| Term 
 | Definition 
 
        | Point-to-point tunneling protocol |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Password authentication protocol |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Media Gateway Control Protocol |  | 
        |  | 
        
        | Term 
 
        | Which of the following solutions are used for implementing VPNs (select all the apply)?  
IPsecGRESDLCSSL/TLSPPTP |  | Definition 
 
        | IPsec, GRE, SSL/TLS (secure socket layer/transport layer security), and PPTP (Point to point tunneling protocol) |  | 
        |  | 
        
        | Term 
 
        | Which of the following solutions provide(s) the AAA functionality? (select all that apply), and what is AAA functionality?  
PAPRADIUSTACACS+PPTPMSCHAP |  | Definition 
 
        | RADIUS and TACACS+. AAA = Authentication, Authorization, and Accounting |  | 
        |  | 
        
        | Term 
 
        | A dial-up or VPN connection allowing remote users to access corporate network requires what type of service? and what does this answer stand for?  |  | Definition 
 
        | RAS (remote access service) |  | 
        |  | 
        
        | Term 
 
        | A software solution designed to enable interaction between two devices over a network is generally referred to as: 
Proxyweb servicesoftware as a service (SaaS)Virtual switch |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is an ICS server and its function? |  | Definition 
 
        | Internet Connection Sharing server is basically what is says. It's like an access point for any type of internet connection it may have (3G, T-1, cable, etc..) |  | 
        |  | 
        
        | Term 
 
        | One of the features of the Dynamic Host Configuration Protocol (DHCP) is the capability for static allocation of an IP address based on the IP-to-MAC address mapping. (T/F) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is HSPA+ and what is a characteristic feature of it? |  | Definition 
 
        | High speed packet access, allows for up to 21 Mbps (also called evolved HSPA or 4G). A characteristic feature of it is MIMO. |  | 
        |  | 
        
        | Term 
 
        | What is the difference between CWDM and DWDM? |  | Definition 
 
        | CWDM is course wavelength division multiplexing for city and access networks. It has 18 channels. DWDM is Dense Wavelength division multiplexing. This is more advanced, more costly, and increases bandwidth over existing fiber networks. |  | 
        |  | 
        
        | Term 
 
        | What is the difference between CDMA,CSMA, CSMA/CA/CD? And which ones uses radio waves? |  | Definition 
 
        | CDMA (Code division multiple access) uses radio comms. CSMA (Carrier sense multiple access) is a MAC protocol where a node checks for traffic on the line before transmitting. The CA part is collision avoidance with the CD for collision detection. Collision detection detects after transmission to see if a collision occured and then sends another packet if so, whereas collision avoidance checks before. CA is more often used in wireless networks. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Integrated Services Digital Network. It allows for simultaneous digital voice, video, and data transmissions over PSTN traditional circuits. |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the size of an ATM cell? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refer to cellular technologies used in mobile networks? (Select 3 answers) |  | Definition 
 
        | CDMA, GSM, and LTE. CSMA is not used in wireless transmissions.    |  | 
        |  | 
        
        | Term 
 
        | The IEEE 802.16 standards defining high-speed, long-distance wireless communication are also commonly referred to as: |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The RS-232 standard defines an interface for parallel data transmission method. (T/F) and explain what RS-232 is. |  | Definition 
 
        | RS-232 is for serial transmission of data, not parallel. So false. |  | 
        |  | 
        
        | Term 
 
        | What is the minimum cabling requirement for a 10GBASE-T network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the formula for finding the number of point-to-point connections in a full mesh network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following are examples of fiber optic connectors?  
STDB-25SCLCMT-RJFCRG-6 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The advantages of multimode fiber-optic cabling over single-mode cabling include data transfer rates over longer distances, higher speed, and lower cost. (T/F) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refer to solutions used for controlling the light signal at a termination point of a fiber-optic connection? (Select 2 answers) and what do they stand for? |  | Definition 
 
        | APC and UPC. APC = angled physical contact and UPC = ultra physical contact. |  | 
        |  | 
        
