Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

CompTIA Network+ Practice Tests: Exam N10-008
CompTIA Network+ Practice Tests: Exam N10-008
CompTIA Network+ Practice Tests: Exam N10-008
Ebook1,066 pages17 hours

CompTIA Network+ Practice Tests: Exam N10-008

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Assess and improve your networking skillset with proven Sybex practice tests 

In the freshly revised Second Edition of CompTIA Network+ Practice Tests Exam N10-008, IT expert and author Craig Zacker delivers a set of accessible and useful practice tests for the updated Network+ Exam N10-008. You’ll prepare for the exam, learn the information you need in an industry interview, and get ready to excel in your first networking role. 

These practice tests will gauge your skills in deploying wired and wireless devices; understanding network documentation and the purpose of network services; work with datacenter, cloud, and virtual networking concepts; monitor network activity; and more. 

Further, this book offers: 

  • Comprehensive coverage of all five domain areas of the updated Network+ exam, including networking fundamentals, implementations, operations, security, and troubleshooting 
  • Practical and efficient preparation for the Network+ exam with hundreds of domain-by-domain questions 
  • Access to the Sybex interactive learning environment and online test bank 

Perfect for anyone preparing for the CompTIA Network+ Exam N10-008, the CompTIA Network+ Practice Tests Exam N10-008 is also an indispensable resource for network administrators seeking to enhance their skillset with new, foundational skills in a certification endorsed by industry leaders around the world. 

LanguageEnglish
PublisherWiley
Release dateSep 27, 2021
ISBN9781119807315
CompTIA Network+ Practice Tests: Exam N10-008
Author

Craig Zacker

Craig Zacker is an educator and editor who has written or contributed to dozens of books on operating systems, networking, and PC hardware. He is coauthor of the Microsoft Training Kit for Exam 70-686 and author of Windows Small Business Server 2011 Administrator's Pocket Consultant.

Read more from Craig Zacker

Related to CompTIA Network+ Practice Tests

Related ebooks

Certification Guides For You

View More

Related articles

Reviews for CompTIA Network+ Practice Tests

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    CompTIA Network+ Practice Tests - Craig Zacker

    CompTIA® Network+®

    Practice Tests

    Exam N10-008

    Second Edition

    Craig Zacker

    Wiley Logo

    Copyright © 2022 by John Wiley & Sons, Inc. All rights reserved.

    Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

    Published simultaneously in Canada.

    ISBN: 978-1-119-80730-8

    ISBN: 978-1-119-80732-2 (ebk.)

    ISBN: 978-1-119-80731-5 (ebk.)

    No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.

    Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware the Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read.

    For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

    Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

    Library of Congress Control Number: 2021945402

    TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Network+ are trademarks or registered trademarks of The Computing Technology Industry Association, Inc. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

    Cover Image: © Jeremy Woodhouse/Getty Images, Inc.

    Cover Design: Wiley

    About the Author

    Craig Zacker is the author or co-author of dozens of books, manuals, articles, and websites on computer and networking topics. He has also been an English professor, a technical and copy editor, a network administrator, a webmaster, a corporate trainer, a technical support engineer, a minicomputer operator, a literature and philosophy student, a library clerk, a photographic darkroom technician, a shipping clerk, and a newspaper boy.

    About the Technical Editor

    George Buzz Murphy, CISSP, SSCP, CASP, is a public speaker, corporate trainer, author, and cybersecurity evangelist who has instructed thousands of cybersecurity professionals around the world over the past 25 years with courses, seminars, and consulting presentations on a variety of technical and cybersecurity topics. A former Dell technology training executive, he has addressed audiences at Comdex, Networld, and the National Computer Conference as well as major corporations and educational institutions such as Princeton University. Buzz has earned more than 29 IT and cybersecurity certifications from such prestigious organizations as ISC², CompTIA, PMI, and Microsoft, and other industry certification organizations. He is an ISC² Authorized Instructor and recently served as technical editor for the ISC² CCFP - Certified Cyber Forensics Professional Certification Guide (McGraw-Hill, 2014). During the past year, he served as technical editor on five cybersecurity textbooks for both McGraw Hill Education as well as Sybex, an imprint of Wiley and Sons, which includes technical editor for the recent publication CASP+: CompTIA Advanced Security Practitioner Study Guide by Jeff T. Parker and Michael Gregg (Sybex, 2019).

    Having held a top-secret security clearance in both U.S. and NATO intelligence, he has trained network and cybersecurity operators for the U.S. Army, various U.S. government security agencies, and foreign military personnel across CONUS and EMEA, and has been involved with facilitating such course subjects as Critical Site Nuclear EMP Hardening, International Cryptographic Methodology, and Computer Forensic Sciences, as well as cybersecurity topics. Buzz can be reached at buzz@buzzmurphy.com.

    Introduction

    Welcome to CompTIA® Network+® Practice Tests: Exam N10-008. This book gives you a focused, timesaving way to review your networking knowledge and prepare to pass the Computing Technology Industry Association (CompTIA) Network+ exam. The book combines realistic exam prep questions with detailed answers and two complete practice tests to help you become familiar with the types of questions that you will encounter on the Network+ exam. By reviewing the objectives and sample questions, you can focus on the specific skills that you need to improve before taking the exam.

    How This Book Is Organized

    The first five chapters of this book are based on the five objective domains published by CompTIA for the N10-008 Network+ exam. There are approximately 200 questions for each objective domain, covering each of the suggested topics. The next two chapters each contain a 100-question practice test covering all of the objective domains. Once you have prepared for each of the objective domains individually, you can take the practice tests to see how you will perform on the actual exam.

    Objective Map

    The following table gives you the extent, by percentage, that each domain is represented on the actual examination, and where you can find questions in this book that are related to each objective.

    Who Should Read This Book

    CompTIA recommends, but does not require, that candidates for the Network+ exam meet the following prerequisites:

    CompTIA A+ certification or equivalent knowledge

    At least 9 to 12 months of work experience in IT networking

    CompTIA's certification program relies on exams that measure your ability to perform a specific job function or set of tasks. CompTIA develops the exams by analyzing the tasks performed by people who are currently working in the field. Therefore, the specific knowledge, skills, and abilities relating to the job are reflected in the certification exam.

