1.
(201) At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?
Correct Answer
D. Transport.
Explanation
At the Transport layer of the OSI model, virtual circuits are established, maintained, and terminated. This layer is responsible for end-to-end communication and ensures the reliable delivery of data between network devices. It establishes a logical connection between the sender and receiver, sets up parameters for data transmission, and manages flow control and error correction. The Transport layer also provides multiplexing and demultiplexing of data, allowing multiple applications to use the network simultaneously. Therefore, virtual circuits are handled at the Transport layer.
2.
(201) Which of the following is an example of a video compression standard?
Correct Answer
A. Motion Picture Experts Group-4 (MPEG-4).
Explanation
MPEG-4 is a video compression standard developed by the Motion Picture Experts Group (MPEG). It is widely used for compressing and transmitting video files over the internet. JPEG, on the other hand, is a standard for compressing still images, not videos. FTP is a protocol used for transferring files, not for video compression. G.711 is a standard for compressing audio, not video. Therefore, the correct answer is Motion Picture Experts Group-4 (MPEG-4).
3.
(202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?
Correct Answer
C. Lowest layer.
Explanation
In the Open System Interconnect (OSI) model, each layer communicates with the layer directly above and below it, as well as with its peer layer in another system. The lowest layer, also known as the physical layer, is responsible for the actual transmission of data over the physical medium, such as cables or wireless signals. It does not communicate with any other layers below it since it is the lowest layer in the hierarchy.
4.
(203) What data communication protocol uses characters or "handshaking" to control the link and represent information?
Correct Answer
B. Binary synchronous protocol.
Explanation
Binary synchronous protocol is a data communication protocol that uses characters or "handshaking" to control the link and represent information. It is a synchronous protocol, meaning that data is transmitted in a continuous stream without start and stop bits. The protocol uses a specific sequence of characters to establish and maintain synchronization between the sender and receiver. It also provides error checking and flow control mechanisms to ensure reliable data transmission. Therefore, the correct answer is Binary synchronous protocol.
5.
(203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?
Correct Answer
B. SYN.
Explanation
In binary-synchronous protocol, the character "SYN" is used to establish and maintain character synchronization prior to the message block and during transmission. This character is responsible for ensuring that both the sender and receiver are in sync and ready to transmit and receive data. It helps to prevent any data corruption or loss during the transmission process.
6.
(203) Which data communication protocol is based on bits and the position of the bits?
Correct Answer
B. Bit-oriented.
Explanation
Bit-oriented data communication protocol is based on the individual bits and their positions within a data stream. This protocol focuses on the manipulation and interpretation of the bits themselves, rather than treating them as part of larger characters or data units. It is commonly used in applications where precise control and synchronization of individual bits are required, such as in telecommunication systems or error detection and correction algorithms.
7.
(203) Which data communication protocol is a transmission code that supports a variety of link types and topologies?
Correct Answer
C. Synchronous Data Link Control (SDLC).
Explanation
SDLC is a data communication protocol that supports a variety of link types and topologies. It is a synchronous protocol, meaning that it uses a clock signal to synchronize the transmission and reception of data. SDLC is widely used in telecommunications and networking systems, and it provides reliable and efficient data transmission by ensuring error detection and correction, flow control, and data integrity. Asynchronous protocol does not support a variety of link types and topologies, while Binary Synchronous Protocol (BSP) and High-Level Data Link Control (HDLC) are specific protocols that are based on SDLC.
8.
(204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?
Correct Answer
B. Address Resolution Protocol (ARP).
Explanation
The network layer protocol that matches a known IP address to a MAC address is the Address Resolution Protocol (ARP). ARP is responsible for mapping an IP address to its corresponding MAC address in order to establish communication between devices on a local network.
9.
(204) Which Network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol (ICMP).
Explanation
ICMP is a network layer protocol that provides messaging capabilities to help with troubleshooting. It is used by network devices to send error messages and operational information, allowing network administrators to identify and diagnose network problems. ICMP messages include error reporting, echo requests, and echo replies, which can be used to test connectivity and measure network performance. Therefore, ICMP is the correct answer as it assists in troubleshooting network issues.
10.
(204) Which Transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol (TCP).
Explanation
Transmission Control Protocol (TCP) provides reliable data delivery services. Unlike User Datagram Protocol (UDP), TCP ensures that data is delivered in the correct order and without errors. TCP uses acknowledgments and retransmissions to guarantee that all data packets are successfully received by the recipient. This makes TCP suitable for applications that require accurate and complete data transmission, such as file transfer and web browsing. Internet Protocol (IP), User Datagram Protocol (UDP), and Internet Control Message Protocol (ICMP) do not provide the same level of reliability as TCP.
