1.
QUESTION NO: 51*
When troubleshooting a network error, a technician using a laptop as a network sniffer can see all the communications on the network segment. Which off the following network devices is the laptop plugged into?
Correct Answer
C. Hub
Explanation
A hub is a network device that allows multiple devices to connect and communicate with each other. It operates at the physical layer of the network and does not perform any intelligent routing or filtering of network traffic. When a laptop is plugged into a hub, it can capture and analyze all the communications on the network segment because the hub broadcasts all incoming traffic to all connected devices. This makes it an effective tool for network troubleshooting as it allows the technician to monitor and analyze network traffic for any errors or issues.
2.
-QUESTION NO: 52*
Which of the following could be installed to improve network performance when accessing Internet websites?
Correct Answer
A. Caching engine
Explanation
A caching engine could be installed to improve network performance when accessing Internet websites. A caching engine stores copies of frequently accessed web pages or files, allowing them to be served quickly to users without having to retrieve them from the original source each time. This reduces the amount of bandwidth required and improves response times for users accessing the websites.
3.
QUESTION NO: 53
Which of the following WAN layer two protocols would be BEST suited for a full mesh topology?
Correct Answer
C. MPLS
Explanation
MPLS (Multiprotocol Label Switching) would be the best suited WAN layer two protocol for a full mesh topology. MPLS uses labels to efficiently route data packets across a network, allowing for a more flexible and scalable network architecture. In a full mesh topology, each network node is connected to every other node, and MPLS can easily handle the high volume of traffic and complex routing required in this type of setup. Additionally, MPLS provides traffic engineering capabilities, allowing for better control and optimization of network resources.
4.
QUESTION NO: 54
A network administrator is configuring a network with a dynamic routing protocol. Which of the following would support equal cost load balancing and have all routers contain the same topology view?
Correct Answer
A. OSPF
Explanation
OSPF (Open Shortest Path First) is a dynamic routing protocol that supports equal cost load balancing and ensures that all routers in the network have the same topology view. OSPF calculates the shortest path to a destination using a metric called cost, and if there are multiple paths with the same cost, it can distribute the traffic evenly across those paths. This allows for efficient utilization of network resources and improves overall network performance. IGRP, RIP, and BGP do not support equal cost load balancing or guarantee the same topology view on all routers.
5.
QUESTION NO: 55
Which of the following is the maximum amount of wires that fit into a RJ-l1 connector?
Correct Answer
C. 4
Explanation
The maximum amount of wires that fit into a RJ-11 connector is 4. This type of connector is commonly used for telephone connections and has 4 pins or contacts that correspond to the 4 wires inside the cable. Each wire is responsible for carrying a specific signal or electrical current, allowing for communication between devices. Therefore, the correct answer is 4.
6.
QUESTION NO: 56
Which of the following components in a structured wiring system supports an Ethernet network?
Correct Answer
A. 110 block
Explanation
The 110 block is a component in a structured wiring system that supports an Ethernet network. It is a type of punch-down block used to connect and terminate network cables. The 110 block provides a reliable and organized way to distribute Ethernet connections throughout a building or network infrastructure. It allows for easy installation and maintenance of Ethernet connections, making it a crucial component in a structured wiring system for supporting an Ethernet network.
7.
QUESTION NO: 57
Which of the following is the maximum CAT3 length acceptable for a horizontal cross-connect?
Correct Answer
A. 100 meters (328 feet)
Explanation
The maximum CAT3 length acceptable for a horizontal cross-connect is 100 meters (328 feet). This is the maximum distance that can be achieved without experiencing significant signal loss or degradation.
8.
QUESTION NO: 58
A technician has gathered information on a network issue, and has determined the affected area. Which of the following would be the NEXT step in resolving tills issue?
Correct Answer
B. The technician should check to see if there have been any recent changes to this area of the network.
Explanation
The next step in resolving the network issue would be for the technician to check if there have been any recent changes to the affected area of the network. This is important because recent changes could potentially be the cause of the issue. By identifying any recent changes, the technician can narrow down the possible causes and focus on finding a solution that addresses those specific changes. This step helps in troubleshooting and resolving the issue effectively.
9.
QUESTION NO: 59*
A company's web selver is located in a climate controlled enviromllent, with multiple power supplies, and a UPS to provide the maximum uptime available. Which of the following would allow the company the BEST opportunity to increase network uptime for the web selver?