    Because the certification exams are based on real-world tasks, you need to gain hands-on experience with the applicable technology in order to master the exam. In a sense, you might consider hands-on experience in an organizational environment to be a prerequisite for passing the Network+ exam. Many of the questions relate directly to specific network products or technologies, so use opportunities at your school or workplace to practice using the relevant tools. Candidates for the exam are also expected to have a basic understanding of enterprise technologies, including cloud and virtualization.

    How To Use This Book

    Although you can use this book in a number of ways, you might begin your studies by taking one of the practice exams as a pretest. After completing the exam, review your results for each Objective Domain and focus your studies first on the Objective Domains for which you received the lowest scores.

    As this book contains only practice questions and answers, the best method to prepare for the Network+ exam is to use this book along with a companion book that provides more extensive explanations for the elements covered in each objective domain. Todd Lammle's CompTIA® Network+® Study Guide: Exam N10-008 provides complete coverage of all the technology you need to know for the exam.

    After you have taken your pretest, you can use the chapters for the objective domains in which you need work to test your detailed knowledge and learn more about the technologies involved. By reviewing why the answers are correct or incorrect, you can determine if you need to study the objective topics more.

    What's Next

    The next step is to review the objective domains for the Network+ N10-008 exam and think about which topics you need to work on most. Then, you can turn to the appropriate chapter and get started. Good luck on the exam.

    Chapter 1

    Networking Fundamentals

    THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

    1.1 Compare and contrast the Open Systems Interconnection (OSI) model layers and encapsulation concepts.

    OSI model

    Layer 1 – Physical

    Layer 2 – Data link

    Layer 3 – Network

    Layer 4 – Transport

    Layer 5 – Session

    Layer 6 – Presentation

    Layer 7 – Application

    Data encapsulation and decapsulation within the OSI model context

    Ethernet header

    Internet Protocol (IP) header

    Transmission Control Protocol (TCP)/ User Datagram Protocol (UDP) headers

    TCP flags

    Payload

    Maximum transmission unit (MTU)

    1.2 Explain the characteristics of network topologies and network types.

    Mesh

    Star/hub-and-spoke

    Bus

    Ring

    Hybrid

    Network types and characteristics

    Peer-to-peer

    Client-server

    Local area network (LAN)

    Metropolitan area network (MAN)

    Wide area network (WAN)

    Wireless local area network (WLAN)

    Personal area network (PAN)

    Campus area network (CAN)

    Storage area network (SAN)

    Software-defined wide area network (SDWAN)

    Multiprotocol label switching (MPLS)

    Multipoint generic routing encapsulation (mGRE)

    Service-related entry point

    Demarcation point

    Smartjack

    Virtual network concepts

    vSwitch

    Virtual network interface card (vNIC)

    Network function virtualization (NFV)

    Hypervisor

    Provider links

    Satellite

    Digital subscriber line (DSL)

    Cable

    Leased line

    Metro-optical

    1.3 Summarize the types of cables and connectors and explain which is the appropriate type for a solution.

    Copper

    Twisted pair

    Cat 5

    Cat 5e

    Cat 6

    Cat 6a

    Cat 7

    Cat 8

    Coaxial/RG-6

    Twinaxial

    Termination standards

    TIA/EIA-568A

    TIA/EIA-568B

    Fiber

    Single-mode

    Multimode

    Connector types

    Local connector (LC), straight tip (ST), subscriber connector (SC), mechanical transfer (MT), registered jack (RJ)

    Angled physical contact (APC)

    Ultra-physical contact (UPC)

    RJ11

    RJ45

    F-type connector

    Transceivers/media converters

    Transceiver type

    Small form-factor pluggable (SFP)

    Enhanced form-factor pluggable (SFP+)

    Quad small form-factor pluggable (QSFP)

    Enhanced quad small form-factor pluggable (QSFP+)

    Cable management

    Patch panel/patch bay

    Fiber distribution panel

    Punchdown block

    66

    110

    Krone

    Bix

    Ethernet standards

    Copper

    10BASE-T

    100BASE-TX

    1000BASE-T

    10GBASE-T

    40GBASE-T

    Fiber

    100BASE-FX

    100BASE-SX

    1000BASE-SX

    1000BASE-LX

    10GBASE-SR

    10GBASE-LR

    Coarse wavelength division multiplexing (CWDM)

    Dense wavelength division multiplexing (DWDM)

    Bidirectional wavelength division multiplexing (WDM)

    1.4 Given a scenario, configure a subnet and use appropriate IP addressing schemes.

    Public vs. private

    RFC1918

    Network address translation (NAT)

    Port address translation (PAT)

    IPv4 vs. IPv6

    Automatic Private IP Addressing (APIPA)

    Extended unique identifier (EUI-64)

    Multicast

    Unicast

    Anycast

    Broadcast

    Link local

    Loopback

    Default gateway

    IPv4 subnetting

    Classless (variable-length subnet mask)

    Classful

    A

    B

    C

    D

    E

    Classless Inter-Domain Routing (CIDR) notation

    IPv6 concepts

    Tunneling

    Dual stack

    Shorthand notation

    Router advertisement

    Stateless address autoconfiguration (SLAAC)

    Virtual IP (VIP)

    Subinterfaces

    1.5 Explain common ports and protocols, their application, and encrypted alternatives.

    IP protocol types

    Internet Control Message Protocol (ICMP)

    TCP

    UDP

    Generic Routing Encapsulation (GRE)

    Internet Protocol Security (IPSec)

    Authentication Header (AH)/Encapsulating Security Payload (ESP)

    Connectionless vs. connection-oriented

    1.6 Explain the use and purpose of network services.

    DHCP

    Scope

    Exclusion ranges

    Reservation

    Dynamic assignment

    Static assignment

    Lease time

    Scope options

    Available leases

    DHCP relay

    IP helper/UDP forwarding

    DNS

    Record types

    Address (A)

    Canonical name (CNAME)

    Mail exchange (MX)

    Authentication, authorization, accounting, auditing (AAAA)

    Start of authority (SOA)

    Pointer (PTR)

    Text (TXT)

    Service (SRV)

    Name server (NS)

    Global hierarchy

    Root DNS servers

    Internal vs. external

    Zone transfers

    Authoritative name servers

    Time to live (TTL)

