Final Review Part 4 - Chapters 12-15



Network+ Final Exam Review - Part 4


Chapters 12-15

1. Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefit known as ____.
a.       charge bypass
b.      easypass
c.       toll bypass
d.      distance bypass

2. SIP and H.323 account for communication between media gateways.
a.       True
b.      False
 
3.  ____ signaling functions are more limited than those performed by the protocols in the H.323 group.
a.       MEGACO
b.      MGC
c.       SIP
d.      RTCP

4. ____ is the use of one network to simultaneously carry voice, video, and data communications.
a.       Convergence
b.      Divergence
c.       Multicasting
d.      Unicasting

5. SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.
a.       control only
b.      call signaling only
c.       call signaling and control
d.      communication between media gateways
 
6.  When streaming videos are supplied via the Web, they are often called ____________________.
Webcasts
 
7.  ____ describes the use of any network to carry voice signals using the TCP/IP protocol.
a.       Internet telephony
b.      Voice telephony
c.       Telephony
d.      IP telephony

8. When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.
a.       switch
b.      gateway
c.       bridge
d.      router

 
 9. In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
a.       IT-PBX
b.      Data PBX
c.       IP-PBX
d.      analog PBX

10. It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.
a.       True
b.      False
 
 11. The popular Internet telephony software, Skype, is a type of ____.
            a.  IP telephone
            b.  teleapplication
            c.  compu-phone
            d.  softphone

12. When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
            a.    frame
            b.    segment
            c.    packet
            d.   circuit

13. An off-the-shelf workstation can be programmed to act like an IP telephone.
a.       True
b.      False

14. IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.
            a.    voice over IP
            b.    data over IP
            c.    video over IP
            d.    Web over IP

15. Many streaming video services - and nearly all of those issued over a public network, such as the Internet - are examples of ____ transmissions.
            a.     broadcast
            b.     telecast
            c.     unicast
            d.     multicast

16. A computer programmed to act like an IP telephone is known as a(n) ____.
            a.    video phone
            b.    softphone
            c.    compu-phone
            d.    streaming server

17.    ____________________ is a simple technique that addresses QoS issues by prioritizing traffic.
DiffServ
 
 18.   ____________________ performs the same functions as MGCP, but using different commands and processes.
MEGACO
 
 19. Many network engineers consider ____ to be superior to MGCP.
            a.     MGC
            b.     RTCP
            c.     SIP
            d.     MEGACO

20.  When using an analog telephone, a VoIP adapter that performs analog-to-digital conversion is known as a(n) ____.
            a.     DTA (digital telephone adapter)
            b.     ATA (analog telephone adapter)
            c.     DTA (data telephone adapter)
            d.     VTA (voice telephone adapter)
21.  ____ is a measure of how well a network service matches its expected performance.
            a.     RSVP
            b.     DiffServ
            c.     QoS
            d.     MPLS

22.  ____________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
MPLS
 
 23. One drawback to ____ video is that content may not be edited before it’s distributed.
            a.     streaming server
            b.     live streaming
            c.     on demand
            d.     VoIP

24.  IP telephones are directly connected to the local loop.
a.       True
b.      False

25. When VoIP relies on the Internet, it is often called ____.
            a.     telephony
            b.     IP telephony
            c.     voice telephony
            d.     Internet telephony

26. Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.
a.       True
b.      False





27. The danger in using a ____ is that it could collect more information than you or the machine can reasonably process.
            a.     cable continuity tester
            b.     protocol analyzer
            c.     multimeter
            d.     wireless network tester

28.  A ____ system is a process or program that provides support personnel with a centralized means of documenting changes to the network.
            a.     change management
            b.     asset management
            c.     change document
            d.     release management

 29. A sophisticated ____________________ will include a TDR (time domain reflectometer) that issues a signal on a cable and then measures the way the signal bounces back (or reflects) to the TDR.
performance tester

30.  Continuity testers can only be used to test copper cable.
a.       True
b.      False

31.  ____ are often considered third-level support.
            a.     Help desk analysts
            b.     Technical specialists
            c.     Administrators
            d.     Help desk coordinators

32.   ____ is a fundamental property of wire that depends on a wire’s molecular structure and size.
            a.     Resistance
            b.     Current
            c.     Impedance
            d.     Voltage