11.
(204) Which Application layer protocol is used to synchronize the clocks of computers on a network?
Correct Answer
C. Network Time Protocol (NTP).
Explanation
Network Time Protocol (NTP) is the correct answer because it is specifically designed to synchronize the clocks of computers on a network. NTP allows computers to accurately maintain time by synchronizing with a reference time source, such as an atomic clock or a time server. It ensures that all devices on the network have consistent and accurate time, which is crucial for various network operations, including authentication, logging, and coordination of distributed systems. SNMP, DHCP, and PING are not used for clock synchronization purposes.
12.
(205) Which network Class has the most addresses for hosts?
Correct Answer
A. A.
Explanation
Network Class A has the most addresses for hosts because it uses a 32-bit address space, allowing for a maximum of 2^24 (16,777,216) host addresses. This class is typically assigned to large organizations and internet service providers, which require a large number of host addresses. Network Class B and C have progressively smaller address spaces, with Class B allowing for a maximum of 2^16 (65,536) host addresses and Class C allowing for a maximum of 2^8 (256) host addresses.
13.
(205) How many subnet bits are required to support 90 subnets on a Class B network?
Correct Answer
C. Seven.
Explanation
To support 90 subnets on a Class B network, we need to determine the number of subnet bits required. A Class B network has a default subnet mask of 16 bits for the network portion. To calculate the number of subnet bits required, we need to find the smallest power of 2 that is equal to or greater than 90. The smallest power of 2 greater than 90 is 128, which requires 7 bits. Therefore, seven subnet bits are required to support 90 subnets on a Class B network.
14.
(206) Internet protocol version 6 (IPv6) addresses are represented by
Correct Answer
B. 8 groups of hexadecimal numbers.
Explanation
IPv6 addresses are represented by 8 groups of hexadecimal numbers. This is because IPv6 uses a 128-bit address format, which is much larger than the 32-bit address format used by IPv4. In order to represent this larger address space, IPv6 addresses are written in hexadecimal notation, with each group consisting of 4 hexadecimal digits. The groups are separated by colons, resulting in a total of 8 groups. This representation allows for a much larger number of unique addresses to be assigned, which is necessary to accommodate the growing number of devices connecting to the internet.
15.
(206) Teredo has four tunneling components. Which one is not one of them?
Correct Answer
D. Agent.
Explanation
The question is asking about the tunneling components of Teredo. Teredo is an IPv6 transition technology that enables IPv6 connectivity for IPv4-only hosts. It has four tunneling components, which are host-specific relay, client, server, and agent. The correct answer is "Agent" because it is not one of the tunneling components of Teredo.
16.
(207) Which device has multiport connectivity that directs data between nodes on a network?
Correct Answer
B. Router.
Explanation
A router is a device that has multiport connectivity and is responsible for directing data between nodes on a network. It determines the most efficient path for data packets to travel and forwards them accordingly. Unlike a bridge, which connects two separate networks, a router can connect multiple networks together. A gateway, on the other hand, is a device that connects a network to another network using different protocols. A repeater is a device that amplifies or regenerates signals to extend the reach of a network.
17.
(207) Which routing protocol do internet backbones use?
Correct Answer
A. Border Gateway Protocol (BGP).
Explanation
Internet backbones use Border Gateway Protocol (BGP) as the routing protocol. BGP is designed to exchange routing and reachability information between different autonomous systems (AS) on the internet. It allows internet service providers (ISPs) to determine the most efficient paths for data traffic and enables the exchange of routing information between different networks. BGP is widely used in large-scale networks and is known for its scalability and ability to handle complex routing policies.
18.
(208) Which router port is used for initial configuration?
Correct Answer
B. Console.
Explanation
The console port is used for the initial configuration of a router. This port allows direct access to the router's command-line interface (CLI) through a console cable. By connecting a computer to the console port using a console cable, network administrators can configure the router using terminal emulation software. This port is typically used for initial setup, troubleshooting, and password recovery purposes. The auxiliary port, on the other hand, is used for remote access to the router. Ethernet and Telnet are not used for the initial configuration process.
19.
(208) When configuring a router, you control access to privileged EXEC mode by configuring which password?
Correct Answer
C. Enable.
Explanation
When configuring a router, the access to privileged EXEC mode is controlled by configuring the "enable" password. This password is used to authenticate users and grant them access to the privileged EXEC mode, which allows them to make configuration changes and access sensitive information on the router. The "line console" and "line vty" passwords are used to control access to the console and virtual terminal lines respectively, while the "secret" password is used to encrypt the enable password.
