband connections
4. What are the subprotocols for PPP (Point to Point Protocol)? Select all that apply.
Answers
· FCS
· LCP
· NCP
· Compression
5. What do you call the demarcation point for fiber technologies?
Answers
· ONT
· FTTN
· FTTX
· DSLAM
Explanation: In the context of fiber technology, the demarcation point is often referred to as the "fiber demarcation point" or, more simply, the "fiber demarc." At this moment, the consumer is responsible for everything that goes wrong, while the service provider is no longer liable for anything. The network equipment belonging to the customer is given the optical signal coming from the network belonging to the service provider at the point when the fiber strands split apart. This is often the location of the network interface, which enables the client to connect their own devices, such as routers or switches, to the fiber optic network.
6. What does WAN stand for?
Answers
· Wired Area Network
· Wireless Area Network
· Wireless Local Area Network
· Wide Area Network
Explanation: The abbreviation "WAN" stands for "Wide Area Network." It's a form of network that spans a wide region, such a city, nation, or even worldwide connections. Examples of this include the Internet and phone networks. Local area networks (LANs) and other kinds of networks may be connected across a greater geographical distance using wide area networks (WANs). This makes it possible for users in various areas to communicate with one another and share data.
7. In a WAN, what is the area between a demarcation point and the ISP's core network known as?
Answers
· a Local Area Network
· A local link
· a local loop
· An access point
Explanation: It is common practice to refer to the portion of a wide area network (WAN) that is between the demarcation point and the core network of an ISP as the "last mile" or "local loop." This is the very last piece of the communications network that connects with the end-user's device so that they may get services. In the context of WANs, it may include a number of different technologies, such as fiber optics, DSL, cable, or any other method of connecting the user's premises to the infrastructure of the service provider.
8. A point-to-point VPN is also known as a ______________.
Answers
· one-to-many VPN
· site-to-site VPN
· port forwarding VPN
· data link VPN
Explanation: A point-to-point virtual private network (VPN) is sometimes referred to as a "site-to-site VPN." In this sort of VPN setup, a secure connection is created between two distinct locations, which are often two offices or data centers. This form of VPN configuration may also be used to link many sites together. This makes it possible for data to be securely sent and encrypted between the two linked locations while it is being sent over the internet or another public network.
9. Who handles sending data from one site to another?
Answers
· CTO
· ISP
· VPN
· T-carrier line
Explanation: The routers and firewalls that are installed at each location in a point-to-point or site-to-site virtual private network (VPN) often take on the job of transferring data from one location to another inside the network. These network devices are set up to construct and administer a virtual private network (VPN), which ensures that data is encrypted before being sent between linked locations and remains safe throughout transmission. The creation of the virtual private network (VPN) tunnel and the transmission of data between the locations using an encrypted connection are both significantly aided by the use of routers or firewalls.
10. How many address fields does an 802.11 header contain?
Answers
· 2
· 1
· 3
· 4
11. What are wireless channels?
Answers
· a point-to-point wireless connection
· an example of an ad-hoc network
· Individual, smaller sections of the overall frequency band used by a wireless network
· a collision domain
Explanation: The term "wireless channels" is used to describe certain frequencies in the radio frequency spectrum that have been set aside specifically for wireless communication. These channels are used in the context of Wi-Fi networks to facilitate the wireless transmission of data between various devices, such as routers and connected devices.
Channels in Wi-Fi are often segregated from one another by a certain frequency range. The frequency bands of 2.4 and 5 gigahertz are the ones that are most often utilized for Wi-Fi, and the channels that are accessible change based on the regulatory domain.
Users have the ability to pick alternative channels, which allows them to avoid interference from other Wi-Fi networks in the area. However, it is crucial to keep in mind that channels that are next to one another may overlap to some degree. This means that proper channel design is required in order to maximize performance and minimize interference in a wireless network.