        | Term 
 
        | Which of the tools listed below allows for verification of the network cabling installation performance and its compliance with TIA or ISO standards? 
MultimeterCable certifierToner probeCable tester |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | SONET networks are most often based on: 
Star topologyBus topologyDual ring topologyMesh topology |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Logical bus over physical star is an example of hybrid network topology. (T/F) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The advantages of the client-server model over peer-to-peer networking model include: (Select 3 answers) 
Higher level of securityEasier adminHigher level of redundancyLower costImproved performance |  | Definition 
 
        | higher level of security, easier admin, and improved performance. Higher redundancy level is not part of this because there is a one server that if fails all fails. |  | 
        |  | 
        
        | Term 
 
        | Which of the following answers list examples of Industrial Control System (ICS) solutions? (Select 2 answers) and what do those acronyms stand for? How does RADIUS differ from TACACS+? |  | Definition 
 
        | Answers: DCS, SCADA.  Acronyms: KVM (Keyboard, video and mouse) is a hardware device to control multiple computers, RADIUS (Remote Authentication Dial-In User Service) is an authentication server. RADIUS compared to TACACS+ combines authentication and authorization, wheras TACACS+ is only authentication. DCS (distributed control system) is for the control as a whole. SCADA (Supervisory Control and data acquisition) is a system for gathering real time data from remote locations to control equipment. IKE (Internet Key exchange) is a part of IPsec built upon ISAKMP (Internet Security Association and Key Management Protocol).  |  | 
        |  | 
        
        | Term 
 
        | Which of the following answers lists the binary notation of the decimal number 192?   |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the first valid host address for a node residing in the 10.119.136.143/20 network? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the network address for a 154.24.67.147/22 host? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the APIPA address range? |  | Definition 
 
        | 169.254.0.0 to 169.254.255.255 |  | 
        |  | 
        
        | Term 
 
        | What are the ranges of the IP classes (private and public)? |  | Definition 
 
        | 
Public: 
Class A: 1-126Class B: 128-191Class C: 192-223Class D: 224-239Class E: 140-254 Private: 
Class A: 10.0.0.0 - 10.255.255.255Class B: 172.16.0.0-172.31.255.255Class C: 192.168.0.0 - 192.168.255.255 |  | 
        |  | 
        
        | Term 
 
        | Convergence state in routing refers to a situation where: 
A server receives the final ack packetall routers have finished updating their routing tablessome of the WAPs have duplicate IP addressesRogue access poitns are configured with legitimate SSIDs |  | Definition 
 
        | 
all routers have finished updating their routing tablesConvergence time is how fast a group of routers reach the state of convergence.  |  | 
        |  | 
        
        | Term 
 
        | What is route redistribution? |  | Definition 
 
        | Converting between 2 routing protocols |  | 
        |  | 
        
        | Term 
 
        | BGP is a hybrid routing protocol? (T/F) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the characteristic features of the Border Gateway Protocol (BGP)? (Select 2 answers) 
Distance-vector routing protocolEGPHybrid routing protocolIGPLink-state routing protocol |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A solution used to optimize and decrease the size of a routing table is known as: 
Route aggregationdefault routeroute redistributionloopback interface |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following provides a replacement for the Spanning Tree Protocol (STP) and what does it stand for and do?  |  | Definition 
 
        | SPB Shortest path bridging, it enables multipath routing and provides faster convergence times. |  | 
        |  | 
        
        | Term 
 
        | Which of the following terms best describe(s) a system/infrastructure that integrates various types of voice, video, and data services in a single user interface? (Select all that apply) 
UC serverVPN concentratorautonomous system (AS)honeypotUnified communications |  | Definition 
 
        | UC server and unified communications |  | 
        |  | 
        
        | Term 
 
        | Which of the networking protocols listed below enables creation of virtual routers? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What's the difference between a link-state, a distance-vector, and a path-vector protocol? |  | Definition 
 
        | 
Path-vector protocols are paths through a network that are updated dynamically.Distance-vector protocols are old school, only taking into account the distance to a destination. (used in a packet switched network)link-state are better than distance-vector. Examples are OSPF and IS-IS (intermediate system to intermediate system) |  | 
        |  | 
        
        | Term 
 
        | What's the difference between VRRP and HSRP? |  | Definition 
 
        | VRRP = virtual router redundancy protocol. HSRP = hot standby router protocol. |  | 
        |  | 
        