Correct Answer
D. Install additional NICs
Explanation
Installing additional NICs would provide the company with the best opportunity to increase network uptime for the web server. By adding more network interface cards, the company can distribute the network traffic across multiple cards, reducing the load on each card and improving overall network performance and reliability. This would help to ensure that the web server remains accessible and operational, even during high traffic periods or in the event of a failure on one of the NICs.
10.
QUESTION NO: 60*
Which of the following devices will segment a network and help cut down on network congestion?
Correct Answer
A. Switch
Explanation
A switch is a device that operates at the data link layer of the OSI model and is used to connect multiple devices on a network. Unlike a hub, a switch can segment a network by creating separate collision domains for each connected device. This segmentation helps to reduce network congestion by preventing unnecessary traffic from being transmitted to all devices on the network. Therefore, a switch is the correct answer as it can effectively cut down on network congestion.
11.
QUESTION NO: 61
Which of the following protocols is used in a ping command?
Correct Answer
B. ICMP
Explanation
ICMP (Internet Control Message Protocol) is used in a ping command. Ping is a network diagnostic tool used to test the reachability of a host on an IP network. It sends ICMP Echo Request messages to the destination host and waits for ICMP Echo Reply messages to be returned. ICMP is responsible for reporting errors and providing feedback about network problems, making it the appropriate protocol for the ping command.
12.
QUESTION NO: 62
Which of the following would allow for encrypted login credentials to be sent over the network?
Correct Answer
C. SSH
Explanation
SSH (Secure Shell) is a network protocol that provides a secure way to access and manage remote devices over an unsecured network. It encrypts login credentials and other data transmitted between the client and the server, ensuring that sensitive information cannot be intercepted or accessed by unauthorized individuals. Telnet, FTP, and HTTP, on the other hand, do not provide encryption for login credentials, making them less secure options for transmitting sensitive information over a network.
13.
QUESTION NO: 63*
Which of the following is the maximum hop count for RIPv2?
Correct Answer
C. 16
Explanation
The maximum hop count for RIPv2 is 16. This means that a RIP packet can only be forwarded through a maximum of 16 routers before it is considered unreachable. Beyond this hop count, the packet is dropped. This hop count limit helps prevent routing loops and ensures efficient routing within a network.
14.
QUESTION NO: 64
Which of the following is used to simplify the process of setting up a network and the administration of the network?
Correct Answer
A. ZEROCONF
Explanation
ZEROCONF, which stands for Zero Configuration Networking, is used to simplify the process of setting up a network and the administration of the network. It allows devices to automatically configure themselves and connect to a network without the need for manual configuration or the use of additional protocols. With ZEROCONF, devices can obtain IP addresses, discover services, and establish connections with other devices on the network without any user intervention. This greatly simplifies the network setup process and reduces the administrative burden of managing a network.
15.
QUESTION NO: 65*
When terminating a CAT5e cable a technician terminates the 568A end and the 568B end. The resulting cable IS:
Correct Answer
C. A crossover cable.
Explanation
When terminating a CAT5e cable, the 568A and 568B standards are two different wiring schemes used for terminating the cable. The 568A standard uses a specific color code for each wire, while the 568B standard uses a different color code. When terminating one end of the cable using the 568A standard and the other end using the 568B standard, it creates a crossover cable. A crossover cable is used to connect two devices of the same type, such as two computers, without the need for a switch or hub.
16.
QUESTION NO: 66
Which of the following is the maximum CAT5 length acceptable for a horizontal cross-connect?
Correct Answer
D. 328 feet (100 meters)
Explanation
The maximum CAT5 length acceptable for a horizontal cross-connect is 328 feet (100 meters). This is because CAT5 cables are designed to transmit data reliably up to a maximum distance of 100 meters. Beyond this distance, signal degradation and loss may occur, leading to poor network performance. Therefore, it is important to adhere to this maximum length to ensure optimal network connectivity and data transmission.
17.
QUESTION NO: 67*
Some users are unable to access the network. A teclmician determines that the computers that were unable to access the network have an IP address of 169.254.0.1. Which of the following network services should the technician check?
Correct Answer
D. DHCP
Explanation
The technician should check the DHCP (Dynamic Host Configuration Protocol) service. The IP address 169.254.0.1 is an Automatic Private IP Address (APIPA) that is assigned when a device is unable to obtain an IP address from a DHCP server. This suggests that the computers are not receiving the necessary network configuration information from the DHCP server, so checking the DHCP service would be the appropriate step to resolve the issue.