12. Which of the following frequencies do wireless networks typically operate on? Select all that apply.
Answers
· 5Ghz
· 1.544Ghz
· 88Mhz
· 2.4Ghz
13. WPA3 was built with the intention of replacing which protocol?
Answers
· IEEE 802.11
· WLAN
· WPA2
· WEP
Explanation: Wi-Fi Protected Access 3, often known as WPA3, was developed with the purpose of succeeding its predecessor, WPA2, which was known as Wi-Fi Protected Access 2. WPA3 is intended to improve wireless network security by eliminating some of the flaws that plagued its predecessor, WPA2, as well as by introducing new protections against potential threats. The overall safety of connections made over Wi-Fi is increased as a result of this update's enhancements to encryption and authentication protocols.
14. An 802.11 frame contains a number of fields. Which field describes the version of 802.11 that is being used?
Answers
· Duration
· Address
· Sequence control
· Frame control
Explanation: "Frame Control" is the name of the field in an 802.11 frame that contains information about the version of 802.11 that is currently being utilized. There is a subfield inside the Frame Control field that is termed the "Protocol Version" field. This field provides information on the version of the 802.11 standard to which the frame conforms. Because of this, devices are able to appropriately understand and process the frame in accordance with the version of the 802.11 protocol that has been provided.
15. A modulator/demodulator is better known as a what?
Answers
· modem
· computer
· radio
· telephone
Explanation: A modulator/demodulator is most often referred to by its more common name, a "modem." The words "modulator" and "demodulator" were combined to create the term "modem," which stands for "modulator/demodulator." A modem is a kind of communication equipment that converts analog impulses into digital signals in order to send them and demodulates incoming digital signals into analog signals in order to receive them. It is standard practice to use modems in order to facilitate connection between computers and the internet via telephone lines, cable networks, fiber optics, or any of the other available communication methods.
16. Which of the following attributes describe a broadband internet connection? (Choose all that apply)
Answers
· Universally available
· Not dial-up
· Exclusively for business
· Always on
17. A T1 line consists of how many telephone channels?
Answers
· 28
· 24
· 100
· 16
18. What is the more accurate name for a DSL modem?
Answers
· CMTS
· DSLAM
· ONT
· POTS
Explanation: A DSL modem is more accurately referred to as a "DSL router" or a "DSL gateway." Although the term "modem" is often used to refer to these devices, a DSL router or gateway will generally incorporate additional functionalities in addition to the fundamental modulation and demodulation operations. These devices often feature routing capabilities, which enable them to control the connection between a DSL line and various devices operating inside a local area network (LAN). These characteristics allow them to manage the connection between the DSL line and many devices. The phrase "DSL modem" is still often used, however the words "DSL router" and "DSL gateway" more accurately describe the extended capability of DSL connections.
19. With which of the following models do many users share a certain amount of bandwidth until the transmissions reach the ISP's core network?
Answers
· Wireless transmissions
· Central Office (CO) connection
· Dedicated bandwidth
· Shared bandwidth
Explanation: The concept that numerous users share a set amount of bandwidth before the transmissions reach the core network of the ISP is generally referred to as "Cable Modem" or "Cable Internet." Multiple customers in a neighborhood or local region share the available bandwidth on the cable infrastructure until it reaches the core network of the Internet Service Provider (ISP) while using cable internet services. This occurs until the user reaches the core network of the ISP. This kind of configuration is sometimes referred to as a "cable modem network" or "cable broadband." In contrast to dedicated bandwidth models, such as fiber-optic connections or some business-grade services, this kind of bandwidth is shared among several users.
20. What does FTTP stand for?
Answers
· Fiber to the People
· Fiber to the Premises
· File Transfer Telephone Protocol
· Fiber Telephone Total Package
Explanation: The abbreviation "FTTP" refers for "Fiber to the Premises." It is a sort of fiber-optic communication delivery that includes sending high-speed fiber-optic cables directly to individual homes, companies, or other locations. This may be done in conjunction with other types of fiber-optic communication delivery. Internet access provided by FTTP is both quicker and more dependable than that offered by more conventional copper-based networks.