20.
(208) On a router's serial interface connection, what provides the timing signal for the communication link?
Correct Answer
A. Data communication equipment.
Explanation
Data communication equipment provides the timing signal for the communication link on a router's serial interface connection. This equipment is responsible for transmitting and receiving data between devices, and it also ensures that the timing of the data transmission is synchronized between the sender and receiver. The timing signal is crucial for maintaining the integrity and accuracy of the data being transferred over the communication link.
21.
(209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an
Correct Answer
D. A Public Network.
Explanation
Virtual Private Networks (VPNs) allow the AF to extend network resources across a public network. This means that the AF can securely access and utilize network resources from remote locations using the internet or any other public network. VPNs provide a secure connection by encrypting the data transmitted over the public network, ensuring confidentiality and integrity of the information being transmitted. This allows the AF to connect to and utilize resources on a public network as if they were directly connected to it, without compromising security.
22.
(210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?
Correct Answer
B. Logical.
Explanation
The correct answer is logical because logical topology refers to the way in which devices communicate and data is transmitted throughout the network, regardless of the physical layout or connections. It defines how devices are logically connected and how data flows between them, such as through a bus, ring, or mesh network. Physical topology, on the other hand, refers to the physical layout and connections of devices in the network, such as star, bus, or ring. Hybrid topology is a combination of different physical topologies, while star topology is a specific type of physical topology where all devices are connected to a central hub.
23.
(210) Which topology has the stations connected in the form of a circle?
Correct Answer
B. Ring.
Explanation
The stations connected in the form of a circle refers to a ring topology. In a ring topology, each station is connected to two neighboring stations, forming a closed loop. Data is transmitted in one direction around the ring, with each station receiving and forwarding the data until it reaches its destination. This topology is commonly used in token ring networks, where a token is passed around the ring to control access to the network.
24.
(210) Which topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid.
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that the network can have elements of different topologies such as bus, ring, and star. The hybrid topology allows for flexibility and scalability as it can adapt to different network requirements. It combines the advantages of multiple topologies while minimizing their limitations, making it a versatile choice for complex networks.
25.
(211) Which device subdivides a network into smaller logical pieces, or segments?
Correct Answer
A. Switch.
Explanation
A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and is responsible for forwarding data packets between devices within a local area network (LAN). A switch learns the MAC addresses of connected devices and uses this information to efficiently transmit data to the appropriate destination. By dividing a network into segments, a switch improves network performance, reduces collisions, and increases overall network efficiency.
26.
(211) The time it takes a switch to figure out where to forward a data unit is called its
Correct Answer
C. Latency.
Explanation
Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay caused by processing and forwarding the data. The other options, such as lag, hop, and time zone, are not relevant to the process of forwarding data in a switch.
27.
(211) Which of the following is not a distinct layer of a hierarchical network design?
Correct Answer
C. Transport.
Explanation
In a hierarchical network design, the core layer, access layer, and distribution layer are all distinct layers that serve different purposes. The core layer is responsible for high-speed backbone connectivity between different network segments. The access layer provides connectivity for end devices and users to the network. The distribution layer aggregates traffic from the access layer and provides routing and filtering functions. However, the transport layer is not a distinct layer in the hierarchical network design. It is a layer in the OSI model that is responsible for end-to-end communication between hosts and ensures reliable data delivery.
28.
(214) Which physical security action can you take to ensure network equipment supports the widest range of security services?
Correct Answer
A. Configure the equipment with the maximum amount of memory possible.
Explanation
By configuring the network equipment with the maximum amount of memory possible, it can support a wider range of security services. Memory plays a crucial role in the performance and functionality of network equipment. With more memory, the equipment can handle and store more data, allowing it to support various security services effectively. This includes features like encryption, firewall, intrusion detection systems, and other security measures that require additional memory resources. Therefore, by maximizing the equipment's memory capacity, it can provide a stronger and more comprehensive security infrastructure for the network.
29.
How many broadcast domains forms a Virtual LAN (VLAN)?
Correct Answer
A. 1.
Explanation
A Virtual LAN (VLAN) is a logical division of a network into separate broadcast domains. By creating VLANs, network administrators can segment a network into smaller, isolated groups, allowing for better control and management of network traffic. Each VLAN forms its own broadcast domain, meaning that broadcast traffic is isolated within each VLAN and does not propagate to other VLANs. Therefore, only one broadcast domain is formed by a single VLAN.
30.
(211) What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?
