1.
What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?
Correct Answer
A. A. A code set is established
Explanation
When more bits are added to a digital signal arranged in a sequence understood by the sender and receiver, a code set is established. This means that a specific combination of bits is assigned a particular meaning or value. This allows the sender and receiver to communicate and interpret the digital signal accurately. The code set ensures that the information being transmitted is understood correctly and eliminates any ambiguity or confusion.
2.
How many possible symbols can 4 bits represent?
Correct Answer
D. D. 16
Explanation
Four bits can represent 2^4 = 16 different combinations. Each bit can have two possible values, 0 or 1. So, by multiplying the number of possibilities for each bit, we get the total number of possible symbols that can be represented by 4 bits, which is 16.
3.
In networking, a byte is identified as a/an
Correct Answer
B. B. word
Explanation
A byte is not identified as a bit because a bit is the smallest unit of data in computing, representing either a 0 or a 1. A byte is a unit of data that consists of 8 bits. A byte is also not identified as a letter because a letter is a character in the context of text, and it is not specific to networking. An octet is another term used to refer to a byte in networking, but it is not the most commonly used term. The correct answer, B. word, is a term used to describe a group of bytes that is typically determined by the architecture of the computer system.
4.
What organization sets important computer networking wiring standards for residential and commercial network cabling?
Correct Answer
A. A. Electronic Industries Alliance (EIA)
Explanation
The correct answer is A. Electronic Industries Alliance (EIA). The EIA is an organization that sets important computer networking wiring standards for residential and commercial network cabling. They provide guidelines and specifications for the design, installation, and maintenance of network cabling infrastructure. These standards ensure that network cables are properly installed and meet the necessary performance requirements for reliable and efficient data transmission.
5.
What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?
Correct Answer
A. A. 568A
Explanation
The correct answer is A. 568A. The Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard 568A is used for commercially building telecommunications cabling. This standard specifies the wiring scheme for Ethernet connections, including the arrangement of the wires and the pin assignments for the connectors. It ensures that the cabling is done consistently and correctly, allowing for reliable and efficient communication within the building.
6.
Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?
Correct Answer
A. A. E-carrier
Explanation
The correct answer is A. E-carrier. E-carrier is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system. It is commonly used in Europe, Asia, and Australia for transmitting voice and data signals over digital networks. E-carrier provides a hierarchical structure for multiplexing multiple voice or data channels into a single transmission line, allowing for efficient and reliable communication.
7.
There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the
Correct Answer
B. B. Institute of Electrical and Electronics Engineers (IEEE)
Explanation
The Institute of Electrical and Electronics Engineers (IEEE) is a worldwide nonprofit association of technical professionals that promotes the development of standards. They are known for their contributions to various fields including electrical engineering, electronics, computer science, telecommunications, and more. The IEEE plays a crucial role in setting standards for technologies and ensuring interoperability and compatibility across different devices and systems.
8.
A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the
Correct Answer
B. B. Institute of Electrical and Electronics Engineers (IEEE)
Explanation
The correct answer is B. Institute of Electrical and Electronics Engineers (IEEE). The explanation is that the collection of standards for LAN architectures, protocols, and technologies called Project 802 were developed by the IEEE. The IEEE is a professional organization that focuses on advancing technology in various fields, including electrical engineering and computer science. They have developed numerous standards for different technologies, and Project 802 specifically focuses on LAN standards.
9.
The "parent" organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the
Correct Answer
B. B. International Telecommunication Union (ITU)
Explanation
The correct answer is B. International Telecommunication Union (ITU). The ITU is the parent organization headquartered in Geneva, Switzerland, for all other telecommunications organizations. It is responsible for coordinating and standardizing telecommunications networks and services worldwide. It plays a crucial role in developing international telecommunications regulations and promoting global connectivity.
10.
What organization is responsible for the X-series and V-series standards?
Correct Answer
D. D. International Telecommunication Union Telecommunications Standardization Sector (ITU-T)
Explanation
The correct answer is D. International Telecommunication Union Telecommunications Standardization Sector (ITU-T). The ITU-T is responsible for developing and maintaining standards for telecommunications technologies. The X-series and V-series standards are specific sets of standards within the ITU-T framework. The X-series standards cover data networks and open systems communication, while the V-series standards cover data communication over the telephone network.