21. A section of the radio spectrum that’s been agreed upon to be used for certain communications is known as a what?
Answers
· A channel
· A frequency band
· A wireless LAN
· A collision domain
Explanation: A "frequency band" or simply a "band" refers to a sector of the radio spectrum that has been designated for certain communications and has been mutually agreed upon by the parties involved. Each band is an area of the electromagnetic spectrum that contains a variety of frequencies used for a certain purpose, such as broadcasting, mobile communications, Wi-Fi, or other wireless technologies. The management of these allocations helps to prevent interference and ensures that the radio spectrum may be used effectively for a variety of purposes.
22. In which type of wireless configuration do nodes communicate directly with each other, rather than with an access point or any other supporting infrastrucuture?
Answers
· Ad-hoc
· Mesh network
· 802.11b
· 2.4Ghz
Explanation: An "ad-hoc" network is a kind of wireless network setup that does not depend on an access point or other supporting infrastructure. Instead, the nodes in the network interact directly with each other. Devices, also known as nodes, in an ad-hoc wireless network connect with each other on a peer-to-peer basis; there is no need for a central access point in this kind of network. This kind of network is often used for connections that are momentary or impromptu in nature, such as those that arise in circumstances in which electronic equipment need to interact with one another but cannot depend on a predetermined infrastructure.
23. How many bits long is a WPA2 key?
Answers
· 128
· 64
· 256
· 512
24. Cellular networking is also known as ____ networking.
Answers
· computer
· mobile
· wide area
· organic
Explanation: There are a few other names for cellular networking, including "mobile networking" and "cellular communication." Communication is made possible in cellular networks by use of an interconnected system of cell sites, also known as base stations, which are responsible for providing radio coverage to a given region. Connecting mobile devices, such as smartphones and tablets, to these cell sites enables voice and data communication to take place even when the user is moving about. The idea that the coverage area is broken up into many cells, each of which is supplied by a base station, is where the name "cellular" originates from.
Shuffle Q/A 1
25. A ___ rate is the rate a dial-up connection can send data across a phone line.
Answers
· voice
· data
· baud
· transfer
Answers
· Fast Internet
· Ethernet
· Plain Old Telephone System (POTS)
· Broadband
27. How many T1 lines make up one T3 line?
Answers
· 24
· 100
· 28
· 3
Answers
· Frame Control Field
· Sequence Control Field
· Duration Field
· Preamble
Answers
· Media Access Control (MAC) filtering
· WiFi Protected Access (WPA)
· Wired Equivalent Privacy (WEP)
· 5Ghz Channel
Answers
· Radio Waves
· LAN Connections
· Cables
· Local Loops
Answers
· Broadband
· World Wide Web
· USENET
· Bulletin Board
Answers
· Simple Differential Subscriber Line
· System Digital Subscriber Line
· Subscriber Digital Service Line
· Symmetric Digital Subscriber Line
Answers
· Optical Network Tether
· Optional Network Traffic
· Optical Network Telephone
· Optical Network Terminator
Answers
· Router
· Bridge
· Gateway
· Switch
Answers
· Fiber Optic
· Cable Broadband
· Twisted Pair Copper
· Coaxial
Answers
· TV
· Coaxial
· Copper
· Fiber
Answers
· Yes
· No
· Sometimes
Answers
· 802.11a
· 802.11b
· 802.11g
· 802.11ac
39. Which of the following is NOT a form of broadband?
Answers
· Fiber
· POTS
· DSL
· Cable Internet
Explanation: The term "broadband" does not apply to dial-up connections. Internet access via dial-up is a slower and more traditional method that requires a telephone line in order to create a connection to the internet. It is defined by the necessity to dial a phone number, which leads to the temporary tie-up of the phone line during internet usage, and it functions at slower speeds in comparison to broadband technologies. Additionally, it is distinguished by the fact that it works. Broadband, on the other hand, refers to high-speed internet access technologies including digital subscriber line (DSL), cable, fiber-optic, satellite, and wireless connections. Broadband also includes internet access via satellite.
40. Which type of network contains one or more access points that act as a bridge between wired and wireless networks?
Answers
· WAN
· WLAN
· VLAN
· LAN
Explanation: A "Wireless Local Area Network" (often abbreviated as WLAN) is a sort of network that acts as a bridge between wired and wireless networks. This type of network may comprise one or more access points that perform this function. Access points in a wireless local area network (WLAN) make it easier for wireless devices (such laptops, smartphones, or tablets) to communicate with the wired network infrastructure. In this sense, access points act as a bridge that connects wireless connection to the larger network. WLANs are used in a variety of settings, including homes, workplaces, and public locations, giving users the option to connect to a network wirelessly wherever they are.
