30 questions
Which statement accurately describes what near end crosstalk (NEXT) is?
NEXT is crosstalk that occurs between wire pairs near the source of a signal
NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius.
NEXT is crosstalk that occurs when an EMI source is near the data signal source.
NEXT is crosstalk that occurs near the opposite end of a signal source.
What is the minimum category of UTP cable required in order to support Gigabit speeds?
Cat 6
Cat 5
Cat 5e
Cat 3
Signals that can travel in only one direction on a medium are referred to as what type of signal?
simplex
half-duplex
duplex
full-duplex
What kind of tool can you use to measure voltage on a cable length?
continuity tester
time domain reflectometer
multimeter
light meter
Which of the following statements about fiber-optic cabling is accurate?
Fiber-optic cable is cheaper than shielded twisted pair cabling.
The maximum length for a fiber segment is 20km.
Light experiences virtually no resistance when traveling through glass.
Fiber-optic cabling has a low resistance to signal noise.
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?
TIA/EIA 568A
TIA/EIA 568F
TIA/EIA 568B
TIA/EIA rollover
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?
1/5 inch
1/2 inch
4/5 inch
3/8 inch
Why should you terminate coaxial cable with connectors that are rated for the exact cable type?
A mismatched connector will destroy the equipment it is connected to.
A mismatched connector will work fine, but breaks cabling standards.
A mismatched connector will have different impedance ratings, causing data errors.
A mismatched connector will not fit the coaxial cable for termination.
What statement describes a transmission flaw that is occurring due to attenuation?
A network switch interface is dropping due to a powerful radio transmitter in the adjacent room
Two network interfaces are experiencing problems at the same time due to the cables having adjacent runs.
A customer's video conferencing application is experiencing delay in audio and video that comes and goes.
A customer modem is continuously losing signal due to large distance from the transmitting device.
What statement correctly describes "jitter"?
Jitter is the transmission of signal onto unintended pairs in a copper cable.
Jitter is the fluctuation of a signal's strength as it travels away from its source.
Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter
Jitter is what happens when packets experience varying amounts of delay and arrive out of order.
A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?
The USB standard is incompatible with the serial connection used by the console port.
Router console ports are only used when connected to other routers.
The router console port is providing an Ethernet connection, instead of a serial connection.
The cable must be a rollover cable.
What is the maximum supported throughput of a CAT6 cable?
100 Gbps
100 Mbps
10 Gbps
1 Gbps
Noise that can degrade or distort a signal on a network is measured with what unit?
farads
decibels
joules
volts
Telephone connections follow what registered jack standard?
registered jack 12 (RJ-12)
registered jack 11 (RJ-11)
registered jack 45 (RJ-45)
registered jack 100 (RJ-100)
A Fast Ethernet connection utilizes what pins on an RJ-45 plug?
1, 2, 7, 8
1, 2, 3, 6
1, 2, 3, 5
1, 2, 4, 5
You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?
The client is using an 802.11n wireless adapter, but the access point only supports up to 802.11g.
The client is only able to get line of sight with an omnidirectional antenna.
The client is using a network adapter with outdated firmware.
The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.
At what layer of the OSI model do the 802.11 standards vary?
Data link layer
Physical layer
Network layer
Transport layer
What scenario describes an evil twin attack?
A malicious access point is configured with the SSID of a non-malicious public access point.
An attacker is actively attempting to brute force the PIN of a WPS enabled access point.
A hacker is actively sending wireless probes to discover available wireless networks.
A hacker is utilizing a protocol analyzer on a public Wi-Fi network to discover packet contents.
Diffraction has what effect on a wireless signal's propagation?
The signal is returned back towards the source of the original signal.
The signal is redirected into multiple directions.
The signal is completely absorbed by the diffracting material.
The signal is split into secondary waves that continue in the direction in which they split.
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?
air scanner
spectrum analyzer
Wi-Fi analyzer
protocol analyzer
Near-field communication devices send data at what fixed frequency?
13.56 MHz
47.1 MHz
21.39 MHz
8.65 MHz
How does refraction affect the propagation of a wireless transmission?
It causes the signal to be returned back towards the source of the origin.
It causes the signal to be absorbed by the refracting material.
It distorts the signal as it travels into and through a different transmission medium.
It splits the signal into secondary waves that continue in the direction in which they split.
How many data streams are used in 802.11ac Wave 2 devices?
3 data streams
8 data streams
4 data streams
2 data streams
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
multiple input-multiple output (MIMO)
spread spectrum frequency hopping
channel bonding
frame aggregation
When using RFID, what is an ARPT (Active Reader Passive Tag)?
It is a tag that requires an active reader, but still contains a battery in the tag.
It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
It is a tag that can be read remotely up to a distance of 50 m, but requires a powerful active reader.
It is a battery-powered tag actively transmits its credentials at regular time intervals, which can be read remotely.
What type of device can be used to assess the quality of a wireless signal?
channel scanner
frequency hopper
Wi-Fi analyzer
spectrum analyzer
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
RT/FT (Request Time/Fair Time)
RTS/CTS (Request to Send/Clear to Send)
RAR/CTU (Reserve Airtime Request/Clear to Use)
HA/RA (Hold Airtime/Reserved Airtime)
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
WPA2-Enterprise
browser hijacking
captive portal
guest network profile
When troubleshooting wireless issues, what statement is accurate?
Access points that use overlapping channels can cause interference with each other if they are too close.
A WPA key can be used to associate with a WEP configured access point.
Simultaneous wired and wireless network connections do not affect the ability to communicate on the network.
Access point power levels should always be configured to output as much power as possible.
Which of the following statements regarding the 802.11ac standard is NOT accurate?
802.11ac access points can handle multiple transmissions at one time over the same frequency.
802.11ac operates on the 5-GHz band.
802.11ac access points function more like a hub than a switch.
The standard was officially approved in early 2014.