33.   Before using a network monitor or protocol analyzer on a network, it is important to know what ____ on your network normally looks like.
            a.     jabber
            b.     runts
            c.     traffic
            d.     current

34. To take advantage of network monitoring and analyzing tools, the network adapter installed in the machine running the software must support ____ mode.
            a.     continuous
            b.     open
            c.     promiscuous
            d.     static

35.  Network engineers today might call any protocol analyzer tool a____________________.
sniffer

 36. An administrator should take the time to troubleshoot all network problems correctly by asking specific s designed to identify the problem ____.
            a.    intensity
            b.   focus
            c.    scope
            d.    background

37.   ____ is the telltale factor for ascertaining where faults in a cable lie.
            a.    Voltage
            b.    Current
            c.    Resistance
            d.    Impedance

38. Some software errors point to a physical connectivity problem.
a.       True
b.      False

39. A ____ usually results from a bad NIC.
            a.     jabber
            b.     giant
            c.     ghost
            d.     runt

40.  ____ are frames that are not actually data frames, but aberrations caused by a device misinterpreting stray voltage on the wire.
            a.     Ghosts
            b.     Jabbers
            c.     Giants
            d.     Runts

41. Most wireless testing tools contain more powerful antennas than a workstation NIC.
a.       True
b.      False

 42.  Rather than issue an electrical signal over the cable as twisted pair cable testers do, a(n) ____________________ transmits light-based signals of different wavelengths over the fiber.
OTDR

 43. When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
            a.     current
            b.     impedance
            c.     voltage
            d.     resistance

 44. A ____ can be used to intercept a telephone conversation.
            a.     butt set
            b.     sniffer
            c.     protocol analyzer
            d.     network monitor




45.  ____ are often considered first-level support.
            a.     Network specialists
            b.     Administrators
            c.     Help desk coordinators
            d.     Help desk analysts

46. A help desk is typically staffed with ____________________ - people proficient in workstation and network troubleshooting.
help desk analysts

47. Tone generators and tone locators are used to determine characteristics about a cable.
a.       True
b.      False

48. A____ is a small electronic device that issues a signal on a wire pair.
            a.     probe
            b.     probe kit
            c.     tone generator
            d.     tone locator

49.  A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.
            a.     protocol analyzer
            b.     multimeter
            c.     cable performance tester
            d.     network monitor

50. A ____ is a tool that can assess the quality of the wireless signal.
            a.     spectrum analyzer
            b.     quality analyzer
            c.     function analyzer
            d.     signal analyzer

51.  A____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
            a.     offline
            b.     online
            c.     standby
            d.     offsite

52.  An anti-malware policy is meant to protect the network from damage and downtime.
a.       True
b.      False

53. Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
            a.     SONET ring
            b.     star
            c.     bus
            d.     ring




54. Protection against harmful code involves more than just installing anti-malware software.
a.       True
b.      False

55. A____ virus disguises itself as a legitimate program to prevent detection.
            a.     stealth
            b.     encrypted
            c.     time dependent
            d.     polymorphic

 56.  ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
            a.     Tape backup media
            b.     Optical media
            c.     USB
            d.     Fiber optic media

57. A group of hard disks is called a ____.
            a.     RAID group
            b.     disk volume
            c.     disk array
            d.     disk partition

58. A____ is a deviation from a specified level of system performance for a given period of time.
            a.     hoax
            b.     error
            c.     fault
            d.     failure

59.  A____________________ is a copy of data or program files created for archiving or safekeeping.
backup
 
60. ____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
RAID
 
 61.  ____ are programs that run independently and travel between computers and across networks.
            a.     Viruses
            b.     Trojan horses
            c.     Bots
            d.     Worms

62.  ____________________ is the process of restoring your critical functionality and data after an enterprise-wide outage that affects more than a single system or a limited group of users.
Disaster recovery
 
 63. An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.
            a.     bit
            b.     word
            c.     field
            d.     byte
  64.  ____ is intended to eliminate single points of failure.
            a.     Contingency
            b.     Availability
            c.     Redundancy
            d.     Integrity

65.    ____ are distinct networks of storage devices that communicate directly with each other and with other networks.
            a.     Optical media
            b.     RAID
            c.     NAS
            d.     SANs

