1.
What term refers to the source of data transmission over serial telecommunications links?
Correct Answer
C. Data Terminal Equipment (DTE)
Explanation
Data Terminal Equipment (DTE) refers to the source of data transmission over serial telecommunications links. DTE is the device that generates or consumes data and is responsible for initiating or terminating a communication session. It can be a computer, terminal, or any other device that communicates with another device over a serial connection. DTE devices are typically connected to Data Communications Equipment (DCE), which provides the physical interface and handles the actual transmission of data. UART (Universal Asynchronous Receiver/Transmitter) is a hardware component that facilitates serial communication between a computer and peripheral devices. Local Area Network (LAN) refers to a network that connects computers and devices within a limited area.
2.
The AppleTalk protocol uses what access control method?
Correct Answer
D. CSMA/CA
Explanation
The AppleTalk protocol uses the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) access control method. This method allows devices to sense the carrier (i.e., the medium) before transmitting data, and if the carrier is busy, they wait for a random period of time before attempting to transmit again. This helps to avoid collisions and ensures that data is transmitted reliably in a network using the AppleTalk protocol.
3.
What are the two sublayers of the data-link layer of the OSI model?
Correct Answer
C. MAC And LLC
Explanation
The correct answer is MAC and LLC. The data-link layer of the OSI model is responsible for transferring data between adjacent network nodes. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical medium and addressing of devices on the network. The Logical Link Control (LLC) sublayer is responsible for error control, flow control, and framing of data. Together, MAC and LLC work together to ensure reliable and efficient data transmission within a local area network.
4.
What TCP port number is usually assigned as the FTP "control port"?
Correct Answer
D. 21
Explanation
The correct answer is 21. This is because TCP port 21 is typically assigned as the FTP "control port". The control port is used for sending commands and receiving responses between the FTP client and server. It is responsible for establishing and managing the control connection during an FTP session.
5.
What flag is set in the first packet of a TCP three way handshake?
Correct Answer
C. SYN
Explanation
In the first packet of a TCP three-way handshake, the SYN flag is set. The three-way handshake is a process used to establish a connection between two devices over a TCP/IP network. During this process, the initiating device sends a packet with the SYN flag set to the receiving device. This packet serves as a request to synchronize sequence numbers and initiate the connection. The receiving device then responds with a packet that has both the SYN and ACK flags set, indicating that it acknowledges the request and is willing to synchronize.
6.
What Windows service provides NetBIOS name registration and resolution services?
Correct Answer
C. Windows Internet Name Services
Explanation
Windows Internet Name Services (WINS) is a Windows service that provides NetBIOS name registration and resolution services. NetBIOS is a networking protocol used by Windows systems to share resources and communicate with each other. WINS allows Windows systems to register their NetBIOS names and resolve the names of other systems on the network. It helps in translating NetBIOS names to IP addresses, enabling proper communication between Windows systems. Therefore, WINS is the correct answer for this question.
7.
What nonprofit corporation manages registration of IP addresses on the Internet in North America?
Correct Answer
A. ARIN
Explanation
ARIN (American Registry for Internet Numbers) is the correct answer because it is a nonprofit corporation that manages the registration of IP addresses in North America. ARIN allocates and assigns IP addresses to Internet service providers, organizations, and individuals in its region. It is responsible for ensuring the efficient and fair distribution of IP addresses and promoting the stable and secure operation of the Internet in North America.
8.
What type of DNS record is known as a "alias" record?
Correct Answer
C. CNAME
Explanation
A CNAME record, also known as an "alias" record, is a type of DNS record that is used to create an alias or nickname for another domain name. It allows multiple domain names to be associated with the same IP address, making it easier to manage and update DNS settings. This is useful when a website needs to be accessed using different domain names or subdomains.
9.
Signal degradation over a long cable run is called what?
Correct Answer
A. Attenuation
Explanation
Attenuation refers to the loss of signal strength or quality over a long cable run. As the signal travels through the cable, it gradually weakens due to factors such as resistance, interference, and noise. This can result in a decrease in signal amplitude and clarity, leading to degraded transmission quality. Attenuation is a common issue in long-distance communication systems and can be mitigated through the use of signal amplifiers or by using higher quality cables.
10.
What routing protocol allows Internet backbone routers to connect and share routes?
Correct Answer
D. Border Gateway Protocol
Explanation
Border Gateway Protocol (BGP) is the correct answer because it is the routing protocol used by internet backbone routers to connect and share routes. BGP is designed to exchange routing information between different autonomous systems (AS) on the internet. It allows routers in one AS to learn and advertise routes to routers in other ASs, making it essential for connecting and coordinating the routing across the internet backbone.
