Nocti Book Review
click below
click below
Nocti Book Review
Normal Size Small Size show me how
Nocti Book
Nocti Book Review | * |
---|---|
In order to avoid electronic discharge, a technician should | B. wear a wrist strap when working on the computer |
A 32 bit processor can access ____ of RAM. | C. 16 GB |
The wireless Bluetooth radio frequency standard connects up to ___devices in 10 meter radius. | B. 8 |
What is the term for the essential program in a computer that maintains disk files, runs applications, and handles devices? | C. Operating system |
Every NIC (Network Interface Controller) has a unique | B. MAC Address |
A network that uses a public telecommunication infrastructure to provide remote users with secure access to their organization's network is known as a | C. Virtual Private Network |
Which of the following is connected to the PC by the NIC? | A. Network |
Of the following, the media that lightening is least likely to have an adverse effect on is | D. Fiber optic |
To connect Cat-6 cable to a wall mounted network port, a ________connector is necessary. | D. RJ-45 |
A signal losing strength over a given distance is known as | A. attenuation |
In the OSI model, Layer 3 is the _________layer. | C. network |
In the OSI model, the layer that establishes, manages, and terminates connections between applications is the ______ layer. | D. Session |
The 568A and 568B standards were established by | D. EIA/TIA |
The Department of Defense (DoD) networking model is a ______ layer model. | B. four |
Which of the following layers of the OSI Model provides the electrical and mechanical transmission of data? | A. physical |
The netsta command can be used to display routing tables and | D. active connections |
What type of cable should a technician chose when connecting a switch to another switch? | A. crossover |
Switches an the forwarding decisions use MAC addresses to make decisions and operate at | B. OSI Layer-2 |
IP, Appletalk, and ______are routed protocols. | C. IPX |
The process of packaging and transferring data from one computer to another is known as | A. encapsulation |
A Linux installation will require at least _____ of RAM. | A. 8 MB |
Two devices transmitting on a shared medium at the same time is known as | c. Collision |
The encapsulation process is best described as data, segments, packets, frames, and | A. bits |
In network architecture, FDDI stand for | C. Fiber Distribution Data Interface |
Examples of LAN topology include bus, star and | A. tree |
The pattern or the layout of the nodes on a network is the | B. physical topology |
Which of the following is described as the physical arrangement of network nodes and media within a network structure? | C. topology |
Which of the following LAN topologies has each network host connected to a central hub and connects each node to the hub with a point to point connection? | B. star |
What is the network address class for 193.27.3.4? | C. Class C |
What portion of the Class A address 126.45.3.7 is the network address? | A. 126 |
A router using RIP updates the routing table every | B. 30 seconds |
The components of an IP address are network address and | D. host address |
A system or group of systems that enforces an access control policy between two networks is known as a | A. firewall |
Which of the following is the most secure password? | B. R#$34wb*e |
Which of the following prevents, detects, and removes viruses, worms, and Trojan horses? | C. virus protection |
According to EIA/TIA 568 standard, each floor in a building that will be connected to the network must have a minimum of _____ telecommunications room(s). | A. one |
The two major categories of virtual machines are process and _______virtual machines. | D. system |