    DNS caching

    Reverse DNS/reverse lookup/forward lookup

    Recursive lookup/iterative lookup

    NTP

    Stratum

    Clients

    Servers

    1.7 Explain basic corporate and datacenter network architecture.

    Three-tiered

    Core

    Distribution/aggregation layer

    Access/edge

    Software-defined networking

    Application layer

    Control layer

    Infrastructure layer

    Management plane

    Spine and leaf

    Software-defined network

    Top-of-rack switching

    Backbone

    Traffic flows

    North-South

    East-West

    Branch office vs. on-premises datacenter vs. colocation

    Storage area networks

    Connection types

    Fibre Channel over Ethernet (FCoE)

    Fibre Channel

    Internet Small Computer Systems Interface (iSCSI)

    1.8 Summarize cloud concepts and connectivity options.

    Deployment models

    Public

    Private

    Hybrid

    Community

    Service models

    Software as a service (SaaS)

    Infrastructure as a service (IaaS)

    Platform as a service (PaaS)

    Desktop as a service (DaaS)

    Infrastructure as code

    Automation/orchestration

    Connectivity options

    Virtual private network (VPN)

    Private-direct connection to cloud provider

    Multitenancy

    Elasticity

    Scalability

    Security implications

    At which of the following layers of the Open Systems Interconnection (OSI) model do the protocols on a typical local area network (LAN) use media access control (MAC) addresses to identify other computers on the network?

    Physical

    Data link

    Network

    Transport

    Which of the following organizations developed the Open Systems Interconnection (OSI) model?

    International Telecommunication Union (ITU-T)

    Comité Consultatif International Télégraphique et Téléphonique (CCITT)

    American National Standards Institute (ANSI)

    Institute of Electrical and Electronics Engineers (IEEE)

    International Organization for Standardization (ISO)

    Which layer of the Open Systems Interconnection (OSI) model is responsible for the logical addressing of end systems and the routing of datagrams on a network?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    On a TCP/IP network, which layers of the Open Systems Interconnection (OSI) model contain protocols that are responsible for encapsulating the data generated by an application, creating the payload for a packet that will be transmitted over a network? (Choose all that apply.)

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    What layer of the Open Systems Interconnection (OSI) model is responsible for translating and formatting information?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Which of the following devices typically operates at the network layer of the Open Systems Interconnection (OSI) model?

    Proxy server

    Hub

    Network interface adapter

    Router

    Which layer of the Open Systems Interconnection (OSI) model provides an entrance point to the protocol stack for applications?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Which layer of the Open Systems Interconnection (OSI) model is responsible for dialogue control between two communicating end systems?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Some switches can perform functions associated with two layers of the Open Systems Interconnection (OSI) model. Which two of the following layers are often associated with network switching? (Choose all that apply.)

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    At which layer of the Open Systems Interconnection (OSI) model are there TCP/IP protocols than can provide either connectionless or connection-oriented services to applications?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Which of the following layers of the Open Systems Interconnection (OSI) model typically have dedicated physical hardware devices associated with them? (Choose all that apply.)

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    At which layer of the Open Systems Interconnection (OSI) model is there a protocol that adds both a header and footer to the information that is passed down from an upper layer, thus creating a frame?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Identify the layer of the Open Systems Interconnection (OSI) model that controls the addressing, transmission, and reception of Ethernet frames, and also identify the media access control method that Ethernet uses.

    Physical layer; Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    Physical layer; Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

    Data link layer; CSMA/CD

    Data link layer; CSMA/CA

    At which layer of the OSI model do you find the protocol responsible for the delivery of data to its ultimate destination on an internetwork?

    Data link

    Network

    Session

    Application

    Which of the following is not a protocol operating at the network layer of the OSI model?

    IP

    ICMP

    IGMP

    IMAP

    Ed is a software developer who has been given the task of creating an application that requires guaranteed delivery of information between end systems. At which layer of the Open Systems Interconnection (OSI) model does the protocol that provides the guaranteed delivery run, and what type of protocol must Ed use?

    Data link layer; connectionless

    Network layer; connection-oriented

    Transport layer; connection-oriented

    Application layer; connectionless

    Which of the following devices operates only at the physical layer of the Open Systems Interconnection (OSI) model?

    Hub

    Bridge

    Switch

    Router

    Alice is a network administrator designing a new Local Area Network (LAN). She needs to determine the type of cabling and the network topology to implement. Which layers of the Open Systems Interconnection (OSI) model apply to cabling and topology elements?

    Physical and data link layers

    Data link and network layers

    Network and transport layers

    Transport and application layers

    Which layers of the Open Systems Interconnection (OSI) model do not have protocols in the TCP/IP suite exclusively dedicated to them? (Choose all that apply.)

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    The protocols at which layer of the Open Systems Interconnection (OSI) model use port numbers to identify the applications that are the source and the destination of the data in the packets?

    Application

    Presentation

    Transport

    Network

    Which of the following is a correct listing of the Open Systems Interconnection (OSI) model layers, in order, from top to bottom?

    Physical, data link, transport, network, session presentation, application

    Application, session, presentation, transport, network, data link, physical

    Presentation, application, transport, session, network, physical, data link

    Session, application, presentation, transport, data link, network, physical

    Application, presentation, session, transport, network, data link, physical

    At which of the Open Systems Interconnection (OSI) model layers do switches and bridges perform their basic functions?

    Physical

    Data link

    Network

    Transport

    On a TCP/IP network, flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?

    Presentation

    Session

    Transport

    Network

    Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Which of the OSI model layers is responsible for syntax translation and compression or encryption?

    Data link

    Network

    Session

    Presentation

    Application

    Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?

    Physical

    Data link

    Network

    Transport

    Session

    Presentation

    Application

    Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.

    Network; connection-oriented

    Network; connectionless

    Transport; connection-oriented

    Transport; connectionless

    An Ethernet network interface adapter provides functions that span which two layers of the Open Systems Interconnection (OSI) model?

    Physical and data link

    Data link and network

    Network and transport

    Transport and application

    Which of the following protocols operate at the application layer of the Open Systems Interconnection (OSI) model? (Choose all that apply.)

    HTTP

    SNMP

    ICMP

    IGMP

    UDP

    Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?

