I Hate CBT's

View Original

A Modulator Demodulator Is Better Known As A

Question: A T1 consists of _____ telephone channels.
Answer: A T1 uses 24 telephone channels to send data.
==================================================
Question: The more accurate name for a cable modem is a ______.
Answer: A CMTS is the proper name for a cable modem.
==================================================
Question: A section of the radio spectrum that's been agreed upon to be used for certain communications is known as a _______.
Answer: Frequency Band

Different locales might have different frequency bands defined.
==================================================
Question: A traditional wireless network involving access points that all have wired connections is known as a(n) _______.
Answer: A WLAN is the term for a traditional wireless network.
==================================================
Question: WPA stands for _______.
Answer: WPA is an update to WEP that's much more secure.
==================================================
Question: A point-to-point virtual private network (VPN) utilizes this type of device at each point.
Answer: Firewalls are devices that can act as a VPN endpoint.
==================================================
Question: A wireless network does not benefit like a wired network does, when it comes to collision reduction. Which device reduces collisions on a wired network?
Answer: Switches remember which computers are on which physical interfaces, so traffic is only sent to the intended node.
==================================================
Question: Which technology is NOT a form of broadband?
Answer: ISDN is an older analog dial-up method that is faster than traditional dial-up.
==================================================
Question: Which connection technology uses what is known as a CMTS?
Answer: The Cable Modem Termination System (CMTS) connects lots of different cable connections to an ISPs core network.
==================================================
Question: An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device brought from home. What is put in place to stop such activity?
Answer: MAC filtering allows or disallows a device to connect to a network, based on a hardware address.
==================================================
Question: Cat5 and Cat6 cabling refer to which reference model layer?
Answer: Physical media, like cables, provide connectivity and are associated with the physical layer.
==================================================
Question: What two benefits are a result of configuring a wireless mesh network?
Answer: Range increases when access points are configured in a mesh where all points are connected to each other.

Performance increases when access points are configured in a mesh where all points are connected to each other.
==================================================
Question: A modulator/demodulator is better known as a _____
Answer: Modem stands for modulator/demodulator.
==================================================
Question: FTTP stands for _______
Answer: Fiber To The Premises

FTTP is a technology that uses fiber to bring an internet connection to a building or home.
==================================================
Question: The original and flawed wireless security protocol is known as _____
Answer: WEP is not very secure and has been mostly phased out.
==================================================
Question: WPA stands for _______
Answer: WPA is an update to WEP that's much more secure.
==================================================
Question: Devices that connect to the Internet are often categorized into silos. Which silo controls network traffic?
Answer: Switches and routers are two of many devices that control network connectivity and traffic.
==================================================
Question: Cable Internet access can be described with which feature?
Answer: Shared bandwidth means multiple users use the same connection. With cable Internet, many users (like in a city block) use the same line back to the ISP.
==================================================
Question: An 802.11 frame contains a number of fields. Which field describes the version of 802.11 that is being used?
Answer: The frame control field contains a number of subfields to describe the frame and processing. This includes the version of 802.11 being used.
==================================================
Question: Which form of Digital Subscriber Line (DSL) features differing upload and download speeds?
Answer: Asymmetric Digital Subscriber Line (ADSL) connections feature different speeds for outbound and incoming data.
==================================================
Question: Which Fiber implementation is often referred to as Fiber To The Premises (FTTP)?
Answer: Fiber To The Home (FTTH)

With FTTH, fiber is actually run to each individual residence in a neighborhood.