        | Term 
 
        | What is the replacement for STP (spanning tree protocol)?  |  | Definition 
 
        | SPB (shortest path bridging) |  | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below describe(s) the function of Differentiated Services Code Point (DSCP) architecture? (Select all that apply) and describe why.  
SecurityQoSAuthenticationTraffic managementaccounting |  | Definition 
 
        | QoS and traffic management. This is because DSCP, which is an 8 bit field, manages network traffic, thereby providing traffic management. This is also part of the class of service (CoS) parameter. |  | 
        |  | 
        
        | Term 
 
        | A data transfer protocol for linking data storage components over a network is known as: (and what does it stand for?) |  | Definition 
 
        | iSCSI . Internet Small Computer Systems Interface, an IP based storage networking standard for linking data storage facilities. |  | 
        |  | 
        
        | Term 
 
        | What is the maximum payload value for a standard Ethernet frame? 
1000 bytes1250 bytes1500 bytes2000 bytes |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refers to the MTU for a standard Ethernet frame? 
500 bytes750 bytes1000 bytes1500 bytes |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A high-speed network technology primarily used to connect computer data storage is known as: (and what is HSPA+ ?) 
Fibre Channel (FC)HSPA+Frame relaynetwork attached storage (NAS) |  | Definition 
 
        | FC. HSPA+ is an extension of 3G, stands for high speed packet access. |  | 
        |  | 
        
        | Term 
 
        | An SNMP management station receives SNMP notifications from Agents on UDP port and sends on what port?  |  | Definition 
 
        | receives on port 162 and sends on 161 |  | 
        |  | 
        
        | Term 
 
        | 802.1X is an IEEE standard for implementing: 
Token ring networksport-based network access controlVLAN taggingwireless networks |  | Definition 
 
        | Port-based network access control |  | 
        |  | 
        
        | Term 
 
        | A logical network diagram is a document that describes the detailed layout of the building and the way the devices are connected to the network through the actual cabling that transmits data. (T/F) |  | Definition 
 
        | False, this is because the layout of the building and the way the devices are connected is the physical topology, the network diagram is how they talk. |  | 
        |  | 
        
        | Term 
 
        | Which of the following answers refer(s) to a type of software embedded into hardware device? (Select all that apply) 
HIDSDevice DriverBIOSFirmware |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | VLAN trunking protocol, and it's proprietary to Cisco. |  | 
        |  | 
        
        | Term 
 
        | Which of the following solutions provide(s) protection against switching loops? (Select all that apply) 
STP802.1dNTPRSTPVTC802.1w |  | Definition 
 
        | STP, 802.1d, RSTP, and 802.1w |  | 
        |  | 
        
        | Term 
 
        | Which of the terms listed below refer(s) to a newer replacement for the Spanning Tree Protocol (STP)? (Select all that apply) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Data from multiple VLANs on a single switch is carried through a single network link between switches. This is often referred to as:  
port labelingport trunkingport bondingport filtering |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A switch port configured to pass all the data, regardless of the VLAN number, between all switches on a LAN is known as: 
default gatewaytrunk portcaptive portalmirrored port |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following solutions enables combining several physical ports into a single logical channel? (and what does the acronym stand for) |  | Definition 
 
        | LACP (link aggregation control protocol) |  | 
        |  | 
        
        | Term 
 
        | VLAN membership can be configured through: (Select all that apply) 
switch portsIP-address-to-VLAN mappingTCP and UDP port numbersMAC-address-to-VLAN mapping |  | Definition 
 
        | MAC-address-to-VLAN mapping and switch ports |  | 
        |  | 
        
        | Term 
 
        | In dynamic VLAN configuration, a device connecting to a certain switch port automatically becomes a member of the VLAN assigned to that port. (T/F) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | A solution that allows to supply electricity over standard Ethernet cables is known as: (Select all that apply) 
IEEE 802.3abPoEmetro ethernetIEEE 802.3afPSTN |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the standards below implements PoE+? 
802.1d802.3at801.1x802.3ab |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What's the difference between throughput and goodput? |  | Definition 
 
        | throughput is the speed at which data is traversing a link, goodput is the useful amount of data traversing a link. |  | 
        |  | 
        
        | Term 
 
        | What is the difference between an IBSS (Independent Basic Service Set), infrastructure mode and ad hoc mode? |  | Definition 
 