    Application

    Presentation

    Session

    Physical

    Which of the following protocols operates at the network layer of the OSI model, but does not encapsulate data generated by an upper layer protocol for transmission over the network?

    IP

    UDP

    ARP

    ICMP

    TCP

    A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of the TCP flags raised in the Transmission Control Protocol (TCP) session establishment messages?

    SYN, ACK, SYN, ACK

    SYN, SYN, ACK, ACK

    SYN/ACK, SYN/ACK

    SYN, SYN/ACK, ACK

    Which of the following is the Maximum Transmission Unit (MTU) size for an Ethernet frame?

    512

    1024

    1500

    1518

    Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?

    SYN

    URG

    FIN

    END

    PSH

    An electrician installing a new light fixture accidentally severs one of the LAN cables running through the dropped ceiling space. With which topology would the severed cable cause the greatest amount of disturbance to the network?

    Bus

    Star

    Logical ring

    Mesh

    Which of the following statements about a wired Local Area Network (LAN) is true?

    Wired LANs support only the star topology.

    Wired LANs support only the star and bus topologies.

    Wired LANs support only the star and ring topologies.

    Wired LANs can support ring, bus, or star topologies.

    Which of the following is an example of a hybrid topology?

    A workstation with two network interface cards, one of which is connected to a star network and one to a bus network

    Four Ethernet switches connected using a bus topology

    Four workstations, each with a separate network connection to each of the other three

    Four Ethernet switches, each with a separate network connection to each of the other three

    Which type of network is typically confined to a small area, such as a single room, floor, or building?

    WAN

    LAN

    MAN

    CAN

    Which type of network connects Local Area Networks (LANs) in distant locations?

    WAN

    LAN

    MAN

    CAN

    Which of the following topologies requires the installation of terminating resistors at two locations?

    Bus

    Star

    Ring

    Mesh

    Which of the following topologies is used by the majority of new Ethernet networks installed today?

    Bus

    Virtual ring

    Mesh

    Hierarchical star

    Alice has constructed a five-node failover cluster in which all five servers are connected to a hard disk array using a dedicated Fibre Channel network. Which of the following terms describes this network arrangement?

    SAN

    PAN

    WAN

    MAN

    Which of the following is not a technology typically used for a personal area network (PAN)?

    Bluetooth

    Z-Wave

    NFC

    SDWAN

    Which of the following network topologies are used by Wireless Local Area Networks (WLANs)? (Choose all that apply.)

    Ad hoc

    Bus

    Infrastructure

    Star

    Which of the following cabling topologies was used by the first Ethernet networks?

    Bus

    Ring

    Star

    Mesh

    On an Ethernet network using the star topology, which of the following devices can function as the cabling nexus that forms the figurative center of the star? (Choose all that apply.)

    Hub

    Router

    Switch

    Access Point

    Which of the following cabling topologies provides the greatest number of redundant paths through the network?

    Star

    Ring

    Mesh

    Bus

    Which of the following Ethernet physical layer options does not use the star topology?

    10Base2

    10Base-T

    100Base-TX

    1000Base-T

    Which of the following network types are typically wireless? (Choose all that apply.)

    WAN

    PAN

    SAN

    WLAN

    Dense Wave Division Multiplexing (DWDM) is a signaling technology that has become a popular choice in the construction of which of the following types of provider links?

    Digital Subscriber Line (DSL)

    Metro-optical

    Satellite

    Cable

    Which of the following statements is true about the differences between a peer-to-peer network and a client-server network?

    Peer-to-peer networks are inherently less secure than client-server networks.

    Peer-to-peer networks are illegal, while client-server networks are legal.

    On peer-to-peer networks, every workstation is capable of authenticating users.

    On a peer-to-peer network, all workstations must share their resources.

    Why does DSL (Digital Subscriber Line) technology support faster data transmissions than a standard Public Switched Telephone Network (PSTN) modem connection?

    DSL uses a separate control circuit that provides clear channels for data.

    DSL does not perform Cyclic Redundancy Check (CRC) functions and therefore has less overhead.

    DSL performs only a single analog-to-digital conversion.

    DSL uses a higher frequency range.

    Which DSL (Digital Subscriber Line) technology can adjust its transmission speed based on line conditions?

    HDSL

    IDSL

    RADSL

    VDSL

    Which of the following Wide Area Network (WAN) technologies uses broadband signaling?

    Digital Subscriber Line (DSL)

    Synchronous Optical Network (SONET)

    Integrated Services Digital Network (ISDN)

    Cable television (CATV)

    Ed has been hired by a private company to connect two remote sites with a Wide Area Network (WAN). Each of these sites has more than 200 users, and they all need to constantly transfer files across the WAN. One of the sites has a customer database that is accessed by both sites at all hours of the day. Access to the database and other information is time sensitive and constant. The company estimates that their aggregate bandwidth needs to be approximately 40 Mbps. Management says that they need to guarantee access to this information and that money is not a factor in the WAN implementation. Which WAN technology should Ed recommend for this scenario?

    A standard modem-to-modem connection

    A T-3 dedicated leased line

    A cable television (CATV) connection

    An ADSL (Asymmetrical Digital Subscriber Line) connection

    Ralph is an employee of a company that offers the option to telecommute from home. As a telecommuting employee, he needs to connect to the company network to access client information, transfer files, and send email through a Virtual Private Network (VPN) connection. Ralph is investigating the different Wide Area Network (WAN) services available for the remote connection before he implements one. His home is over 30 years old; the existing telephone wiring was not run through conduit, and the wiring seems to be deteriorating. Ralph has cable television (CATV) service, and his home is also approximately 20,000 feet from the nearest telephone central office. He wants to implement the fastest remote connection service possible, but cost is a factor in the decision. Which WAN technology should Ralph implement?

    A dedicated leased line (fractional T-1)

    A standard modem-to-modem connection

    A DSL (Digital Subscriber Line) connection

    A broadband CATV connection

    Which of the following Wide Area Network (WAN) connection technologies uses analog signaling?

    Public Switched Telephone Network (PSTN)

    Cable television (CATV)

    Digital Subscriber Line (DSL)

    Synchronous Optical Network (SONET)

    If you want to allow both voice and data traffic to be transmitted across the same Digital Subscriber Line (DSL) connection, what type of device is required at the customer site?