18.
QUESTION NO: 68
A technician is troubleshooting a workstation that is connected to a star network. The technician determines that the workstation is unable to connect to the network resources. Which of the following should be checked FIRST?
Correct Answer
B. The link lights on the network card
Explanation
The link lights on the network card should be checked first because they indicate whether the workstation is physically connected to the network. If the link lights are not lit, it could indicate a loose or disconnected cable, a faulty network card, or a problem with the network port on the switch. Checking the link lights helps to identify any physical connectivity issues before troubleshooting other potential causes such as network drivers or server network card.
19.
QUESTION NO: 69*
An administrator is in charge of several remote servers in Japan. Users call and report they cannot connect to the company's resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?
Correct Answer
B. Ping
Explanation
The correct answer is "ping". The ping command is used to test the connectivity between two devices over a network. By sending a ping request to the remote servers in Japan, the administrator can verify if the servers are running and if they are reachable from the users' locations. If the ping request is successful, it means that the servers are up and running.
20.
QUESTION NO: 70
Which of the following does an administrator need to be aware of when installing a wireless network in a building with multiple floors?
Correct Answer
C. Channel overlap
Explanation
When installing a wireless network in a building with multiple floors, an administrator needs to be aware of channel overlap. Channel overlap refers to the interference that occurs when multiple wireless networks in close proximity use the same or overlapping channels. This can result in decreased performance and slower network speeds. To avoid channel overlap, the administrator should carefully select and configure the channels for each wireless network in the building, ensuring that they do not overlap with each other.
21.
QUESTION NO: 71
A network technician is contacted about a system that is unable to connect to a file server. After investigating the problem thoroughly the technician is able to successfully test and resolve the issue. Which of the following is the NEXT step the technician should take?
Correct Answer
A. Document the solution.
Explanation
After successfully resolving the issue, the next step the technician should take is to document the solution. This is important for future reference and troubleshooting purposes. By documenting the solution, the technician can create a record of the problem and its resolution, which can be helpful if the issue reoccurs or if another technician needs to troubleshoot a similar problem in the future. Additionally, documenting the solution can also help in identifying any patterns or trends in network issues, allowing for proactive measures to be taken to prevent similar problems from happening again.
22.
QUESTION NO: 72*
Which of the following is implemented on multiple switches to allow altemate paths?
Correct Answer
A. Spanning tree
Explanation
Spanning tree protocol is implemented on multiple switches to allow alternate paths. It is used to prevent loops in a network by creating a logical tree structure. Spanning tree protocol determines the most efficient path for data transmission and blocks redundant paths to avoid network congestion and broadcast storms. By allowing alternate paths, spanning tree protocol ensures network resilience and redundancy, enabling continuous network connectivity even if one path fails.
23.
QUESTION NO: 73*
A small office home office (*SOHO)wireless user reports their new laptop is 802.11 band 802.11g capable but will not wirelessly connect faster than 11Mbps. Which of the following is the cause of the problem?
Correct Answer
C. The wireless router is 802.11b only
Explanation
The correct answer is that the wireless router is 802.11b only. This means that the router is only capable of supporting the slower 802.11b wireless standard, which has a maximum speed of 11Mbps. Since the laptop is 802.11g capable, which has a maximum speed of 54Mbps, it is not able to connect at its full potential because the router is limiting the speed.
24.
QUESTION NO: 74
An automated application capable of infecting computers without user interaction would be described as which of the following?
Correct Answer
D. A worm
Explanation
A worm is a type of malware that can self-replicate and spread across computer networks without any user interaction. Unlike viruses, worms do not need to attach themselves to a host file or program in order to spread. They can exploit vulnerabilities in operating systems or network protocols to infect computers and propagate themselves. Therefore, an automated application capable of infecting computers without user interaction would be described as a worm.
25.
QUESTION NO: 75*
Which of the following is a valid IP address in the public addressing scheme?
Correct Answer
C. 168.192.10.1
Explanation
The IP address 168.192.10.1 is a valid IP address in the public addressing scheme. It follows the standard format of four numbers separated by periods, with each number ranging from 0 to 255. This IP address falls within the range of valid public IP addresses and can be used to identify a device on a public network.
26.
QUESTION NO: 76*
A system administrator is troubleshooting an application that is terminating frequently. Which of the following utilities can be used to determine the problem?
