Network+ Final Exam Review - Part 4
Chapters 12-15
1. Using
VoIP over a WAN allows an organization to avoid paying long-distance telephone
charges, a benefit known as ____.
a. charge bypass
b. easypass
c. toll bypass
d. distance bypass
2. SIP
and H.323 account for communication between media gateways.
a. True
b. False
3. ____ signaling functions are more limited than
those performed by the protocols in the H.323 group.
a. MEGACO
b. MGC
c. SIP
d. RTCP
4. ____
is the use of one network to simultaneously carry voice, video, and data
communications.
a. Convergence
b. Divergence
c. Multicasting
d. Unicasting
5. SIP
and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
a. control only
b. call signaling only
c. call signaling and
control
d. communication between media gateways
6. When streaming videos are supplied via the
Web, they are often called ____________________.
Webcasts
7. ____ describes the use of any network to carry
voice signals using the TCP/IP protocol.
a. Internet telephony
b. Voice telephony
c. Telephony
d. IP telephony
8. When
more than two people participate in a videoconference, for example, in a
point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is
required.
a. switch
b. gateway
c. bridge
d. router
9. In general, a(n) ____ is a private switch
that accepts and interprets both analog and digital voice signals.
a. IT-PBX
b. Data PBX
c. IP-PBX
d. analog PBX
10. It
is more difficult to transmit VoIP and video over IP signals over a
packet-switched network than it is to transmit data signals.
a. True
b. False
11. The popular Internet telephony software,
Skype, is a type of ____.
a.
IP telephone
b. teleapplication
c. compu-phone
d.
softphone
12. When
a caller uses an IP telephone, his or her voice is immediately digitized and
issued from the telephone to the network in ____ form.
a.
frame
b.
segment
c.
packet
d. circuit
13. An
off-the-shelf workstation can be programmed to act like an IP telephone.
a. True
b. False
14. IPTV,
videoconferencing, streaming video, and IP multicasting belong to the range of
services known as ____.
a. voice over IP
b. data over IP
c. video over IP
d. Web
over IP
15. Many
streaming video services - and nearly all of those issued over a public
network, such as the Internet - are examples of ____ transmissions.
a. broadcast
b. telecast
c. unicast
d. multicast
16. A
computer programmed to act like an IP telephone is known as a(n) ____.
a.
video phone
b.
softphone
c.
compu-phone
d.
streaming server
17. ____________________ is a simple technique
that addresses QoS issues by prioritizing traffic.
DiffServ
18. ____________________ performs the same
functions as MGCP, but using different commands and processes.
MEGACO
19. Many network engineers consider ____ to be
superior to MGCP.
a. MGC
b. RTCP
c. SIP
d. MEGACO
20. When using an analog telephone, a VoIP adapter
that performs analog-to-digital conversion is known as a(n) ____.
a. DTA (digital telephone adapter)
b. ATA (analog telephone adapter)
c. DTA (data telephone adapter)
d. VTA (voice telephone adapter)
21. ____ is a measure of how well a network
service matches its expected performance.
a. RSVP
b. DiffServ
c. QoS
d. MPLS
22. ____________________ is a QoS technique that
replaces the IP datagram header with a label at the first router a data stream
encounters.
MPLS
23. One drawback to ____ video is that content
may not be edited before it’s distributed.
a. streaming server
b. live streaming
c. on demand
d. VoIP
24. IP telephones are directly connected to the
local loop.
a. True
b. False
25. When
VoIP relies on the Internet, it is often called ____.
a. telephony
b. IP telephony
c. voice telephony
d. Internet telephony
26. Logical connectivity problems often prove more
difficult to isolate and resolve than physical connectivity problems.
a.
True
b.
False
27. The danger in using a ____ is that it could collect
more information than you or the machine can reasonably process.
a.
cable continuity tester
b.
protocol analyzer
c.
multimeter
d.
wireless network tester
28. A ____ system
is a process or program that provides support personnel with a centralized
means of documenting changes to the network.
a.
change management
b.
asset management
c.
change document
d.
release management
29. A
sophisticated ____________________ will include a TDR (time domain
reflectometer) that issues a signal on a cable and then measures the way the
signal bounces back (or reflects) to the TDR.
performance
tester
30. Continuity
testers can only be used to test copper cable.
a.
True
b.
False
31. ____ are often
considered third-level support.
a.
Help desk analysts
b.
Technical specialists
c.
Administrators
d.
Help desk coordinators
32. ____ is a
fundamental property of wire that depends on a wire’s molecular structure and
size.
a.
Resistance
b.
Current
c.
Impedance
d.