66.  A ____ is a program that runs automatically, without requiring a person to start or stop it.
            a.     worm
            b.     Trojan horse
            c.     virus
            d.     bot

67. Generators provide surge protection.
a.       True
b.      False

68. Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
IRC
 
69.  ____ scanning techniques attempt to identify malware by discovering “malware-like” behavior.
            a.     Heuristic
            b.     Integrity checking
            c.     Polymorphic
            d.     Signature

70.  The goal of fault-tolerant systems is to prevent failures from progressing to faults.
a.       True
b.      False

71.  ____ is an automatic distribution of traffic over multiple links or processors is used to optimize response.
            a.     Redundancy
            b.     Failover
            c.     Load balancing
            d.     RAID
 
72.  ____  is a fault-tolerance technique that links multiple servers together to act as a single server.
            a.     Clustering
            b.     Grouping
            c.     Mirroring
            d.     Duplicating




73. Power that is free from noise is called “____” power.
            a.     white
            b.     filtered
            c.     clear
            d.     clean

74. When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
a.       True
b.      False

75.  A program that disguises itself as something useful but actually harms your system is called a ____.
            a.     worm
            b.     Trojan horse
            c.     virus
            d.     bot

76.  The most comprehensive and complex upgrade involving network hardware is a ____ upgrade.
a.       NOS
b.      cabling
c.       printer
d.      backbone

77. For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.
a.       True
b.      False

78. A ____ is a correction, improvement, or enhancement to a software application.
a.       revision
b.      patch
c.       change
d.      software upgrade

79.  ____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device’s hardware configuration.
a.       Performance
b.      Configuration
c.       Change
d.      Asset

80. The process of reverting to a previous version of software after attempting to upgrade it is known as ____.
a.       backleveling
b.      downgrading
c.       reverse engineering
d.      change back




81. The most critical type of software upgrade you will perform is an upgrade to your ____.
a.       application
b.      NOS
c.       database
d.      backbone

82. A network management agent is a ____ that collects information about a device’s operation and provides it to the network management application.
a.       hardware device
b.      software routine
c.       GUI
d.      probe

83. The most common type of caching is ____ caching.
a.       online
b.      device
c.       Internet
d.      Web

84. A key component in managing networks is identifying and tracking its hardware and software through ____ management.
a.       asset
b.      change
c.       configuration
d.      performance

85. A ____ is a graphical representation of a network’s devices and connections.
a.       network diagram
b.      event viewer
c.       wiring schematic
d.      Multi Router Traffic Grapher

86. Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.
a.       research
b.      justify
c.       document
d.      plan

87. A networked ____ is perhaps the simplest device to add.
a.       server
b.      hub
c.       workstation
d.      printer

88.  ____ is the local storage of frequently needed files that would otherwise be obtained from an external source.
a.       Segmentation
b.      Paging
c.       Swapping
d.      Caching

89. The first step in configuration management is to take an inventory of each node on the network.
a.       True
b.      False

90. The more data you gather while establishing your network’s baseline, the less accurate your prediction will be.
a.       True
b.      False

91. A(n) ____ is a graphical representation of a network’s wired infrastructure.
a.       event viewer
b.      wiring schematic
c.       Multi Router Traffic Grapher
d.      network diagram

92. The definition of managed devices and their data are collected in a(n) ____________________.
MIB

93. The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
a.       interrogating
b.      base lining
c.       pushing
d.      polling

94.  ____________________ refers to the assessment, monitoring, and maintenance of all aspects of a network.
Network management

95. Above all, keep ____ in mind when you upgrade or install hardware on a network.
a.       time
b.      safety
c.       costs
d.      user inconvenience

96. Documenting and capturing an accurate picture of a network’s physical and logical elements are initial steps in understanding the network.
a.       True
b.      False

97.  A____________________ is a report of the network’s current state of operation.
baseline

98. A ____ is a network device devoted to storage and delivery of frequently requested files.
a.       server
b.      cache engine
c.       Web site host
d.      database host
  
99.  ____ upgrades typically overwrite some system files on the workstation, so their installation may affect other applications adversely.
a.       Patch
b.      Application
c.       Principle
d.      Full

100.  ____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
a.       Performance
b.      Configuration
c.       Network
d.      Fault