11.
BGP routing peers connect to each other via what TCP port number?
Correct Answer
C. 179
Explanation
BGP routing peers connect to each other via TCP port number 179. BGP (Border Gateway Protocol) is a routing protocol used to exchange routing information between different autonomous systems on the internet. TCP (Transmission Control Protocol) is a reliable transport protocol that ensures the delivery of data packets. By using port number 179, BGP peers establish a TCP connection to exchange routing updates and maintain a consistent view of the network topology.
12.
What communication method allows for transmission to all network peers simultaneously?
Correct Answer
D. Broadcast
Explanation
Broadcast is the correct answer because it is a communication method that allows for transmission to all network peers simultaneously. In a broadcast, a single message is sent to all devices on the network, regardless of their location or membership in any specific group. This is useful when information needs to be shared with all connected devices, such as network-wide announcements or updates.
13.
What network device restricts the expanse of a collision domain?
Correct Answer
A. Switch
Explanation
A switch is a network device that restricts the expanse of a collision domain. Unlike a hub, which broadcasts data to all connected devices, a switch creates individual collision domains for each port. This means that data sent from one device to another will only be received by the intended recipient, reducing the chances of collisions and improving network performance. A CSU/DSU is used for connecting to a digital communication line, and a modem is used for connecting to an analog communication line, neither of which restrict the collision domain like a switch does.
14.
Which of the following protocols is "connectionless"?
Correct Answer
A. UDP
Explanation
UDP (User Datagram Protocol) is a connectionless protocol because it does not establish a dedicated connection before sending data. It is a simple and lightweight protocol that operates at the transport layer of the Internet Protocol Suite. Unlike TCP, UDP does not guarantee the delivery or ordering of packets, making it faster but less reliable. UDP is commonly used for applications that require fast transmission of data, such as streaming media, online gaming, and DNS.
15.
Category 3 UTP cabling is rated for digital data transmission up to what speed?
Correct Answer
C. 10 Mbps
Explanation
Category 3 UTP cabling is rated for digital data transmission up to 10 Mbps. This means that the maximum speed at which data can be transmitted through this type of cabling is 10 megabits per second.
16.
What was the Unix protocol for sending files between two Unix computers on a network?
Correct Answer
A. UUCP
Explanation
UUCP (Unix-to-Unix Copy) was a protocol used for sending files between two Unix computers on a network. It allowed users to transfer files and execute commands remotely. UUCP was widely used before the advent of the internet and provided a reliable and efficient method for file transfer. LDAP (Lightweight Directory Access Protocol), POP3 (Post Office Protocol version 3), and DNS (Domain Name System) are all different protocols used for other purposes and not specifically designed for file transfer between Unix computers.
17.
1000BaseCX networks use cabling made of what material?
Correct Answer
D. Copper
Explanation
1000BaseCX networks use cabling made of copper. Copper is commonly used in networking cables because it is a good conductor of electricity and allows for fast and reliable data transmission. Copper cables are also durable and can withstand the rigors of networking environments. Therefore, copper is the preferred material for cabling in 1000BaseCX networks.
18.
Which of the following authentication protocols passes credentials in clear-text?
Correct Answer
A. PAP
Explanation
PAP (Password Authentication Protocol) is the authentication protocol that passes credentials in clear-text. This means that the username and password are transmitted without any encryption, making it less secure compared to other protocols. This makes PAP vulnerable to eavesdropping and interception attacks, as the credentials can be easily captured and read by unauthorized individuals.
19.
In what type of Ethernet network is passive termination most often used?
Correct Answer
C. 10Base2
Explanation
Passive termination is most often used in 10Base2 Ethernet networks. 10Base2, also known as Thinnet, uses coaxial cables with BNC connectors. Passive termination refers to the use of a resistor at the end of the cable to prevent signal reflections. This type of termination is commonly used in 10Base2 networks to ensure proper signal transmission and prevent data loss or interference.
20.
Which of these is a common method of converting analog signals into digital?
Correct Answer
B. Pulse Code Modulation
Explanation
Pulse Code Modulation (PCM) is a common method of converting analog signals into digital. PCM involves sampling the analog signal at regular intervals and quantizing each sample into a discrete value. These discrete values are then represented as binary numbers, resulting in a digital representation of the original analog signal. PCM is widely used in telecommunications and audio applications for its ability to accurately reproduce analog signals in a digital format.