11.
Which series of standards are recommended for data transmission using teh telephone network?
Correct Answer
B. B. V
Explanation
The V series of standards are recommended for data transmission using the telephone network. These standards specify the protocols and procedures for transmitting data over analog telephone lines. They include standards such as V.21, V.22, V.32, and V.90, which define various data transmission rates and modulation techniques. These standards ensure compatibility and reliable data transmission over the telephone network.
12.
The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the
Correct Answer
C. C. International Organizaiton for Standardization (ISO)
Explanation
The OSI reference model was developed by the International Organization for Standardization (ISO). This model is a conceptual framework that standardizes the functions of a communication system into seven layers, allowing different network protocols to interoperate seamlessly. The ISO's contribution to networking through the development of the OSI reference model has been significant in establishing a common language and framework for networking technologies and protocols.
13.
Within how many feet of the data communicaitons equipment (DCE) connection does the electronics Industries Alliance (EIA) RS-232-C standard prescribes bipolar-voltage serical data transmission?
Correct Answer
B. B. 50
Explanation
The EIA RS-232-C standard prescribes bipolar-voltage serial data transmission within 50 feet of the data communications equipment (DCE) connection. This means that the transmission of data using this standard should be limited to a maximum distance of 50 feet from the DCE connection.
14.
Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?
Correct Answer
D. D. RS-530
Explanation
RS-530 is the correct answer because it is a standard interface that can work in both balanced and unbalanced electrical circuits. This means that it can accommodate different types of electrical connections, providing flexibility and compatibility in various electronic industries. RS-232-C, RS-423, and RS-485 are also interface standards, but they do not have the same ability to work in both balanced and unbalanced circuits as RS-530.
15.
What transmission rates does Electronic Industries Allinace (EIA) RS-530 Accommodate?
Correct Answer
B. B. 20 Kbps to 2 megabits per second (Mbps)
Explanation
The correct answer is B. 20 Kbps to 2 megabits per second (Mbps). This means that the EIA RS-530 can accommodate transmission rates ranging from 20 kilobits per second to 2 megabits per second.
16.
What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layer into?
Correct Answer
B. B. Logical Link Control (LLC) and Media Access Control (MAC)
Explanation
The correct answer is B. Logical Link Control (LLC) and Media Access Control (MAC). The IEEE divided the OSI data link layer into these two sublayers to handle different functions. The LLC sublayer is responsible for flow control, error control, and framing, while the MAC sublayer is responsible for addressing and accessing the physical media.
17.
At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?
Correct Answer
C. C. Presentation
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the OSI model. This layer is responsible for formatting, encrypting, and compressing data in a way that can be understood by the receiving device. By using compression, the size of the data can be reduced, allowing for faster transmission. Encryption ensures that the data is secure and can only be accessed by authorized parties. Therefore, the correct answer is C. Presentation.
18.
What Open System Interconnect (OSI) layer is closest to the end user?
Correct Answer
A. A. Application
Explanation
The correct answer is A. Application. The application layer is closest to the end user because it is responsible for providing services and interfaces that allow users to interact with the network. It includes protocols such as HTTP, FTP, and SMTP that are used by applications to communicate with each other over the network. This layer is responsible for tasks such as data formatting, encryption, and compression, as well as providing user interfaces and application services.
19.
In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?
Correct Answer
C. C. Lowest layer
Explanation
In the Open System Interconnect (OSI) model, each layer communicates with three other layers. The layer above communicates with the layer below, the layer below communicates with the layer above, and the layer communicates with its peer layer. However, the lowest layer does not communicate with any other layer below it since there are no layers below it. Therefore, the lowest layer is not one of the layers that a layer in the OSI model communicates with.
20.
Which information unit, whose source and destination are network-layer entities, uses connectionless network service?
Correct Answer
D. D. Datagram
Explanation
A datagram is an information unit that uses connectionless network service. It is a self-contained packet of data that includes both the source and destination addresses. Datagram-based communication does not require a dedicated connection between the source and destination, allowing for more efficient and flexible transmission of data over a network.
