SlideShare a Scribd company logo
1. exam2001
(Points: 2)
 1.   A(n) ____________ provides for a connection between two layers, for example,
 Layer 2 to Layer 3.




    a. protocol converter


    b. handshaking


    c. interface


    d. network architecture


    e. processor




 Save Answer


2. exam2002
(Points: 2)
The ___________ layer handles the routing and forwarding of the data.




    a. physical


    b. data link


    c. network


    d. transport


    e. session




 Save Answer


3. exam2003
(Points: 2)
 The __________ data coding method is implemented in Ethernet and Token Ring LANs.




    a. Manchester encoding


    b. protocol converter


    c. character code


    d. protocol interface


    e. none of the above
Save Answer


4. exam2004
(Points: 2)
 In 4B/5B encoding:




    a. every four-bit pattern is assigned a five-bit code.


    b. every eight-bit sequence is transmitted as ten bits.


    c. an encoded stream of bits will never contain more than three 0s in a row.


    d. synchronization leads to higher transfer rates.


    e. all of the above.




 Save Answer


5. exam2005
(Points: 2)
A drawback of Bipolar AMI is that:




    a. its bandwidth requirement is twice the baud rate.


    b. for 100 Mbps transmission, one needs a bandwidth of 200 MHz.


    c. both a and b.


    d. with a long string of zeros, it can lose self-synchronization.


    e. non-coded violations result in spoiled bits.




 Save Answer


6. exam2006
(Points: 2)
The most significant benefit that Passive Optical Network offers to end
         users is                     .




    a. vast increase in the amount of bandwidth


    b. guaranteed service


    c. synchronous access


    d. choice in service


    e. none of the above




 Save Answer


7. exam2007
(Points: 2)
Internet Service Providers (ISPs) use _____________ because it aggregates both digital
 ISDN BRI and analog modem dial-up connections with one link and phone number.




    a. Frame Relay


    b. SONET


    c. ATM


    d. ISDN PRI


    e. DSL




 Save Answer


8. exam2008
(Points: 2)
_____________ is exceptionally fitted to videoconferencing because channel bonding
 enables dynamic bandwidth allocation to support high transmission rates that video
 requires.




    a. Frame Relay


    b. SONET


    c. ATM


    d. ISDN


    e. DSL




 Save Answer


9. exam2009
(Points: 2)
The most important consideration when transporting voice and video over a data
         network is               .




    a. network efficiency


    b. security


    c. bandwidth


    d. quality of service


    e. all of the above




 Save Answer


10. exam2010
(Points: 2)
In ATM, the segmentation-and-reassembly process is basically a ________
 conversion.




    a. header-to-payload


    b. bit-to-byte


    c. transmission


    d. packet-to-cell


    e. network switching




 Save Answer


11. exam2011
(Points: 2)
The                program was initiated by the FCC to enable users to change
         service providers while retaining the same phone number.




       a. Local Number Portability


       b. Local Service Management System


       c. Location Routing Number


       d. Number Portability Administration Center




 Save Answer


12. exam2012
(Points: 2)
The objective of a(n)             SLA is to define and monitor a provider's service
        levels while the objective of a(n)                 SLA is to set and manage
 user or
        customer expectations.




    a. network, application


    b. utilization, application


    c. internal, external


    d. external, internal


    e. contract, service




 Save Answer


13. exam2013
(Points: 2)
The Securities Exchange Commission regulates that         must be treated like
      any other forms of written communication and meet compliance guidelines.




    a. voice mail


    b. e-mail


    c. Web-based services


    d. telemessaging


    e. none of the above




 Save Answer


14. exam2014
(Points: 2)
ensures authors the right to protect their work.




    a. Copyright


    b. Trademark


    c. Patent


    d. Intellectual property


    e. all of the above




 Save Answer


15. exam2015
(Points: 2)
When calculating “Cost of Outage,” (Hr + Pr) is __________ during Outage.




    a. Human and Personnel Costs


    b. Hardware and Personnel Costs


    c. Dollars Lost


    d. Probability of Human Cost


    e. Return on Human and Personnel Costs




 Save Answer


16. exam2016
(Points: 2)
When a server is dedicated to a single application, it is referred to as a   .




    a. specific server


    b. dedicated server


    c. peer-to-peer server


    d. specialized server


    e. any of the above




 Save Answer


17. exam2017
(Points: 2)
Access control, which is essentially a form of __________, is usually implemented in a
 single computer to control access to that computer.