Fiber to the Building (FTTB)

FTTB is a setup where fiber technologies are used for data delivery to an individual building.
==================================================
Question: Cellular network towers are configured in such a way so that they avoid what type of problem?
Answer: Cell towers are similar to wireless access points. Configuration of a tower includes avoiding overlap issues.
==================================================
Question: Cat5 and Cat6 cabling refer to which reference model layer?
Answer: Physical media, like cables, provide connectivity and are associated with the physical layer.
==================================================
Question: The rate at which a dial-up connection can send data across a telephone wire is known as a _____ rate.
Answer: baud

A baud rate is equivalent to bits per second.
==================================================
Question: ONT stands for ______
Answer: Optical Network Terminator
==================================================
Question: WPA2 uses a key that's ____ bits long.
Answer: 256-bit keys are pretty difficult to break.
==================================================
Question: What connection type is known as "always on"?
Answer: Broadband is known as an "always on" technology. This is because a connection does not have to first be initiated.
==================================================
Question: Similar to Wireless networks, cellular networks use band configuration to avoid what problem?
Answer: Overlap

Cell towers are configured to use bands that don't overlap, just like WiFi uses different channels.
==================================================
Question: Which solution eliminates the need for dedicated high-speed WAN connections between sites?
Answer: A point-to-point VPN utilizes the Internet to create a more private high-speed link without the need for dedicated WAN technology.
==================================================
Question: Which technology is used as a demarcation point for fiber optics?
Answer: An optical network terminator is similar to a modem and acts as a demarc for a fiber optic line.
==================================================
Question: Which value once represented a very popular modem baud rate that was used with dial-up connections?
Answer: 14400

While not commonly used today, dial-up still exists. 14400 (14.4k) baud was a popular baud (speed) rate.
==================================================
Question: The more accurate name for a modem used for a DSL connection is a ______
Answer: A DSLAM is the proper name for a DSL modem.
==================================================
Question: Digital Subscriber Line (DSL) is the only Internet connection option available for a small office in the middle of nowhere. Which type will provide speeds above 1.544 megabits per second?
Answer: High Bit-rate Digital Subscriber Line (HDSL)

While not commonly used today, dial-up still exists. 14400 (14.4k) baud was a popular baud (speed) rate.
==================================================
Question: In which wireless configuration type do nodes communicate directly with each other, rather than with an access point?
Answer: Ad-hoc

In an ad-hoc network, all nodes communicate and transmit directly to each other.
==================================================
Question: What are two characteristics of a 5Ghz band wireless network?
Answer: Short range

Fast speeds

A wireless network that operates with a 5Ghz frequency has a much shorter range than that of a 2.4Ghz network.
==================================================
Question: Television broadcasts were originally delivered by using which technology?
Answer: Wireless
==================================================
Question: The more accurate name for a modem used for a DSL connection is a ______.
Answer: A DSLAM is the proper name for a DSL modem.
==================================================
Question: An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs troubleshooting?
Answer: A local loop is the portion of a network between a customer's demarcation point and the carrier or ISP facility.
==================================================
Question: Which configuration is considered to be a common way to increase security in a wireless network?
Answer: MAC filtering only allows certain devices to connect to a network.
==================================================
Question: Another name for cellular networking is ______ networking.
Answer: Mobile

Depending on where you're from, one term or the other may be more common.
==================================================
Question: Modems communicate data by using which method?
Answer: Audible wavelengths

Phone lines were developed to transmit sound. Modems transfer data through audible wavelengths.
==================================================
Question: When it comes to wireless channels, which channels never overlap?
Answer: 1

11

Some channels are close together and may cause an overlap. Channels 1, 6, and 11 are far enough apart to never overlap.
==================================================
Question: A T3 consists of _____ T1 lines.
Answer: 24
==================================================
Question: The first field in an 802.11 header is known as a ________.
Answer: The Frame Control Field specifies things like what version of 802.11 is in use.
==================================================
Question: Which wireless security standards uses a 128-bit key?
Answer: WiFi Protected Access (WPA)

WPA replaced WEP. It uses a 128-bit key making it harder to crack.
==================================================
Question: Which of the following is NOT a Wide Area Network (WAN) connection type?
Answer: Digital Subscriber Line (DSL)
==================================================
Question: Fiber optic cable from a service provider can be delivered directly to the end user. Which implementation delivers data to a cabinet for distribution?
Answer: FTTN

Fiber To The Neighborhood (FTTN) defines fiber technology used to deliver data to a single physical cabinet that serves a population.
==================================================
Question: How many simultaneous phone conversations can a T1 line carry?
Answer: 24

A T1 is a dedicated communication line that can carry both data and voice.
==================================================