21.
What data communication protocol is used to govern the flow and format of information between systems?
Correct Answer
A. A. Character-oriented
Explanation
Character-oriented data communication protocol is used to govern the flow and format of information between systems. This protocol focuses on the transmission of characters or strings of characters, where each character is encoded and transmitted individually. It ensures that the data is transmitted in a specific format and allows for error checking and correction. This protocol is commonly used in applications that require the transmission of text-based data, such as email, instant messaging, and file transfer protocols.
22.
In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?
Correct Answer
B. B. SYN
Explanation
In binary-synchronous protocol, the character used to establish and maintain character synchronization prior to the message block and during transmission is the SYN character. This character is used to signal the start of a transmission and to ensure that both the sender and receiver are in sync. By using the SYN character, the protocol ensures that the data is transmitted correctly and that both parties are aware of the start and end of each message.
23.
What data communication protocol is based on bits and the position of the bits?
Correct Answer
B. B. Bit-oriented
Explanation
Bit-oriented data communication protocol is based on bits and the position of the bits. In this protocol, the data is transmitted and received bit by bit, with each bit's position being important for the interpretation of the data. This protocol ensures accurate and reliable data transmission by focusing on the individual bits rather than larger units of data like characters or packets. It is commonly used in applications that require precise control over data transmission, such as telecommunications and computer networking.
24.
What data communication protocol ensures that the receiving station can distinguish information from garbage?
Correct Answer
D. D. High-Level Data Link Control (HDLC)
Explanation
HDLC is a data communication protocol that ensures the receiving station can distinguish information from garbage. HDLC uses a frame structure that includes control information, allowing the receiving station to identify and extract the correct data. This protocol also provides error detection and correction mechanisms, ensuring the integrity of the transmitted data. As a result, HDLC is reliable and efficient in data communication, making it suitable for various applications.
25.
A group of computers and associated devices that share a common communications line within a small geographic area is a
Correct Answer
B. B. Local area network (LAN)
Explanation
A local area network (LAN) is a group of computers and devices that are connected to a common communications line within a small geographic area. This network is typically found in a home, office, or building and allows for the sharing of resources such as printers, files, and internet access. LANs are commonly used to facilitate communication and data transfer between devices within a close proximity.
26.
The interconnection of several networks in a city into a single larger network is a
Correct Answer
D. D. Metropolitan area network (MAN)
Explanation
The correct answer is D. Metropolitan area network (MAN). A metropolitan area network is a network that interconnects multiple local area networks (LANs) within a city or metropolitan area. It covers a larger geographical area than a LAN but smaller than a wide area network (WAN). Therefore, the interconnection of several networks in a city into a single larger network fits the definition of a metropolitan area network (MAN).
27.
What type of network connects networks that are typically separated by geographical distances?
Correct Answer
B. B. Wide area network (WAN)
Explanation
A wide area network (WAN) is the correct answer because it connects networks that are typically separated by geographical distances. Unlike local area networks (LANs) which connect devices within a limited area such as a building or campus, WANs connect devices over larger distances, often spanning multiple cities or even countries. Virtual private networks (VPNs) are a type of network that uses encryption and tunneling protocols to provide secure connections over public networks, but they can be used within both LANs and WANs. Metropolitan area networks (MANs) are networks that cover a larger area than a LAN but smaller than a WAN, typically within a city or metropolitan area.
28.
What type of network enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. C. Virtual private network (VPN)
Explanation
A virtual private network (VPN) enables a group of two or more computer systems to communicate over the public Internet. Unlike a local area network (LAN) or a wide area network (WAN), which are physical networks, a VPN creates a secure and encrypted connection over the public Internet, allowing users to access resources on a private network remotely. This enables secure communication and data transfer between the connected computer systems, making it an ideal choice for remote workers or businesses with multiple locations. A metropolitan area network (MAN) is a network that spans a city or metropolitan area, which is not relevant to the question.
29.
Which type network enables users to share resources, files, and printers in a decentralized way?