41. Cellular network towers (or cells) are configured in such a way so that they avoid what type of problem?
Answers
· Signal strength
· Overlap
· Speed
· Distance
Explanation: Cellular network towers, also known as cells, are set up in such a way as to circumvent the interference issue. When designing cellular networks, the coverage area is often divided into smaller cells, with each cell being responsible for its own dedicated tower or base station. This cellular structure assists in the management and distribution of radio frequencies in an effective manner, which in turn serves to reduce the risk of interference between adjoining cells.
Cellular networks are able to provide communication services of a dependable and high-quality thanks to efforts made to reduce interference. Additionally, the employment of smaller cells makes it possible for improved frequency reuse, which maximizes the utilization of the available radio spectrum.
42. What is a benefit of a mesh network?
Answers
· More access points can be deployed without additional cable
· No internet connectivity
· All clients act as an access point
· No access points are needed
Explanation: The resilience and self-healing capabilities of a mesh network are two of the most important advantages it offers. Each node (device) in a mesh network is linked, resulting in the availability of various routes for data transmission. The network is able to automatically divert traffic via other pathways in the event that one of the nodes or pathways fails. The network's stability and resistance to disruption are both improved because to its self-healing characteristic.
43. What security standard quickly replaced WEP in most places?
Answers
· MAC filtering
· WLAN
· Ad-hoc
· WiFi Protected Access (WPA)
Explanation: As a faster and more reliable security standard for wireless local area networks, WPA (Wi-Fi Protected Access) swiftly took the place of WEP (Wired Equivalent Privacy). To be more specific, WPA was established as a stopgap measure in the place of the more robust WPA2 (Wi-Fi Protected Access 2) protocol, which was being worked on simultaneously. WPA was developed to overcome the flaws that were present in WEP and to offer additional security features. These enhanced security features included improved key management and more robust encryption mechanisms.
In the end, WPA2 became the standard that was widely accepted for protecting Wi-Fi networks. It provides sophisticated encryption methods such as AES, which stands for "Advanced Encryption Standard." Since then, the most recent generation, known as WPA3, has been released. It enhances the already formidable security capabilities of Wi-Fi networks even more.
44. What connects lots of different cable connections to an ISP's core network?
Answers
· CMTS
· DSLAM
· POTS
· ONT
Explanation: In a cable broadband infrastructure, a CMTS (Cable Modem Termination System) is used to link a wide variety of cable connections to the core network of an Internet service provider. The Customer Managing Terminal Station (CMTS) is an essential part of cable modem networks. Its primary function is to act as an interface between the cable modems located on consumers' premises and the core network of the Internet Service Provider (ISP).
The Cable Modem Termination System (CMTS) is responsible for managing and controlling the connection between cable modems and the core network. This facilitates the smooth movement of data and gives various users within a cable network access to the internet. It is a very important component in the process by which broadband services are transmitted over cable networks.
45. What security standard quickly replaced WEP in most places?
Answers
· MAC filtering
· WLAN
· WiFi Protected Access (WPA)
· Ad-hoc
Explanation: WPA, which stands for Wi-Fi Protected Access, swiftly took the place of WEP, which stood for Wired Equivalent Privacy, as the predominant security standard for Wi-Fi networks almost everywhere. WPA was developed to overcome the flaws that were present in WEP and to offer additional security features. These enhanced security features included improved key management and more robust encryption mechanisms. WPA (Wi-Fi Protected Access) was an intermediate solution, but WPA2 (Wi-Fi Protected Access 2) eventually became the widely established standard for safeguarding Wi-Fi networks. WPA2 offers sophisticated encryption methods such as AES (sophisticated Encryption Standard), whereas WPA was just a temporary fix. Since then, the most recent generation, known as WPA3, has been released. It enhances the already formidable security capabilities of Wi-Fi networks even more.