           a. authorization


           b. encryption


           c. active monitoring


           d. intrusion detection


           e. passive monitoring




 Save Answer


18. exam2018
(Points: 2)
______________ uses mirroring, a fault tolerant technique that keeps a copy of the
       contents written to one drive on the other drive.




    a. RAID 0


    b. RAID 1


    c. RAID 2


    d. RAID 3


    e. RAID 4




 Save Answer


19. exam2019
(Points: 2)
Network utilization is defined as the ratio of _______ to _______ .




    a. total load, network capacity


    b. bit load, bit capacity


    c. transmitted frames, lost frames


    d. lost frames, transmitted frames


    e. network capacity, network load




 Save Answer


20. exam2020
(Points: 2)
In an ergonomically designed workstation, the operator’s feet, when seated,
 should rest                 on the floor or on a footrest.




    a. at an angle of 10 to 20 degrees


    b. lightly


    c. never


    d. flat


    e. none of the above




 Save Answer


21. exam2021
(Points: 2)
IPv6 is a _________ -bit address developed to extend source and destination
 addresses.




    a. 32


    b. 64


    c. 128


    d. 256


    e. 512




 Save Answer


22. exam2022
(Points: 2)
VPNs are encrypted tunnels through a ____________ network that forwards data
 over the shared media.




    a. public


    b. leased-line


    c. proprietary


    d. any of the above


    e. none of the above




 Save Answer


23. exam2023
(Points: 2)
The IP is a(n) ____________ protocol.




    a. connectionless


    b. unreliable


    c. best-effort


    d. all of the above


    e. none of the above




 Save Answer


24. exam2024
(Points: 2)
Applications such as FTP and SMTP use _________ and applications such as   RTP
 use                  .




    a. UDP, TCP


    b. UDP, IP


    c. IP, TCP


    d. TCP/UDP, TCP/UDP


    e. TCP, UDP




 Save Answer


25. exam2025
(Points: 2)
The purpose of new suffixes like .info and .aero is _____________.




   a. to make Internet addressing complicated for eavesdroppers


   b. to make Internet addressing more simple and websites easier to find


   c. to ensure that speculators are unable to grab the best names


   d. to ensure that trademark holders have competition


   e. all of the above




Save Answer

More Related Content

What's hot

CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
ijmnct_journal
 
Ebc7fc8ba9801f03982acec158fa751744ca copie
Ebc7fc8ba9801f03982acec158fa751744ca   copieEbc7fc8ba9801f03982acec158fa751744ca   copie
Ebc7fc8ba9801f03982acec158fa751744ca copie
Sourour Kanzari
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
ijfcstjournal
 
Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)
soe sumijan
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
Engr. Md. Jamal Uddin Rayhan
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
IJERA Editor
 
Cn (cs 604) objective question
Cn (cs 604) objective questionCn (cs 604) objective question
Cn (cs 604) objective question
Amit Ku Rathore
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services QuestionsDsunte Wilson
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
iosrjce
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
SURESHA V
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
researchinventy
 
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
CSCJournals
 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
TELKOMNIKA JOURNAL
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...
journalBEEI
 
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ijma
 

What's hot (17)

CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
 
Ebc7fc8ba9801f03982acec158fa751744ca copie
Ebc7fc8ba9801f03982acec158fa751744ca   copieEbc7fc8ba9801f03982acec158fa751744ca   copie
Ebc7fc8ba9801f03982acec158fa751744ca copie
 
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORMDIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
DIGITAL WATERMARKING TECHNIQUE BASED ON MULTI-RESOLUTION CURVELET TRANSFORM
 
Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)Chapter 3 slides (Distributed Systems)
Chapter 3 slides (Distributed Systems)
 
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE BPSC Previous Year Question for AP, ANE, AME, ADA, AE
BPSC Previous Year Question for AP, ANE, AME, ADA, AE
 
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital MemoriesAn Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
An Efficient Fault Tolerance System Design for Cmos/Nanodevice Digital Memories
 
Cn (cs 604) objective question
Cn (cs 604) objective questionCn (cs 604) objective question
Cn (cs 604) objective question
 
CCNA Network Services Questions
CCNA Network Services QuestionsCCNA Network Services Questions
CCNA Network Services Questions
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
Ccn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha vCcn unit-2- data link layer by prof.suresha v
Ccn unit-2- data link layer by prof.suresha v
 
D0151724
D0151724D0151724
D0151724
 
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
A Hybrid DWT-SVD Method for Digital Video Watermarking Using Random Frame Sel...
 
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...
 
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
Reliability Level List Based Iterative SISO Decoding Algorithm for Block Turb...
 
Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...Lightweight hamming product code based multiple bit error correction coding s...
Lightweight hamming product code based multiple bit error correction coding s...
 
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS
 
Ngn articulo 2
Ngn articulo 2Ngn articulo 2
Ngn articulo 2
 

Similar to exam2

CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
VUPHUONGTHAO9
 
200 310-q&a-demo-troytec
200 310-q&a-demo-troytec200 310-q&a-demo-troytec
200 310-q&a-demo-troytec
Isabella789
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
tadeseguchi
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
tadeseguchi
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
joellemurphey
 
Connecting network
Connecting networkConnecting network
Connecting network
imacomobio
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN
KylieJonathan
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
Neda Shekarkhar
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
Carlos Humberto Rivera Mera
 
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...
PassquestionExamTrai
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
Adrian Buban
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)welcometofacebook
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
cravennichole326
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
elbanglis
 
Mcq in int
Mcq in intMcq in int
Mcq in int
Karthiga M
 
Story of OSI models in Networking.ppt
Story of OSI models in Networking.pptStory of OSI models in Networking.ppt
Story of OSI models in Networking.ppt
ShreeShak1
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
Santhosh Krishna
 
Wn vt
Wn vtWn vt
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
andrey_milev
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
oking2777
 

Similar to exam2 (20)

CCNA_questions_2021.pdf
CCNA_questions_2021.pdfCCNA_questions_2021.pdf
CCNA_questions_2021.pdf
 
200 310-q&a-demo-troytec
200 310-q&a-demo-troytec200 310-q&a-demo-troytec
200 310-q&a-demo-troytec
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020200+ [updated] computer networking mc qs and answers 2020
200+ [updated] computer networking mc qs and answers 2020
 
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docxREVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
REVIEW FINAL STUDY GUIDEQuestion 1 A _____ is used in large en.docx
 
Connecting network
Connecting networkConnecting network
Connecting network
 
352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN352-001-Exam-ADVDESIGN
352-001-Exam-ADVDESIGN
 
Tutorial 1 chapter 1
Tutorial 1 chapter 1Tutorial 1 chapter 1
Tutorial 1 chapter 1
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...
H19-401_V1.0 HCSP-Presales-Campus Network Planning and Design V1.0 Exam Quest...
 
Midterm exam-css
Midterm exam-cssMidterm exam-css
Midterm exam-css
 
Final exam review answer(networking)
Final exam review answer(networking)Final exam review answer(networking)
Final exam review answer(networking)
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docxExam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
 
Mcq in int
Mcq in intMcq in int
Mcq in int
 
Story of OSI models in Networking.ppt
Story of OSI models in Networking.pptStory of OSI models in Networking.ppt
Story of OSI models in Networking.ppt
 
Wireless networks mcq
Wireless networks mcqWireless networks mcq
Wireless networks mcq
 
Wn vt
Wn vtWn vt
Wn vt
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 
Cmit 321 final exam new spring 2016
Cmit 321 final exam new  spring 2016 Cmit 321 final exam new  spring 2016
Cmit 321 final exam new spring 2016
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