        | IBSS does not use an AP for traffic and infrastructure mode has at least one pre-existing AP (hence, the infrastructure part, and it's independent because it can't connect to other basic service sets for lack of APs). ad hoc mode has an AP but it doesn't rely on a pre-existing infrastructure but typically uses the flooding algorithm for fowarding network traffic. |  | 
        |  | 
        
        | Term 
 
        | A Wireless Local Area Network (WLAN) operating in an infrastructure mode with the use of more than one Access Point (AP) is referred to as: 
SSIDExtended Service Set (ESS)Basic service set (BSS)Independent Basic Service Set (IBSS) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is the difference between bluejacking and bluesnarfing? |  | Definition 
 
        | bluejacking is sending unsolicited messages over bluetooth and bluesnarfing is stealing info via bluetooth. |  | 
        |  | 
        
        | Term 
 
        | Penetration testing: (Select all that apply) 
Bypasses security controlOnly identifies lack of security controlsActively tests security controlsexploits vulnerabilitiespassively tests security controls |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What is involved in a smurf attack? |  | Definition 
 
        | IP spoofing, DD0S and a large amount of icmp echo replies. |  | 
        |  | 
        
        | Term 
 
        | What is the difference between malware, a computer virus, adware, spyware, , and ransomware? |  | Definition 
 
        | Malware is a general term for malicious software used on computers (stuff like disrupting service, gathering information, gaining access, etc...), a virus is a type of malware since it's malicious but it's job is to replicate, using an infected file to spread. adware is advertising malware, spyware is malware that spies on you, worms are like viruses but don't require host files to spread. |  | 
        |  | 
        
        | Term 
 
        | A hacker has captured network traffic with cleartext commands sent from the client to the server console. Which of the following ports is being used by the network admin for the client-server communication? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refers to a preferred replacement for the SLIP protocol and what is SLIP? |  | Definition 
 
        | PPP, SLIP stands for Serial Line Interface Protocol. It's obviously becoming obsolete because we don't use serial cables much any more. |  | 
        |  | 
        
        | Term 
 
        | Unblocking port number 22 enables what type of traffic? (Select all that apply) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The term "DHCP snooping" refers to an exploit that enables operation of a rogue DHCP server on the network. (T/F) Also, explain what DHCP snooping is. |  | Definition 
 
        | It's not actually snooping, it's a security protocol for detecting snooping, dropping what it thinks is unacceptable traffic. This is therefore false. |  | 
        |  | 
        
        | Term 
 
        | Which of the following security solutions allows for discarding ARP packets with invalid IP-to-MAC address bindings? Also, what do all these acronyms stand for?  |  | Definition 
 
        | Answer: DAI (dynamic arp inspection) SIEM: Security information and event management RARP: reverse arp |  | 
        |  | 
        
        | Term 
 
        | Which of the functionalities listed below allows a DLP system to fulfil its role? and what is a DLP system?  
motion detectionenvironmental monitoringcontent inspectionloop protection  |  | Definition 
 
        | Content inspection, because a DLP system is a data loss prevention system. |  | 
        |  | 
        
        | Term 
 
        | Solutions designed to strengthen existing WEP implementations without the requirement for replacement of legacy hardware include: (Select 2 answers) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | AES-based encryption mode is a characteristic feature of: |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Challenge Handshake Authentication Protocol (CHAP) is a remote access authentication protocol that periodically re-authenticates client at random intervals in order to prevent session hijacking. (T/F) |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refers to a multi-protocol authentication framework frequently used in 802.11 networks and point-to-point connections? |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refer(s) to physical security control solution(s)? (Select all that apply) 
cipher lockhardware firewallbiometricsproximity readervideo surveillancesecurity guard |  | Definition 
 
        | all except hardware firewall |  | 
        |  | 
        
        | Term 
 
        | An IEEE standard for port-based network access control is called: 
802.1D802.1Q802.1W802.1X |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the server types listed below would be used for troubleshooting network-wide routing problems? Also, what are these types of servers?  
ICS serverLG serverUC serverDNS server |  | Definition 
 
        | answer: LG server LG server = looking glass server, used to view routing information.  ICS server = internet connection server (used with wireless 3G for instance) UC server = unified comms you know what dns server is.  |  | 
        |  | 
        