    A signal terminator

    A Digital Subscriber Line Access Multiplexer (DSLAM)

    A coder/decoder (CODEC) device

    A splitter

    What are the two main factors that affect DSL (Digital Subscriber Line) transmission rates?

    Signal termination

    Distance to the nearest central office

    Line conditions

    Line reflection

    Which of the following best describes the function of a demarcation point or demarc?

    The vertical cross-connect that links horizontal networks together

    The place where an outside service enters the building

    A switch or hub that connects the computers in a particular work area together, forming a horizontal network

    The place in a telecommunications room where a patch panel is located

    Which of the following broadband WAN services provides equal amounts of upstream and downstream bandwidth?

    ADSL

    SDSL

    Satellite

    Cable

    Which of the following hardware components is typically found at the demarcation point of a leased line, such as a T-1 or T-3?

    Terminator

    Punchdown block

    110 block

    Smartjack

    CSU/DSU

    Which of the following remote access connection technologies can support the simultaneous transmission of voice and data traffic over the Public Switched Telephone Network (PSTN)? (Choose all that apply.)

    Dial-up modem connection

    Integrated Services Digital Network (ISDN)

    Digital Subscriber Line (DSL)

    Synchronous Optical Network (SONET)

    Cable television (CATV) network

    A company is moving their entire operation to a new building, and part of the plan is to increase the speed of their Internet access by installing a leased T-3 line to replace their existing broadband connection. The service provider they have selected sends a technician to install the leased line. Which of the following is the correct term for the location in the new building where the technician will terminate the T-3?

    Patch panel

    Switch

    Firewall

    Demarc

    A T-3 leased line connection runs at 44.736 megabits per second (Mbps). How many separate channels does a T-3 provide?

    24

    64

    128

    512

    672

    A T-3 leased line connection is the equivalent of how many T-1 connections?

    7

    14

    28

    112

    Which of the following is the U.S. standard for synchronous data transmissions that defines data rates designated by optical carrier levels, such as OC-3, OC-12, OC-48, and OC-192?

    SDH

    SONET

    ISDN

    DSL

    Which of the following is a wide area networking mechanism that assigns labels to packets and forwards them based on those labels, rather than addresses?

    Frame relay

    MPLS

    ATM

    PPPoE

    SDWAN

    Which two of the following constructs provide roughly the same function? (Choose two that apply.)

    SIP trunk

    CSU/DSU

    VoIP gateway

    Smartjack

    VPN concentrator

    Which of the following is the European equivalent of the Synchronous Optical Networking (SONET) standard in the United States?

    SDH

    OC-3

    E-3

    ATM

    Which of the following is the device that provides the interface between a Local Area Network (LAN) and a Wide Area Network (WAN)?

    QSFP

    CSU/DSU

    SIP trunk

    IDS/IPS

    Which of the following terms describes a leased line subscription that provides access to only part of a T-1?

    E-1

    B channel

    OC-1

    Fractional T-1

    Multiprotocol Label Switching (MPLS) is sometimes said to operate between two layers of the Open Systems Interconnection (OSI) model. Between which two layers is it usually said to function?

    Physical and data link

    Data link and network

    Network and transport

    Transport and Session

    Which of the following Wide Area Network (WAN) services provides the fastest transfer rate?

    T-1

    E-1

    T-3

    OC-1

    To which of the following Internet connection types does a specification called DOCSIS apply?

    Dial-up modem

    DSL

    Cable broadband

    ISDN

    Which of the following are types of circuits offered by frame relay services? (Choose all that apply.)

    SRV

    PVC

    SVC

    UPC

    Which of the following types of Wide Area Network (WAN) connections commonly use Point-to-Point Protocol over Ethernet (PPPoE)? (Choose all that apply.)

    Leased lines

    SONET

    Cable broadband

    Digital Subscriber Line (DSL)

    Which of the following devices often provides diagnostic testing capabilities at the demarcation point of a leased line Wide Area Network (WAN) service?

    SIP trunk

    Media converter

    Smartjack

    AAAA server

    Which of the following Wide Area Network (WAN) services typically uses a switched fabric that was called a cloud long before the term came into general use?

    ATM

    Fractional T-1

    SONET

    Frame relay

    Ralph has been contracted to consult for a company that wants to update its legacy Ethernet network to Gigabit Ethernet. On examining the site, he discovers that the network is still using coaxial-based Thin Ethernet. What change in network topology must occur to upgrade the existing network to Gigabit Ethernet using Unshielded Twisted Pair (UTP) cable?

    Bus to Ring

    Ring to Star

    Star to Bus

    Bus to Star

    Star to Ring

    Which of the following best describes the function of a vSwitch (or virtual switch)?

    A vSwitch is a software product that enables a computer with multiple network adapters to function as a switch.

    A vSwitch is a feature in layer 3 switches that enables VLANs on the same switch to communicate with each other.

    A vSwitch is a feature in layer 3 switches that enables VLANs on different switches to communicate with each other.

    A vSwitch enables virtual machines (VMs) running on the same hypervisor to communicate with each other internally.

    Which of the following statements best describes the difference between Type I and Type II virtualization?

    Type II virtualization requires the host computer to have a processor that supports hardware virtualization assistance; Type I virtualization does not.

    In Type I virtualization, the hypervisor runs directly on the physical computer hardware, whereas in Type II virtualization, a host operating system runs on the computer hardware and the hypervisor runs on top of the host OS.

    Type I virtualization supports up to 256 virtual machines, whereas Type II virtualization supports only 8.

    Type I virtualization requires a separate processor for each virtual machine, whereas in Type II virtualization, the VMs all share a single processor.

    On which of the following virtual networking components can you create VLANs?

    Virtual NIC

    Virtual switch

    Virtual router

    Virtual firewall

    On an unmanaged network, which of the following virtual networking components have media access control (MAC) addresses assigned to them?

    Virtual switches

    Virtual NICs

    Hypervisors

    Virtual firewalls

    Which of the following components is responsible for providing a virtualized hardware environment and running virtual machines?

    Hypervisor

    Virtual server

    vSwitch (virtual switch)

    VPN concentrator

    Which of the following is the proper term for a computer with a hypervisor on which you can create virtual machines and other virtual components?