Correct Answer
A. VLAN trunks.
Explanation
VLAN trunks allow for the transportation of all active VLANs between switches using a single physical link. A VLAN trunk is a network link that can carry multiple VLANs simultaneously, allowing for efficient and flexible network design. By using VLAN trunks, multiple VLANs can be transmitted over a single physical connection, eliminating the need for separate links for each VLAN. This enables the consolidation of network traffic and simplifies network management.
31.
(211) Which of the following will minimize EtherChannel configuration problems?
Correct Answer
B. Configure all interfaces to operate at the same speed and duplex mode.
Explanation
Configuring all interfaces to operate at the same speed and duplex mode will minimize EtherChannel configuration problems. This ensures that all interfaces in the EtherChannel have consistent settings, preventing any mismatch or compatibility issues. By having the same speed and duplex mode, the interfaces can communicate effectively and efficiently, reducing the chances of errors or performance degradation. This configuration also simplifies troubleshooting as any issues related to speed or duplex mismatch can be eliminated.
32.
(212) Which institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?
Correct Answer
A. 802.11a.
Explanation
The IEEE specification 802.11a operates in the 5 GHz frequency band, which is less crowded compared to the 2.4 GHz frequency band used by 802.11b and 802.11g. Household appliances and medical devices typically operate in the 2.4 GHz frequency band, so 802.11a is least susceptible to interference from these devices. 802.11r is a fast roaming standard and is not related to interference susceptibility.
33.
(212) Which wireless design phase accounts for the amount of users on the network, the training required for the users and security and integrity requirements of the network data?
Correct Answer
A. Planning.
Explanation
The wireless design phase that accounts for the amount of users on the network, the training required for the users, and security and integrity requirements of the network data is planning. During the planning phase, the network designers analyze the requirements and constraints of the wireless network, including the number of users, their training needs, and the security measures needed to protect the network data. This phase helps in creating a solid foundation for the wireless network design and ensures that it meets the specific needs of the users and the organization.
34.
(212) What identifier differentiates one wireless local area network (WLAN) from anther?
Correct Answer
C. Service Set Identifier (SSID).
Explanation
The Service Set Identifier (SSID) is the correct answer because it is a unique identifier that differentiates one wireless local area network (WLAN) from another. It is a case-sensitive alphanumeric string that is assigned to a WLAN and is used by wireless devices to connect to a specific network. The SSID allows devices to identify and connect to the correct network among multiple available networks in the vicinity.
35.
(213) A Management Information Base (MIB) is a collection of information that is organized
Correct Answer
B. Hierarchically.
Explanation
A Management Information Base (MIB) is a collection of information that is organized hierarchically. This means that the information is structured in a hierarchical manner, with parent-child relationships between different levels of information. This organization allows for easier management and navigation of the information within the MIB, as it provides a clear structure and allows for efficient retrieval of specific data.
36.
(213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for
Correct Answer
A. Future growth.
Explanation
SNMP is a tool used by network administrators to manage network performance, investigate and solve network problems, and help plan for future growth. It allows administrators to monitor and gather information about network devices and their performance, which can be used to identify potential bottlenecks or areas that need improvement. By analyzing this data, administrators can make informed decisions about network upgrades or expansions to accommodate future growth and ensure the network remains efficient and reliable.
37.
(214) In general, you should deny direct dial-in access to a network device by disabling which port?
Correct Answer
B. Auxiliary.
Explanation
Denying direct dial-in access to a network device can be achieved by disabling the auxiliary port. The auxiliary port is typically used for out-of-band management, allowing remote access to the device. By disabling this port, unauthorized users cannot directly dial into the network device, enhancing security. The console port is used for local management, the interface ports are used for network connectivity, and virtual terminal ports are used for remote access via telnet or SSH.
38.
(215) Individual pulses within a digital signal are
Correct Answer
A. Bits.
Explanation
Individual pulses within a digital signal are referred to as bits. In digital communication, information is represented using binary digits or bits, which can have a value of either 0 or 1. These bits are transmitted as pulses, where each pulse represents a single bit of data. Therefore, the correct answer is bits.
39.
(215) What is most commonly used in data systems to express signaling speed?
Correct Answer
C. Bits per second.
Explanation
In data systems, the most commonly used term to express signaling speed is "bits per second." This refers to the number of bits that can be transmitted or processed in one second. Baud rate, interface speed, and baud per second are not as commonly used terminologies in this context.
40.
(216) Which option is a characteristic of synchronous data operation?