Correct Answer
D. Application log
Explanation
The application log is the correct answer because it is a utility that records events and errors that occur within an application. By reviewing the application log, the system administrator can identify any patterns or specific errors that may be causing the application to terminate frequently. This log can provide valuable information for troubleshooting and resolving the issue.
27.
QUESTION NO: 77
While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table:
PrefixNext-Hop IPlnterface 192.168.1.0 /24172.16.31.1
Ethernet0 192.168.2.0 /24172.16.31.1
Ethernet0 172.16.31.0 /24
Directly Connected
Ethernet0 0.0.0.0/0172.16.31.2Ethernet0
Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4?
Correct Answer
C. The packet will be forwarded to 172.16.31.2
Explanation
The given IP routing table shows that there is no specific route for the destination network 192.168.3.0/24. However, there is a default route (0.0.0.0/0) pointing to the next-hop IP address 172.16.31.2. Therefore, if a packet from 192.168.1.4 is sent to 192.168.3.4, it will be forwarded to the default route and reach the destination through the next-hop IP address 172.16.31.2.
28.
QUESTION NO: 78*
Which of the following wireless standards allows for increased bandwidth by allowing channel bonding?
Correct Answer
D. 802.11n
Explanation
802.11n is the correct answer because it allows for increased bandwidth by allowing channel bonding. Channel bonding is a technique where multiple channels are combined to increase the overall bandwidth. This allows for faster data transfer rates and improved performance in wireless networks. In contrast, 802.11g, 802.11a, and 802.11b do not support channel bonding and therefore do not provide the same level of increased bandwidth as 802.11n.
29.
QUESTION NO: 79
If static addressing is not configured and the DHCP server for a network is unavailable, which of the following will a PC use to configme its IP address?
Correct Answer
A. APIPA
Explanation
If static addressing is not configured and the DHCP server for a network is unavailable, a PC will use APIPA (Automatic Private IP Addressing) to configure its IP address. APIPA allows a device to automatically assign itself a unique IP address within the range of 169.254.0.1 to 169.254.255.254 when it cannot obtain an IP address from a DHCP server. This allows the device to still have network connectivity and communicate with other devices on the same network segment.
30.
QUESTION NO: 80
A technician is creating a crossover cable to connect two devices. Which of the following pins would be different between connector A and connector B?
Correct Answer
D. Pin1 , Pin2, Pin3, Pin6
Explanation
The correct answer is Pin1, Pin2, Pin3, Pin6. In a crossover cable, the pins that are different between connector A and connector B are the transmit data (TX) and receive data (RX) pins. In connector A, Pin1 is TX, Pin2 is RX, Pin3 is not used, and Pin6 is not used. In connector B, Pin1 is RX, Pin2 is TX, Pin3 is not used, and Pin6 is not used. This configuration allows for the devices to transmit and receive data correctly when connected to each other.
31.
QUESTION NO: 81
A network technician is troubleshooting a network issue that has just been reported. Which of the following troubleshooting steps should the technician take FIRST to help resolve this issue?
Correct Answer
C. Ask the user who reported the issue to explain the symptoms in detail.
Explanation
The first step in troubleshooting a network issue is to gather information about the problem. By asking the user who reported the issue to explain the symptoms in detail, the technician can gain a better understanding of the problem and potentially identify the cause. This information will be crucial in determining the appropriate steps to resolve the issue.
32.
QUESTION NO: 82 *
A user has been transferred from the accounting team to the human resources team. The user can only print to the accounting teams printer and cannot print to the human resources teams printer. Which of the following is the cause of the problem?
Correct Answer
D. WrongVLAN
Explanation
The cause of the problem is that the user is on the wrong VLAN. VLANs are used to separate network traffic and restrict access to certain resources. In this case, the user's computer is still configured to be on the accounting team's VLAN, which is why they can only print to the accounting team's printer. To resolve the issue, the user's computer needs to be moved to the correct VLAN for the human resources team.
33.
QUESTION NO: 83
Which of the following protocols allows secure access to a VPN?
Correct Answer
D. PPTP
Explanation
PPTP (Point-to-Point Tunneling Protocol) allows secure access to a VPN (Virtual Private Network). It is a protocol that enables the creation of secure tunnels over the internet, providing encrypted communication between the client and the server. PPTP is widely used as it is easy to set up and provides a good level of security for most applications. It is supported by various operating systems and devices, making it a popular choice for VPN connections.