    Guest

    NAS

    Host

    SAN

    In which of the following ways does a vSwitch (virtual switch) differ from a physical switch?

    Virtual switches have an unlimited number of ports, whereas physical switches have a specific number.

    Physical switches typically support the creation of VLANs, whereas virtual switches do not.

    Virtual switches cannot forward traffic to the host server running them, whereas physical switches can forward traffic to all connected computers.

    Physical switches always include layer 3 functionality, whereas virtual switches do not.

    In which of the following components can a virtual firewall be implemented?

    On a host operating system

    On a guest operating system

    In a dedicated virtual machine

    In a virtual switch

    All of the above

    Which of the following technologies can replace leased lines, such as T-1s, by multiplexing signals as packets switched through virtual circuits in a cloud?

    E-1s

    Frame relay

    ATM

    PPP

    Which of the following is not a protocol that uses tunneling to establish secured links between TCP/IP systems?

    L2TP

    IPsec

    MGRE

    NAT

    Which of the following is not one of the primary components of the Network Function Virtualization (NFV) framework?

    VNF

    NFV ISG

    NFVI

    NFV-MANO

    Which of the following best describes the function of the network medium?

    The network medium provides the physical connection between networked computers.

    The network medium provides the protocol used to transmit data between end systems.

    The network medium passes data packets between two routers.

    The network medium processes electrical or light signals and converts them to data.

    Which of the following signal types is carried by copper cable?

    Fiber optic

    Microwave

    Infrared

    Electrical

    Identify the organizations that developed the general cable type standards for voice and data communications that are currently in use and identify the document name.

    ANSI/TVA, document C568

    TWA/ANSI/EIA, document T530-A

    EIA/ANSI/TWA, document 802.2

    TDA/EIA/TIA, document 802.11

    ANSI/TIA/EIA, document T568b

    Which of the following cable types and connectors are used to attach a television set to a cable television (CATV) network?

    A fiber-optic cable and a Straight Tip (ST) connector

    A coaxial cable and a Bayonet-Neill-Concelman (BNC) connector

    A twisted pair cable and an RJ-45 connector

    A coaxial cable and an F-type connector

    An AUI cable and a vampire tap connector

    A twinaxial cable and a Bayonet-Neill-Concelman (BNC) connector

    Which of the following cable types is used for Thick Ethernet network segments?

    RG-8

    RG-58

    RJ-45

    RJ-11

    Which of the following cable types is used for Thin Ethernet network segments?

    RG-8

    RG-58

    RJ-45

    RJ-11

    Which of the following telecommunications components is all but obsolete and is found only in old, analog telephone installations?

    66 block

    110 block

    Patch panel

    Smartjack

    Which of the following is a common European alternative to the 110 punchdown block used in U.S. telecommunications installations?

    66 block

    mGRE

    Krone LSA-Plus

    BIX

    Which of the following coaxial cable types are still in general use? (Choose all that apply.)

    RG-6

    RG-8

    RG-58

    RG-59

    Which of the following statements about the differences between fiber-optic Angled Physical Contact (APC) and Ultra-Physical Contact (UPC) connectors are true? (Choose all that apply.)

    APCs should only be joined to other APCs.

    APCs generate more insertion loss that UPCs.

    UPCs generate more return loss than APCs.

    UPCs use a green connector boot or body.

    Which of the following is not a type of fiber-optic connector?

    SC

    MTRJ

    ST

    BNC

    Which of the following physical layer transceiver module standards is the oldest and therefore the most obsolete?

    SFP

    SFP+

    GBIC

    QSFP

    QSFP+

    Which of the following cable types is typically configured in a star topology, uses eight copper conductors arranged in four pairs, and uses RJ-45 connectors?

    RG-8

    Twisted pair

    RG-58

    Fiber optic

    Which of the following statements explains the purpose of the twists in twisted pair cabling?

    The twists prevent collisions.

    The twists completely eliminate crosstalk and electromagnetic interference (EMI) in adjacent wire pairs.

    The twists prevent crosstalk in adjacent wire pairs and limit the effects of EMI on the signals carried over the cable.

    The twists extend the bend radius allowance of the cable.

    Which of the following tools do cable installers use to add connectors such as RJ-45 and RJ-11 to twisted pair cabling?

    A crimper

    A splicer

    A pigtail

    A patch

    Which of the following combinations of attributes describes the cable used for a Thin Ethernet network?

    RJ-45, 50-ohm, 0.270-inch, coaxial cable with BNC connectors

    RG-59, 75-ohm, 0.242-inch, coaxial cable with F connectors

    RG-58, 50-ohm, 0.195-inch, coaxial cable with BNC connectors

    RG-8, 50-ohm, 0.405-inch, coaxial cable with N connectors

    RJ-6, 75-ohm, 0.242-inch, coaxial cable with BNC connectors

    Which of the following connector types are typically associated with Ethernet networks? (Choose all that apply.)

    F-type

    BNC

    RJ-45

    DB-9

    N-type

    Which of the following connector types was typically associated with a T-connector attached to the computer?

    RJ45

    MT-RJ

    8P8C

    BNC

    F

    Which of the following connector types are associated with fiber-optic cables? (Choose all that apply.)

    RJ11

    ST

    F

    LC

    MT-RJ

    Which of the following types of cable, when installed, sometimes employed a device called a vampire tap?

    Unshielded twisted pair

    Shielded twisted pair

    Multimode fiber optic

    Single-mode fiber optic

    Coaxial

    In an internal UTP cable installation, each horizontal cable run connects a wall plate in the work area to a centralized cabling nexus in a telecommunications room. Which of the following is the correct term for this cabling nexus?

    Telepole

    Demarc

    Backbone

    Patch panel

    Fiber distribution panel

    Which of the following statements about single-mode and multimode fiber-optic cables are true?

    Single-mode cables can span longer distances than multimode cables.

    Single-mode cables are more resistant to electromagnetic interference than multimode cables.

    Single-mode cables are more difficult to install than multimode cables.

    Single-mode cables have a much larger core diameter than multimode cables.

    Which of the following components are typically used only for telephone cable installations, and not for data networking? (Choose all that apply.)