Voltage
33. Before using
a network monitor or protocol analyzer on a network, it is important to know
what ____ on your network normally looks like.
a.
jabber
b.
runts
c.
traffic
d.
current
34. To take advantage of network monitoring and analyzing
tools, the network adapter installed in the machine running the software must
support ____ mode.
a.
continuous
b.
open
c.
promiscuous
d.
static
35. Network
engineers today might call any protocol analyzer tool a____________________.
sniffer
36. An
administrator should take the time to troubleshoot all network problems
correctly by asking specific s designed to identify the problem ____.
a.
intensity
b. focus
c. scope
d. background
37. ____ is the
telltale factor for ascertaining where faults in a cable lie.
a. Voltage
b. Current
c.
Resistance
d. Impedance
38. Some software errors point to a physical connectivity
problem.
a.
True
b.
False
39. A ____ usually results from a bad NIC.
a.
jabber
b.
giant
c.
ghost
d.
runt
40. ____ are
frames that are not actually data frames, but aberrations caused by a device
misinterpreting stray voltage on the wire.
a.
Ghosts
b.
Jabbers
c.
Giants
d.
Runts
41. Most wireless testing tools contain more powerful
antennas than a workstation NIC.
a.
True
b.
False
42. Rather than issue an electrical signal over
the cable as twisted pair cable testers do, a(n) ____________________ transmits
light-based signals of different wavelengths over the fiber.
OTDR
43. When used on a
copper-based cable, a continuity tester applies a small amount of ____ to each
conductor at one end of the cable.
a.
current
b.
impedance
c.
voltage
d.
resistance
44. A ____ can be
used to intercept a telephone conversation.
a.
butt set
b.
sniffer
c.
protocol analyzer
d.
network monitor
45. ____ are often
considered first-level support.
a.
Network specialists
b.
Administrators
c.
Help desk coordinators
d.
Help desk analysts
46. A help desk is typically staffed with
____________________ - people proficient in workstation and network
troubleshooting.
help
desk analysts
47. Tone generators and tone locators are used to
determine characteristics about a cable.
a.
True
b.
False
48. A____ is a small electronic device that issues a
signal on a wire pair.
a.
probe
b.
probe kit
c.
tone generator
d.
tone locator
49. A ____ can
generate traffic in an attempt to reproduce a network problem and monitor
multiple network segments simultaneously.
a.
protocol analyzer
b.
multimeter
c.
cable performance tester
d.
network monitor
50. A ____ is a tool that can assess the quality of the
wireless signal.
a.
spectrum analyzer
b.
quality analyzer
c.
function analyzer
d.
signal analyzer
51. A____ UPS uses the A/C power from the wall
outlet to continuously charge its battery, while providing power to a network
device through its battery.
a.
offline
b.
online
c.
standby
d.
offsite
52. An anti-malware policy is meant to protect the
network from damage and downtime.
a.
True
b.
False
53. Mesh topologies and ____ topologies
are good choices for highly available enterprise networks.
a.
SONET ring
b.
star
c.
bus
d.
ring
54. Protection against harmful code
involves more than just installing anti-malware software.
a.
True
b.
False
55. A____ virus disguises itself as a
legitimate program to prevent detection.
a.
stealth
b.
encrypted
c.
time dependent
d.
polymorphic
56.
____ is a type of media capable of
storing digitized data and that uses a laser to write data to it and read data
from it.
a.
Tape backup media
b.
Optical media
c.
USB
d.
Fiber optic media
57. A group of hard disks is called a
____.
a.
RAID group
b.
disk volume
c.
disk array
d.
disk partition
58. A____ is a deviation from a
specified level of system performance for a given period of time.
a.
hoax
b.
error
c.
fault
d.
failure
59. A____________________ is a copy of data or
program files created for archiving or safekeeping.
backup
60. ____________________ refers to a
collection of disks that provide fault tolerance for shared data and
applications.
RAID
61.
____ are programs that run independently
and travel between computers and across networks.
a.
Viruses
b.
Trojan horses
c.
Bots
d.
Worms
62. ____________________ is the process of
restoring your critical functionality and data after an enterprise-wide outage
that affects more than a single system or a limited group of users.
Disaster recovery
63.
An archive ____ is a file attribute that can be checked or to indicate whether
the file must be archived.
a.
bit
b.
word
c.
field
d.
byte
64. ____ is intended to eliminate single points of
failure.
a.
Contingency
b.
Availability
c.
Redundancy
d.
Integrity
65. ____ are distinct networks of storage
devices that communicate directly with each other and with other networks.
a.
Optical media
b.
RAID
c.
NAS
d.