34.
QUESTION NO: 84*
Which of the following devices uses the IEEE 1394 standard?
Correct Answer
A. FireWire
Explanation
The correct answer is FireWire. FireWire is a high-speed serial bus interface that is used for connecting devices such as computers, digital cameras, and external hard drives. It is also known as IEEE 1394 or i.LINK. USB 2.0 is another type of interface, but it is not the same as FireWire. iSCSI is a network protocol used for storage area networks, and Parallel is a type of interface commonly used for connecting printers.
35.
QUESTION NO: 85*
Which of the following is the maximum segment distance ofa IOOBase-FX network?
Correct Answer
B. 2,000 meters (6,561 feet)
Explanation
The maximum segment distance of a 100Base-FX network is 2,000 meters (6,561 feet). This means that the network can span up to 2,000 meters without any signal loss or degradation. It is important to note that this distance refers to the maximum length of a single segment or cable in the network.
36.
QUESTION NO: 86
Which of the following devices is used to extend the signal strength on a network segment?
Correct Answer
A. Repeater
Explanation
A repeater is used to extend the signal strength on a network segment. It receives a weak signal, amplifies it, and then retransmits it, effectively extending the range of the network. A repeater is commonly used in situations where the distance between network devices is too large for the signal to reach without degradation. It is a simple device that operates at the physical layer of the network, boosting the signal to overcome attenuation and maintain signal integrity.
37.
QUESTION NO: 87
Which of the following remote access solutions allows the LEAST connection overhead?
Correct Answer
C. SSL VPN
Explanation
SSL VPN allows the least connection overhead compared to the other options listed. This is because SSL VPN uses the Secure Sockets Layer (SSL) protocol to establish a secure encrypted connection between the remote user and the network, without the need for additional protocols or encryption methods like L2TPVPN, IPSecVPN, or PPTP VPN. SSL VPNs are known for their simplicity and ease of use, making them a popular choice for remote access solutions.
38.
QUESTION NO: 88
A technician is at a small facility that has five computers connected to a central switch and accessing a single server for file and print sharing. One computer becomes unable to connect to the network, while the other four are still connecting properly. Which of the following could be causing the computer to not connect to the network?
Correct Answer
D. The NIC has failed.
Explanation
The most likely explanation for the computer's inability to connect to the network is that the NIC (Network Interface Card) has failed. The NIC is responsible for connecting the computer to the network, and if it is not functioning properly, the computer will not be able to establish a network connection. The fact that the other four computers are still connecting properly suggests that the issue is specific to the one computer, rather than a problem with the server or switch. Additionally, the question does not mention any need for OS updates, further supporting the likelihood of a failed NIC.
39.
QUESTION NO: 89
After increasing the interface MTU of a branch router to 1600 bytes, a network administrator is no longer able to send packets with a size of 1501 bytes. Which of the following is the cause?
Correct Answer
C. The router at the other end of the WAN link is configured with an MTU of 1500.
Explanation
The cause of the issue is that the router at the other end of the WAN link is configured with an MTU of 1500. This means that the maximum size of packets that can be transmitted over the link is limited to 1500 bytes. Therefore, when the interface MTU of the branch router is increased to 1600 bytes, it is no longer able to send packets with a size of 1501 bytes because they exceed the maximum allowed size set by the router at the other end of the link.
40.
QUESTION NO: 90
Users on the network can no longer access a custom application that uses TCP 8090 hosted on the DMZ. A technician has verified that the firewall is permitting the TCP port. Which of the following commands would verify the server is still accepting connections on TCP 8090?
Correct Answer
A. Netstat
Explanation
The netstat command is used to display active network connections and listening ports on a server. By running netstat, the technician can check if the server is still accepting connections on TCP port 8090. This will help determine if the issue lies with the server or elsewhere in the network.
41.
QUESTION NO: 91
Which of the following is commonly used to test fiber connectivity?
Correct Answer
A. OTDR
Explanation
OTDR (Optical Time Domain Reflectometer) is commonly used to test fiber connectivity. It is a device that sends a pulse of light into the fiber and measures the reflections and losses along the fiber. This allows technicians to identify any breaks, bends, or other issues in the fiber optic cable. OTDRs are specifically designed for testing and troubleshooting fiber optic networks, making them the most appropriate choice for testing fiber connectivity.
42.
QUESTION NO: 92*
Which of the following protocols transmits using UDP ports?