exam2

  • 1. 1. exam2001 (Points: 2) 1. A(n) ____________ provides for a connection between two layers, for example, Layer 2 to Layer 3. a. protocol converter b. handshaking c. interface d. network architecture e. processor Save Answer 2. exam2002 (Points: 2)
  • 2. The ___________ layer handles the routing and forwarding of the data. a. physical b. data link c. network d. transport e. session Save Answer 3. exam2003 (Points: 2) The __________ data coding method is implemented in Ethernet and Token Ring LANs. a. Manchester encoding b. protocol converter c. character code d. protocol interface e. none of the above
  • 3. Save Answer 4. exam2004 (Points: 2) In 4B/5B encoding: a. every four-bit pattern is assigned a five-bit code. b. every eight-bit sequence is transmitted as ten bits. c. an encoded stream of bits will never contain more than three 0s in a row. d. synchronization leads to higher transfer rates. e. all of the above. Save Answer 5. exam2005 (Points: 2)
  • 4. A drawback of Bipolar AMI is that: a. its bandwidth requirement is twice the baud rate. b. for 100 Mbps transmission, one needs a bandwidth of 200 MHz. c. both a and b. d. with a long string of zeros, it can lose self-synchronization. e. non-coded violations result in spoiled bits. Save Answer 6. exam2006 (Points: 2)
  • 5. The most significant benefit that Passive Optical Network offers to end users is . a. vast increase in the amount of bandwidth b. guaranteed service c. synchronous access d. choice in service e. none of the above Save Answer 7. exam2007 (Points: 2)
  • 6. Internet Service Providers (ISPs) use _____________ because it aggregates both digital ISDN BRI and analog modem dial-up connections with one link and phone number. a. Frame Relay b. SONET c. ATM d. ISDN PRI e. DSL Save Answer 8. exam2008 (Points: 2)
  • 7. _____________ is exceptionally fitted to videoconferencing because channel bonding enables dynamic bandwidth allocation to support high transmission rates that video requires. a. Frame Relay b. SONET c. ATM d. ISDN e. DSL Save Answer 9. exam2009 (Points: 2)
  • 8. The most important consideration when transporting voice and video over a data network is . a. network efficiency b. security c. bandwidth d. quality of service e. all of the above Save Answer 10. exam2010 (Points: 2)
  • 9. In ATM, the segmentation-and-reassembly process is basically a ________ conversion. a. header-to-payload b. bit-to-byte c. transmission d. packet-to-cell e. network switching Save Answer 11. exam2011 (Points: 2)
  • 10. The program was initiated by the FCC to enable users to change service providers while retaining the same phone number. a. Local Number Portability b. Local Service Management System c. Location Routing Number d. Number Portability Administration Center Save Answer 12. exam2012 (Points: 2)
  • 11. The objective of a(n) SLA is to define and monitor a provider's service levels while the objective of a(n) SLA is to set and manage user or customer expectations. a. network, application b. utilization, application c. internal, external d. external, internal e. contract, service Save Answer 13. exam2013 (Points: 2)
  • 12. The Securities Exchange Commission regulates that must be treated like any other forms of written communication and meet compliance guidelines. a. voice mail b. e-mail c. Web-based services d. telemessaging e. none of the above Save Answer 14. exam2014 (Points: 2)
  • 13. ensures authors the right to protect their work. a. Copyright b. Trademark c. Patent d. Intellectual property e. all of the above Save Answer 15. exam2015 (Points: 2)
  • 14. When calculating “Cost of Outage,” (Hr + Pr) is __________ during Outage. a. Human and Personnel Costs b. Hardware and Personnel Costs c. Dollars Lost d. Probability of Human Cost e. Return on Human and Personnel Costs Save Answer 16. exam2016 (Points: 2)
  • 15. When a server is dedicated to a single application, it is referred to as a . a. specific server b. dedicated server c. peer-to-peer server d. specialized server e. any of the above Save Answer 17. exam2017 (Points: 2)
  • 16. Access control, which is essentially a form of __________, is usually implemented in a single computer to control access to that computer. a. authorization b. encryption c. active monitoring d. intrusion detection e. passive monitoring Save Answer 18. exam2018 (Points: 2)
  • 17. ______________ uses mirroring, a fault tolerant technique that keeps a copy of the contents written to one drive on the other drive. a. RAID 0 b. RAID 1 c. RAID 2 d. RAID 3 e. RAID 4 Save Answer 19. exam2019 (Points: 2)
  • 18. Network utilization is defined as the ratio of _______ to _______ . a. total load, network capacity b. bit load, bit capacity c. transmitted frames, lost frames d. lost frames, transmitted frames e. network capacity, network load Save Answer 20. exam2020 (Points: 2)
  • 19. In an ergonomically designed workstation, the operator’s feet, when seated, should rest on the floor or on a footrest. a. at an angle of 10 to 20 degrees b. lightly c. never d. flat e. none of the above Save Answer 21. exam2021 (Points: 2)
  • 20. IPv6 is a _________ -bit address developed to extend source and destination addresses. a. 32 b. 64 c. 128 d. 256 e. 512 Save Answer 22. exam2022 (Points: 2)
  • 21. VPNs are encrypted tunnels through a ____________ network that forwards data over the shared media. a. public b. leased-line c. proprietary d. any of the above e. none of the above Save Answer 23. exam2023 (Points: 2)
  • 22. The IP is a(n) ____________ protocol. a. connectionless b. unreliable c. best-effort d. all of the above e. none of the above Save Answer 24. exam2024 (Points: 2)
  • 23. Applications such as FTP and SMTP use _________ and applications such as RTP use . a. UDP, TCP b. UDP, IP c. IP, TCP d. TCP/UDP, TCP/UDP e. TCP, UDP Save Answer 25. exam2025 (Points: 2)
  • 24. The purpose of new suffixes like .info and .aero is _____________. a. to make Internet addressing complicated for eavesdroppers b. to make Internet addressing more simple and websites easier to find c. to ensure that speculators are unable to grab the best names d. to ensure that trademark holders have competition e. all of the above Save Answer