1.
Which cable company led in VoIP market share going into 2008?
Correct Answer
A. Comcast
Explanation
Comcast led in VoIP market share going into 2008.
2.
Which of these is likely to be part of a Unified Communication setup?
Correct Answer
B. Instant Messaging
Explanation
Instant Messaging is likely to be part of a Unified Communication setup because it allows real-time communication and collaboration between individuals or groups. It enables users to send text messages, share files, and even have audio or video calls, making it an essential tool for effective communication within an organization. Unlike photocopiers, interoffice envelopes, and overnight mail delivery, which are traditional means of communication, instant messaging aligns with the modern and efficient communication methods offered by Unified Communication systems.
3.
Which networking technology's name is derived from that of a 10th-century Danish king?
Correct Answer
C. Bluetooth
Explanation
Bluetooth technology is named after Harald Bluetooth, a 10th-century Danish king. He was known for his ability to unite warring factions, just as Bluetooth technology unites different devices by enabling them to communicate wirelessly. The name "Bluetooth" was chosen to symbolize the technology's ability to bring devices together and create connections.
4.
IDS products are used to record hack attempts; what does IDS stand for?
Correct Answer
C. Intrusion Detection System
Explanation
IDS stands for Intrusion Detection System. IDS products are used to record hack attempts. These systems monitor network traffic and identify any suspicious or unauthorized activity, such as attempts to breach security measures or access sensitive information. By detecting and recording these hack attempts, IDS helps in identifying and mitigating potential security threats to the network.
5.
In networking security, an ACL is what type of list?
Correct Answer
B. Access Control
Explanation
An ACL in networking security refers to an Access Control List. This list is used to define and enforce rules or permissions for network traffic. It determines which users or systems are allowed or denied access to network resources based on various criteria such as IP addresses, port numbers, or protocols. By using an ACL, network administrators can effectively control and manage the flow of traffic within a network, enhancing security and preventing unauthorized access.
6.
What type of attack is designed to render the targets unusable?
Correct Answer
D. Denial Of Service Attack
Explanation
A Denial of Service (DoS) attack is designed to render the targets unusable by overwhelming them with a flood of illegitimate requests or by exploiting vulnerabilities in the target's system. This attack aims to exhaust the target's resources such as bandwidth, processing power, or memory, causing the target to become unresponsive or crash. The goal of a DoS attack is to disrupt the normal functioning of a system or network, making it unavailable to its intended users.
7.
An IP address starting with 192.168 can be known to be what type of address?
Correct Answer
D. Private Network Address
Explanation
An IP address starting with 192.168 is known to be a private network address. Private network addresses are used within a local area network (LAN) and are not routable on the internet. They are commonly used by home networks, small businesses, and organizations to create their own private network for internal use. These addresses are reserved and cannot be assigned to devices on the public internet.
8.
A wireless network can be known by what four-letter identifier?
Correct Answer
C. SSID
Explanation
A wireless network can be identified by its SSID (Service Set Identifier). The SSID is a unique name assigned to a wireless network, allowing devices to connect to the correct network. It is typically a combination of letters, numbers, and symbols.
9.
In a VoIP setup, what is an ATA?
Correct Answer
B. Analog TelepHone Adaptor
Explanation
An ATA, in a VoIP setup, stands for Analog Telephone Adaptor. It is a device that allows analog telephones to connect to a digital network, such as the internet, to enable Voice over IP communication. The ATA converts the analog voice signals from the telephone into digital signals that can be transmitted over the IP network. It also converts the digital signals received from the IP network back into analog signals that can be understood by the telephone. This enables users to make and receive phone calls using their traditional analog telephones over the internet.
10.
What company's Unified Communication manager product used to be called "Call Manager"?
Correct Answer
D. Cisco's
Explanation
Cisco's Unified Communication manager product used to be called "Call Manager". Cisco is a well-known technology company that offers a wide range of networking and communication solutions. Their Unified Communication manager, previously known as "Call Manager", is a software-based call processing system that provides various features for IP telephony, video conferencing, voicemail, and more. This name change may have been done to better reflect the product's capabilities and the broader scope of communication services it offers.
11.
Which VoIP company was founded by Niklas Zennstrom and purchased by eBay?
Correct Answer
A. Skype
Explanation
Skype is the correct answer because it was indeed founded by Niklas Zennstrom and later purchased by eBay. Skype is a popular VoIP (Voice over Internet Protocol) company that allows users to make voice and video calls over the internet. It was founded in 2003 and acquired by eBay in 2005 for $2.6 billion. eBay later sold Skype to a group of investors in 2009.
12.
In Unified Communication, what system routes multiple message types to one inbox?
Correct Answer
A. Unified Messaging
Explanation
Unified Messaging is the correct answer because it refers to a system that combines different types of communication messages, such as voicemail, emails, and faxes, into a single inbox. This allows users to access and manage all their messages from one central location, improving efficiency and convenience. Port Forwarding, Voice Mail Routing, and Twitter are not relevant to the question and do not involve routing multiple message types to one inbox.
13.
The T-Mobile HTC G1 phone came with which free mobile OS from Google?
Correct Answer
A. Android
Explanation
The correct answer is Android. The T-Mobile HTC G1 phone came with the free mobile operating system developed by Google called Android.
14.
Which of these features is important specifically in corporate instant messaging?
Correct Answer
A. Auditability
Explanation
Auditability is an important feature specifically in corporate instant messaging. It allows companies to track and monitor the communication that takes place within the messaging platform. This feature ensures compliance with regulatory requirements, helps prevent misuse or unauthorized sharing of sensitive information, and provides a record for auditing purposes. It allows companies to maintain transparency and accountability in their communication channels, which is crucial in a corporate environment.
15.
Which VoIP-only provider was highest in market share going into 2008?
Correct Answer
C. Vonage
Explanation
Vonage was the highest VoIP-only provider in market share going into 2008. This means that Vonage had the largest percentage of the market compared to other VoIP-only providers such as Jaxtr, Skype, and Lingo. Vonage's popularity and customer base were likely factors contributing to its high market share at that time.