51-55 | 56-60 | 61-65 | 66-70 | 71-75 |
---|---|---|---|---|
Parity.
In asynchronous transmissions, what bit is used by the receiving device to verify that the transmission was received correctly?
|
white, red, black, yellow, and violet.
In telecommunications cable, the “tip” or “primary” wire color group order is
|
patch cord.
A short section of single fiber cable that has a connector at each end is called a
|
Manages data transfer across the tunnel. Encrypts and decrypts data. Establishes tunnels.
What are the functions that a virtual private network (VPN) concentrator performs?
|
Spam.
Which threat vector is considered more of an annoyance than an attack?
|
Block of data.
If an error should occur, what transmission is lost in an synchronous transmission?
|
straight through and crossover.
Two types of network cables are
|
Trunks.
What allows transportation of all active virtual LANs (VLAN) between switches using a single physical link?
|
Compression and decompression (codec) algorithm.
What software do video compression circuits use to determine the amount of change that occurs between frames?
|
Patches.
Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?
|
Parity.
The significance the amount of ones have in a data bit pattern when using vertical redundancy check (VRC) is that it determines
|
a driver, optical source, and fiber optic pigtail.
An optical transmitter is comprised of
|
Router.
Which device has multiport connectivity that directs data between nodes on a network?
|
future growth.
Simple network management protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems, and help plan for
|
Uninterruptible power supply.
What physical security implementation will ensure continuous operation of critical network equipment?
|
VRC and LRC.
What two error detection methods, when used together, are 98 percent effective in detecting errors?
|
10 MHz – 100 MHz/km.
What is the bandwidth of multimode step-index optical fiber cable?
|
Border gateway protocol (BGP).
Which routing protocol do Internet backbones use?
|
Read, write, trap, traversal operations
What are the basic SNMP commands?
|
auxiliary port.
In general, you should deny direct dial-in access to a network device by disabling the
|
Receiving end.
When using forward error control as a method of error correction, where does error correction take place?
|
Single mode fiber.
Which type of cable is the hardest to splice?
|
public network.
Virtual private networks (VPNs) allow the AF to extend network resources across a/an
|
Biometrics.
Which identity management process uses a fingerprint to authenticate a user?
|
Display hold.
When using a multimeter, which option should be used if the display is unreadable due to fluctuations?
|