    66 blocks

    110 blocks

    25 pair UTP cables

    100 pair UTP cables

    Which of the following statements about single-mode fiber-optic cable are true? (Choose all that apply.)

    Single-mode cables use an LED light source, whereas multimode cables use a laser.

    Single-mode cables can span longer distances than multimode cables.

    Single-mode cables have a smaller core filament than multimode cables.

    Single-mode cables have a smaller bend radius than multimode, making them easier to install.

    Single-mode fiber-optic cables require a ground, whereas multimode cables do not.

    Which of the following tools do cable installers use to connect bulk cable runs to wall plates and patch panels?

    A crimper

    A splicer

    A pigtail

    A punchdown block tool

    Ralph has been hired by a client to install cabling to connect two existing networks. The two networks are in different buildings approximately 1000 feet apart. The cable type must support Gigabit Ethernet data rates of 1000 megabits per second (Mbps) and provide a high level of resistance to electromagnetic interference (EMI). Your client wants the most economical cabling solution that meets their needs. Which of the following cable types best meets the needs of this client?

    Multimode fiber-optic cable

    Shielded Twisted Pair (STP) cable

    Unshielded Twisted Pair (UTP) cable

    Thin coaxial cable

    Single-mode fiber-optic cable

    Which of the following are connector types used with coaxial cables? (Choose all that apply.)

    BNC

    F-type

    N-type

    ST

    RJ-11

    Alice has been hired by a corporation to design the cabling for their network. The corporation just moved into two different floors of an older building: a retail space on the ground floor and an office space on the 43rd floor. The building has existing Category 5 (CAT5) Unshielded Twisted Pair (UTP) cable. Alice's client wants two separate Local Area Networks (LANs), one on each of the two floors, with a backbone network connecting them. They want a 1 gigabit-per-second (Gbps) data rate for each LAN but plan on migrating to 10 Gbps in the future. The two networks are approximately 200 meters apart. Which of the following solutions best meets the client's needs?

    Install Category 6 (CAT6) or Category 6a (CAT6a) UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use twisted pair cable for the backbone network.

    Use the existing CAT5 cabling for the LANs, since CAT5 runs at 1 Gbps. Use thick coaxial cable for the backbone network.

    Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use multimode fiber-optic cable for the backbone network.

    Install CAT6 or CAT6a UTP cable for the LANs. These cables run at 1 Gbps and provide a migration path to 10 Gbps. Use the existing CAT5 cable for the backbone network.

    A maintenance worker, while replacing a light fixture in an office building, accidentally severs a network cable in the drop ceiling. The tenants use a variety of Local Area Network (LAN) technologies throughout the structure, but on that particular floor, there are three separate LANs: a 10-node Thin Ethernet LAN using coaxial cable in a bus topology, a 25-node Gigabit Ethernet LAN using twisted pair cable in a star topology, and a 5-node Fiber Distributed Data Interface (FDDI) LAN using multimode fiber-optic cable in a double ring topology. Without knowing which of the LANs the severed cable belongs to, what is the maximum number of computers that could be directly affected by the cable break?

    0

    1

    5

    10

    25

    40

    In the punchdown process for Unshielded Twisted Pair (UTP) cable, which of the following is the last step that you perform when connecting bulk cables to jacks in wall plates and patch panels?

    Cut off the excess wire that protrudes past the contacts.

    Press the bare wire down between the two metal contacts that hold it in place.

    Strip some of the insulating sheath off the cable end to expose the wires.

    Insert the wires into the appropriate contacts in the jack.

    Strip a small amount of insulation off each wire.

    Separate the twisted wire pairs at the ends.

    Which of the following cable connector types is not used with fiber-optic cable?

    Straight Tip (ST)

    Subscriber Connector (SC)

    Mechanical Transfer–Registered Jack (MT-RJ)

    F-type

    Fiber Local Connector (LC)

    Which of the following twisted pair cable types can you use to construct a 10GBase-T network with 100-meter segments? (Choose all that apply.)

    CAT5

    CAT5e

    CAT6

    CAT6a

    CAT7

    CAT8

    Which of the following cable connector types have been rendered nearly obsolete by Universal Serial Bus (USB) connections? (Choose all that apply.)

    BNC

    RJ-11

    DB-9

    DB-25

    Which of the following twisted pair cable types is rated for both a 10-megabit-per-second (Mbps) data rate (using two pairs) and a 100 Mbps data rate (using four pairs)?

    Category 3 (CAT3)

    Category 5 (CAT5)

    Category 5e (CAT5e)

    Category 6 (CAT6)

    Ed has been hired to install network cabling for a small private company with 15 employees who need to share files and printers. All of the employees are physically located within the same building in two separate office spaces directly adjacent to each other, sharing a common wall and door for access. Both offices have drop ceilings. The client wants a simple Gigabit Ethernet installation that is easy to troubleshoot. In addition, Ed's client wants to keep installation costs to a minimum. Which of the following combinations of topology, cable type, and installation method would best meet the needs of Ed's client?

    Star topology, fiber-optic cabling, and internal installation

    Bus topology, coaxial cabling, and external installation

    Bus topology, twisted pair cabling, and internal installation

    Star topology, coaxial cabling, and external installation

    Star topology, twisted pair cabling, and external installation

    Which of the following cable types are typically used in newly constructed Local Area Network (LAN) installations? (Choose all that apply.)

    Single-mode fiber optic

    Multimode fiber optic

    Coaxial

    Unshielded twisted pair

    Which of the following statements are true about coaxial cable? (Choose all that apply.)

    Coaxial cable has three conductors within the same sheath.

    Coaxial cable has two conductors within the same sheath.

    Coaxial cable has a copper core that carries light pulse signals.

    Coaxial cable has a copper core that carries electrical signals.

    Coaxial cable has an insulating outer sheath made of braided strands.

    Coaxial cable has an insulating sheath made of either PVC or Teflon.

    Which of the following twisted pair cable types are rated for 1000 megabit-per-second (Mbps) Gigabit Ethernet using two wire pairs? (Choose all that apply.)

    Category 3 (CAT3)

    Category 5 (CAT5)

    Category 5e (CAT5e)

    Category 6 (CAT6)

    Category 6a (CAT6a)

    None of the above

    Which of the following twisted pair cable types support both 10-megabit-per-second (Mbps) and 100 Mbps data rates, using only two pairs? (Choose all that apply.)