Correct Answer
D. TFTP
Explanation
TFTP (Trivial File Transfer Protocol) is the correct answer because it is a simple file transfer protocol that uses UDP (User Datagram Protocol) ports for transmission. UDP is a connectionless protocol that does not provide reliable delivery of data, making it suitable for applications like TFTP where speed is prioritized over reliability. RIPv2, HTTP, and HTTPS, on the other hand, use TCP (Transmission Control Protocol) ports for transmission, which provides reliable delivery of data.
43.
QUESTION NO: 93
Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?
Correct Answer
C. BGP
Explanation
BGP (Border Gateway Protocol) is the routing protocol that uses AS-Path as one of the methods to build the routing table. AS-Path is a path attribute in BGP that lists the autonomous systems (AS) through which a route has passed. By examining the AS-Path, BGP routers can determine the best path for routing traffic between autonomous systems. This allows BGP to make informed routing decisions and build an efficient routing table.
44.
QUESTION NO: 94*
A network technician wants a server to have fault tolerance. Which of the following would be the MOST cost effective solution?
Correct Answer
A. Install two NICs for teaming.
Explanation
Installing two NICs for teaming would be the most cost-effective solution for achieving fault tolerance. By teaming the NICs, the server can have redundancy and load balancing, ensuring that if one NIC fails, the other can take over seamlessly. This solution does not require additional hardware like switches, fiber NICs, or routers, which can be more expensive.
45.
QUESTION NO: 95
An employee is having issues accessing shared resources on a file server. Which of the following troubleshooting steps should the technician take FIRST?
Correct Answer
D. Identify the symptoms
Explanation
The technician should first identify the symptoms of the issue the employee is experiencing. By understanding the specific symptoms, such as error messages or specific files that cannot be accessed, the technician can narrow down the potential causes of the problem and determine the appropriate troubleshooting steps to take. This initial step is important in order to gather necessary information and avoid wasting time on unnecessary troubleshooting actions.
46.
QUESTION NO: 96
A user states that they have decreased signal strength on their wireless connection. They have been using the wireless network previously without problems and the network configuration has not been changed. Which of the following is MOST likely the cause of the degraded signal?
Correct Answer
D. Environmental factors
Explanation
Environmental factors are the most likely cause of the decreased signal strength. This could include physical obstructions such as walls or furniture blocking the signal, interference from other electronic devices, or distance from the wireless access point. Since the user states that the network configuration has not been changed and they have been using the network without problems before, it is unlikely that incorrect encryption, standards mismatch, or incorrect SSID are the cause.
47.
QUESTION NO: 97*
A user reports their wireless 802.IIg Intemet connection is intenllittently disrupted. Which of the following is the cause of the problem?
Correct Answer
B. Cordless pHone
Explanation
The cordless phone is the cause of the problem because it operates on the same frequency as the wireless 802.IIg Internet connection, causing interference and disruptions in the connection.
48.
QUESTION NO: 98*
Which of the following will list the destination MAC addresses?
Correct Answer
A. Arp
Explanation
The correct answer is "arp". The "arp" command in networking is used to display or modify the Address Resolution Protocol (ARP) cache. The ARP cache contains information about the mapping between IP addresses and MAC addresses. By using the "arp" command, one can view the destination MAC addresses associated with specific IP addresses. Therefore, "arp" is the correct choice to list the destination MAC addresses.
49.
QUESTION NO: 99
Which of the following cable types has the shortest maximum cable run length?
Correct Answer
D. CAT3
Explanation
CAT3 has the shortest maximum cable run length compared to the other cable types listed. CAT3 cables are typically used for telephone and data transmission over short distances, usually up to 100 meters. This is because CAT3 cables have a lower bandwidth capacity and higher signal loss compared to other cable types like single-mode fiber, coaxial, and plenum cables. Single-mode fiber, coaxial, and plenum cables can support longer cable run lengths, making them suitable for longer distance transmissions.
50.
QUESTION NO: 100*
Which of the following is the MOST common pin-out configuration used when crimping RJ-45 connectors?
Correct Answer
C. T568A/B
Explanation
The T568A/B pin-out configuration is the most common one used when crimping RJ-45 connectors. This configuration specifies the arrangement of the eight wires inside the connector, ensuring that the correct signals are transmitted between devices. It is widely used in Ethernet networks for both residential and commercial applications. The UTP and STP options are types of cabling, while IEEE 802.5 is a networking standard.