Correct Answer
D. All data bits are the same length in time.
Explanation
A characteristic of synchronous data operation is that all data bits are the same length in time. This means that each bit of data is transmitted for the same duration, ensuring that the receiver can accurately interpret the data. This allows for precise timing and synchronization between the sender and receiver, as they both operate on the assumption that each bit will be transmitted and received within the same timeframe. This characteristic is important in ensuring reliable and accurate data transmission.
41.
(216) A digital signal that contains synchronizing bits within the signal stream describes
Correct Answer
B. Asynchronous operation.
Explanation
A digital signal that contains synchronizing bits within the signal stream describes asynchronous operation. This means that the signal does not rely on a fixed timing mechanism or clock to transmit data. Instead, the synchronizing bits are used to indicate the start and end of each data unit, allowing for flexibility in the timing of transmission. This allows for more efficient and reliable communication, especially in situations where there may be variations in the timing of data transmission.
42.
(217) How many voltage levels does a binary signal have?
Correct Answer
B. 2.
Explanation
A binary signal has two voltage levels, typically represented as 0 and 1. These voltage levels correspond to the two possible states of a binary signal, indicating either the absence or presence of a signal. This is the fundamental characteristic of a binary signal, allowing for the representation and transmission of digital information.
43.
(217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?
Correct Answer
D. Return-to-zero
Explanation
Return-to-zero is a type of digital signal where the signal level moves to one of the discrete signal levels and then returns to the zero level after a predetermined time. This means that the signal alternates between positive and negative levels, with a period of zero in between each level change. Unlike non-return-to-zero (NRZ) signals, which maintain a constant level until the next signal change, return-to-zero signals have a built-in mechanism to ensure that the signal returns to the zero level, providing synchronization and preventing signal distortion.
44.
(218) Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to
Correct Answer
D. Maintain ones density standards.
Explanation
Digital coding techniques such as binary with eight-zero substitution (B8ZS) are designed to maintain ones density standards. Ones density refers to the ratio of ones to zeros in a digital signal. By substituting eight consecutive zeros with a specific pattern, B8ZS ensures that the density of ones is maintained, which is important for synchronization and clock recovery in high-speed digital communication systems. This coding technique helps in reducing errors and maintaining the integrity of the transmitted data.
45.
(218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?
Correct Answer
D. Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.
Explanation
A B8ZS signal is a type of line encoding used in telecommunications. It is designed to break up long strings of zeros in the data signal by intentionally inserting bipolar violations. This helps to ensure that the receiver can accurately detect the boundaries between bits and maintain synchronization. The other statements in the question do not accurately describe the characteristics of a B8ZS signal.
46.
(219) How many bits are in the extended superframe format (ESF) framing sequence?
Correct Answer
C. 24.
Explanation
The extended superframe format (ESF) framing sequence consists of 24 bits. This framing sequence is used in T1 digital transmission systems to provide synchronization and framing information. It is composed of various bits that help in identifying the beginning and end of each frame, as well as in detecting errors in the transmission. Therefore, the correct answer is 24.
47.
(220) The signaling equipment has three types of communications signals that functions to
Correct Answer
C. Control and process calls.
Explanation
The signaling equipment has three types of communication signals that control and process calls. This means that the equipment is responsible for managing and handling phone calls, ensuring that they are routed correctly and that the necessary translations and addressing are performed. The signals play a crucial role in controlling the flow of calls and ensuring smooth communication.
48.
(220) Which communications control signal uses a two-frequency dialing combination?
Correct Answer
B. Tone.
Explanation
The correct answer is "Tone" because tone dialing uses a two-frequency combination to transmit signals during phone communication. This method replaced the older pulse dialing system, which relied on mechanical switches to send electrical pulses corresponding to the dialed numbers. Tone dialing is more efficient and allows for faster and more accurate dialing.
49.
(221) In common associated signaling (CAS), what is the seventh bit in frame 6 and 12 used for?
Correct Answer
A. Bit robbing.
Explanation
In common associated signaling (CAS), the seventh bit in frame 6 and 12 is used for "bit robbing." Bit robbing refers to the process of stealing a bit from the least significant digit in order to transmit additional information. It is commonly used in telecommunication systems to transmit signaling information along with voice data. By robbing this bit, the system can convey important signaling information without affecting the voice quality or other data being transmitted.
50.
(221) How is supervisory signaling information transferred in common channel signaling (CCS)?
Correct Answer
D. Separate network channel.
Explanation
In common channel signaling (CCS), supervisory signaling information is transferred through a separate network channel. This means that the signaling information is sent separately from the voice or data traffic, ensuring that it does not interfere with the main communication channel. This allows for more efficient and reliable signaling, as it is not affected by congestion or other issues that may occur in the main channel.