    Category 3 (CAT3)

    Category 5 (CAT5)

    Category 5e (CAT5e)

    Category 6 (CAT6)

    Which of the following statements about fiber-optic cabling are true? (Choose all that apply.)

    There are two main fiber-optic cable types: single-mode and multimode.

    Fiber-optic cable is typically used to span long distances.

    Fiber-optic cables use IBM Data Connector (IDC) connectors.

    Fiber-optic cables often use Straight Tip (ST) and Subscriber Connector (SC) connectors.

    Single-mode fiber-optic cable uses a laser light source and a glass core.

    Multimode fiber-optic cable uses a Light-Emitting Diode (LED) light source.

    Which of the following are characteristics of an internal cable installation? (Choose all that apply.)

    An internal cable installation uses bulk spools of cabling with no connectors attached for most cable runs.

    An internal cable installation uses only prefabricated cables with connectors attached for all cable runs.

    An internal cable installation uses solid wire conductors for all cable runs, regardless of distance.

    An internal cable installation uses stranded wire conductors for short cable runs and solid core for longer cable runs.

    In an internal cable installation, cables are typically not run through walls or ceilings.

    In an internal cable installation, cables are typically run through walls or ceilings.

    Which of the following Ethernet specifications calls for CAT8 UTP cable exclusively?

    10GBase-T

    40GBase-T

    100Base-TX

    1000Base-SX

    Ralph has been hired to connect three Local Area Networks (LANs) together with redundant paths that form a fault-tolerant backbone. The LANs reside on different floors in the same building and are approximately 600 meters apart. Each LAN is currently configured in a star topology using twisted pair cabling. Each LAN includes wall plates and rack-mounted patch panels and switches. Building and fire codes allow cables to run through existing risers, ceilings, and walls, but a 50,000-watt radio station occupies one of the floors between the LANs. Which topology, cable type, and installation method are best suited for this network?

    Star topology, fiber-optic cabling, and internal installation

    Star topology, coaxial cabling, and external installation

    Mesh topology, fiber-optic cabling, and external installation

    Bus topology, twisted pair cabling, and internal installation

    Mesh topology, fiber-optic cabling, and internal installation

    Star topology, twisted pair cabling, and external installation

    Alice is a network consultant who has been contracted to evaluate a network design created many years ago, to determine if the design is still viable. The network will support 20 workstations, scattered throughout the building, to run an inventory database application. The two most distant computers are 150 meters apart. The primary goal for the network design is to connect all 20 workstations to a single LAN running at 10 megabits per second (Mbps). The two secondary goals are to provide sufficient fault tolerance for a single cable break to occur without affecting the entire network and to provide resistance to the electromagnetic interference (EMI) generated by machinery in the building. The earlier design calls for a Thin Ethernet LAN with all of the computers connected to a single coaxial cable segment. Which of the following statements about the proposal is true?

    The solution achieves neither the primary goal nor either of the secondary goals.

    The solution achieves the primary goal but neither of the secondary goals.

    The solution achieves the primary goal and one of the secondary goals.

    The solution achieves the primary goal and both of the secondary goals.

    Ed is a network consultant who has been contracted to design the network for a new manufacturing plant. The plant consists of two buildings 150 meters apart: an office with 20 computers and a manufacturing facility that has 30 computers. The two most distant computers at the site are 225 meters apart. Ed's design calls for a Gigabit Ethernet network using fiber-optic cable. On receiving the proposal, the client asks Ed to justify the additional labor and expense of installing fiber-optic cable instead of Unshielded Twisted Pair (UTP). Which of the following is not a valid reason for choosing fiber optic over UTP for this project?

    The 225-meter distance between the two most distant computers exceeds Ethernet's maximum cable segment length for UTP.

    Only fiber-optic cable can keep the two buildings electrically isolated.

    Fiber-optic cable is completely resistant to any electromagnetic interference generated by the equipment in the manufacturing plant.

    Fiber-optic cable provides a greater degree of tolerance to cable breaks than UTP.

    In the 100Base-TX specification, which of the following are the functions of the Fast Link Pulse (FLP) signals exchanged by switches and network interface adapters? (Choose all that apply.)

    The FLP signals verify the integrity of the connection (or link) between the devices.

    The FLP signals enable the devices to negotiate the speed of the link between them.

    The FLP signals indicate when a collision has occurred.

    The devices use FLP signals to detect bad frames.

    Which of the following 10 Gigabit Ethernet specifications calls for the use of copper cable?

    10GBase-LR

    10GBase-CX4

    10GBase-ER

    10GBase-LX4

    10GBase-SR

    Alice is a network consultant who has been contracted to upgrade an existing Ethernet network to Gigabit Ethernet. The network consists of 20 workstations with integrated 10Base-T/100Base-TX/1000Base-T network interface adapters. The network cabling is Category 5 (CAT5) Unshielded Twisted Pair (UTP), installed when the building was constructed. All of the workstations are connected to a single 100Base-TX switch. Which of the following options would Alice find to be a valid upgrade path to Gigabit Ethernet?

    Replace the CAT5 cable with at least Category 5e (CAT5e) or Category 6 (CAT6), and leave the existing network interface adapters and switch in place.

    Install a 1000Base-T network interface card in each computer, and leave the existing cables and switch in place.

    Replace the CAT5 cable with at least CAT5e or CAT6, and replace the 100Base-T switch with a 1000Base-T switch.

    Replace the 100Base-TX switch with a 1000Base-T switch, and leave the existing cables and network interface adapters in place.

    Ralph is a network consultant with a client who wants him to design the Local Area Network (LAN) for his company's new branch office. The site consists of a building with Unshielded Twisted Pair (UTP) cable already installed, which the client considered a major selling point when selecting the property. He wants Ralph to install the fastest possible LAN using the existing cable. After examining the site, Ralph notes that the cable is Category 5 (CAT5), installed using a star topology, and that the individual cable runs are all less than 100 meters long. Which of the following Ethernet physical layer specifications can Ralph use for the new network to provide the fastest transmission speeds without replacing the cable?

    Enjoying the preview?
    Page 1 of 1