Correct Answer
C. C. Peer-to-peer
Explanation
A peer-to-peer network enables users to share resources, files, and printers in a decentralized way. In this type of network, each device connected to the network can act as both a client and a server, allowing users to directly access and share resources with one another without the need for a central server. This type of network is commonly used in small-scale environments where there is no dedicated server infrastructure.
30.
What Network layer protocol provides information about how and where data should be delivered, including the data's source and destination addresses?
Correct Answer
A. A. Internet protocol (IP)
Explanation
The correct answer is A. Internet protocol (IP). Internet Protocol (IP) is a network layer protocol that provides information about how and where data should be delivered, including the data's source and destination addresses. IP is responsible for routing packets across different networks and ensuring that they reach the correct destination. It also handles fragmentation and reassembly of packets if they are too large to be transmitted in one piece. ARP, RARP, and ICMP are all protocols that operate at different layers of the network stack and serve different purposes.
31.
Which Network layer protocol matches a known internet protocol (IP) address for a destionation device to a Media Access Control (MAC) address?
Correct Answer
B. B. Address Resolution Protocol (ARP)
Explanation
The correct answer is B. Address Resolution Protocol (ARP). ARP is a network layer protocol that is used to match an IP address to a MAC address. It is responsible for finding the MAC address of a destination device in order to establish communication at the data link layer. ARP operates within the same network and is used by devices to resolve IP addresses to MAC addresses.
32.
Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?
Correct Answer
C. C. Reverse Address Resolution Protocol (RARP)
Explanation
RARP (Reverse Address Resolution Protocol) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP is used in situations where a device wants to obtain its IP address dynamically, but only knows its MAC address. The device sends a RARP request to a RARP server, which maps the MAC address to an IP address and sends it back to the device. This allows the device to configure its IP address without manual configuration.
33.
Which Transport layer protocol does not guarantee that packets will be received at all?
Correct Answer
B. B. User Datagram Protocol (UDP)
Explanation
UDP is a connectionless transport layer protocol that does not guarantee the delivery of packets. Unlike TCP, which provides reliable and ordered delivery of packets, UDP is a best-effort protocol. It does not have mechanisms for error detection, retransmission of lost packets, or flow control. This makes UDP a suitable choice for applications that prioritize low latency and are tolerant of occasional packet loss, such as real-time streaming or online gaming.
34.
Which Application layer protocol is used to send and receive files by way of transmission control protocol/interent protocol (TCP/IP)?
Correct Answer
A. A. File Transfer Protocol (FTP)
Explanation
FTP is the correct answer because it is an application layer protocol that is specifically designed for sending and receiving files over TCP/IP. FTP allows users to transfer files between a client and a server, providing a reliable and efficient method for file sharing over a network. TFTP, SMTP, and HTTP are also application layer protocols, but they serve different purposes and are not primarily used for file transfer.
35.
Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?
Correct Answer
B. B. Trivial File Transfer Protocol (TFTP)
Explanation
TFTP is simpler than FTP when transferring files between computers. TFTP is a lightweight protocol that only supports basic file transfer functionality, while FTP is a more complex protocol that offers additional features such as directory listing and file permissions. TFTP is commonly used in scenarios where simplicity and speed are more important than advanced functionality, such as booting diskless workstations or updating firmware on network devices.
36.
Which Application layer protocol is a terminal emulation used to log on to remote hosts?
Correct Answer
A. A. Teletype Network
Explanation
Teletype Network is the correct answer because it is an application layer protocol that is used for terminal emulation. Terminal emulation allows users to log on to remote hosts and interact with them as if they were using a physical terminal. Teletype Network specifically refers to the use of teletype machines for this purpose.
37.
Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?
Correct Answer
A. A. Dynamic Host Configuration Protocol (DHCP)
Explanation
DHCP is an application layer protocol that automates the process of assigning IP addresses to devices on a network. It allows network administrators to centrally manage and allocate IP addresses to devices, ensuring that each device has a unique address. DHCP eliminates the need for manual IP address configuration, making it more efficient and scalable for large networks. TFTP is a file transfer protocol, SMTP is used for sending emails, and HTTP is used for transferring hypertext. None of these protocols are specifically designed for assigning IP addresses.