SANs
66. A ____ is a program that runs automatically,
without requiring a person to start or stop it.
a.
worm
b.
Trojan horse
c.
virus
d.
bot
67. Generators provide surge protection.
a.
True
b.
False
68. Many bots spread through the
____________________, a protocol that enables users running client software to
communicate instantly with other participants in a chat room on the Internet.
IRC
69. ____ scanning techniques attempt to identify
malware by discovering “malware-like” behavior.
a.
Heuristic
b.
Integrity checking
c.
Polymorphic
d.
Signature
70. The goal of fault-tolerant systems is to
prevent failures from progressing to faults.
a.
True
b.
False
71. ____ is an automatic distribution of traffic
over multiple links or processors is used to optimize response.
a.
Redundancy
b.
Failover
c.
Load balancing
d.
RAID
72. ____ is
a fault-tolerance technique that links multiple servers together to act as a
single server.
a.
Clustering
b.
Grouping
c.
Mirroring
d.
Duplicating
73. Power that is free from noise is
called “____” power.
a.
white
b.
filtered
c.
clear
d.
clean
74. When implementing anti-malware
software on a network, one of your most important decisions is where to install
the software.
a.
True
b.
False
75. A program that disguises itself as something
useful but actually harms your system is called a ____.
a.
worm
b.
Trojan horse
c.
virus
d.
bot
76. The most comprehensive and complex upgrade
involving network hardware is a ____ upgrade.
a. NOS
b. cabling
c. printer
d. backbone
77. For
a cabling upgrade, the best way to ensure that future upgrades go smoothly is
to carefully document the existing cable after making any upgrades.
a. True
b. False
78. A
____ is a correction, improvement, or enhancement to a software application.
a. revision
b. patch
c. change
d. software upgrade
79. ____ management is the collection, storage,
and assessment of information related to the versions of software installed on
every network device and every device’s hardware configuration.
a. Performance
b. Configuration
c. Change
d. Asset
80. The
process of reverting to a previous version of software after attempting to
upgrade it is known as ____.
a. backleveling
b. downgrading
c. reverse engineering
d. change back
81. The
most critical type of software upgrade you will perform is an upgrade to your
____.
a. application
b. NOS
c. database
d. backbone
82. A
network management agent is a ____ that collects information about a device’s
operation and provides it to the network management application.
a. hardware device
b. software routine
c. GUI
d. probe
83. The
most common type of caching is ____ caching.
a. online
b. device
c. Internet
d. Web
84. A
key component in managing networks is identifying and tracking its hardware and
software through ____ management.
a. asset
b. change
c. configuration
d. performance
85. A ____
is a graphical representation of a network’s devices and connections.
a. network diagram
b. event viewer
c. wiring schematic
d. Multi Router Traffic Grapher
86. Because
backbone upgrades are expensive and time consuming, the first step in
approaching such a project is to ____ it.
a. research
b. justify
c. document
d. plan
87. A
networked ____ is perhaps the simplest device to add.
a. server
b. hub
c. workstation
d. printer
88. ____ is the local storage of frequently needed
files that would otherwise be obtained from an external source.
a. Segmentation
b. Paging
c. Swapping
d. Caching
89. The
first step in configuration management is to take an inventory of each node on
the network.
a. True
b. False
90. The
more data you gather while establishing your network’s baseline, the less
accurate your prediction will be.
a. True
b. False
91. A(n)
____ is a graphical representation of a network’s wired infrastructure.
a. event viewer
b. wiring schematic
c. Multi Router Traffic Grapher
d. network diagram
92. The
definition of managed devices and their data are collected in a(n) ____________________.
MIB
93. The
process where one network management console collects data from multiple
networked devices at regular intervals is known as ____.
a. interrogating
b. base lining
c. pushing
d. polling
94. ____________________ refers to the assessment,
monitoring, and maintenance of all aspects of a network.
Network management
95. Above
all, keep ____ in mind when you upgrade or install hardware on a network.
a. time
b. safety
c. costs
d. user inconvenience
96. Documenting
and capturing an accurate picture of a network’s physical and logical elements
are initial steps in understanding the network.
a. True
b. False
97. A____________________ is a report of the
network’s current state of operation.
baseline
98. A
____ is a network device devoted to storage and delivery of frequently
requested files.
a. server
b. cache engine
c. Web site host
d. database host
99. ____ upgrades typically overwrite some system
files on the workstation, so their installation may affect other applications
adversely.
a. Patch
b. Application
c. Principle
d. Full
100. ____ management refers to monitoring how well
links and devices are keeping up with the demands placed on them.
a. Performance
b. Configuration
c. Network
d. Fault