        | Term 
 
        | Which of the following can be the source of RFI and cause disruptions in wireless network connectivity? (Select all that apply) 
cordless phonesbaby monitorsmicrowave ovensbluetooth devicesSTP cabling |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following statements refer(s) to reversed TX/RX? (Select all that apply) and what does tx/rx mean?  
far end cross talkwrong cable standard type useddistance limitationswrong pin/pair assignments on cable endsnear end cross-talk |  | Definition 
 
        | Wrong TIA/EIA cable standard type used and wrong pin/pair assignments on cable ends. TX = transmit pair, RX = receive pair. So a reversed means they are the wrong pin assignments or possibly wrong cable standard type used. |  | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refer to the split horizon mechanism? (Select 2 answers) and what is a split horizon?  
Used with link-state routing protocolsUsed for combining multiple physical network adapters into a single logical interfaceUsed with distance-vector routing protocolsUsed for reducing the possibility of routing loopsUsed for designating a backup router in the event of an active router failure |  | Definition 
 
        | A split horizon is where with routers, an interface is not allowed to advertise a route back to another interface that it learned the route from. This is to prevent routing loops. It's used with distance-vector routing protocols. |  | 
        |  | 
        
        | Term 
 
        | Which of following protocols reside(s) at the OSI network layer? (Select all that apply) 
IPv4UDPIPsecTCPIPv6ICMP |  | Definition 
 
        | IPv4 and 6, IPsec, and ICMP |  | 
        |  | 
        
        | Term 
 
        | Which of the protocols listed below resides at the session layer of the OSI model? and what does the answer stand for and what does it do?  |  | Definition 
 
        | NetBIOS. NetBIOS is for communicating between LANs at the session layer, it means network basic input output system. |  | 
        |  | 
        
        | Term 
 
        | Data encryption and decryption typically takes place at the: 
Layer 3Presentation layerdata link layerlayer 1 |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | The process of adding control information to data as it passes through the layers of the OSI model at the receiving end of the network communication link is known as encapsulation. (T/F) and why? |  | Definition 
 
        | False. Encapsulation is for translating data from one protocol to another, this is not the control information part. |  | 
        |  | 
        
        | Term 
 
        | What are the characteristic features of the baseband signaling method? (Select 3 answers) 
digital signalingbidirectional transmissionanalog signalingunidirectional transmissionsimultaneous transmission of multiple signals and traffic typesIEEE 802.3 signaling method |  | Definition 
 
        | 1, 2, and 6 . Think about the word, base, like 10BaseT . |  | 
        |  | 
        
        | Term 
 
        | Which of the following layers are part of the 4-layer TCP/IP model? (Select 4 answers) 
ApplicationPresentationSessionTransportNetworkInternetLink |  | Definition 
 
        | Application, Transport, Internet, Network |  | 
        |  | 
        
        | Term 
 
        | Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment? (Select all that apply) 
Maximum data signaling rate of 54 Mbps5.0 GHz frequency bandCarrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method2.4 GHz frequency bandMaximum data signaling rate of 11 MbpsCarrier Sense Multiple Access / Collision Detection (CSMA/CD) network access method |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment? (Select all that apply) 
600 Mbps5.0 GHz bandCSMA/CDCSMA/CAMU-MIMO2.4 GHz |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | 8 position, 8 contact, like rj45 |  | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refer to Thinnet? (Select 4 answers) 
10Base2Twisted pair cablingBNC connectormax segment length of 100mRJ-45 connector10BaseTRG-58 cablingmax segment length of 185 meters |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the characteristic features of the 10BaseT Ethernet standard? (Select 3 answers) 
BNC connectorTwisted pair cabling (cat 3 or higher)max segment length of 100 meters8p8c connectortwisted pair cabling (cat 5 or higher)max segment length of 185 meterscoaxial cabling |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refer to the 100BaseTX Ethernet standard? (Select 3 answers) 
Max segment length 100 meterstwisted pair cabling (cat 5 higher)BNC connectormax segment length 185 meterscoaxial cablingtwisted pair cabling (cat 3 or higher)8p8c connector |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refer(s) to the 100BaseFX Ethernet standard? (Select 2 answers) 
BNC connectormax segment length 2 kmtwisted pair cablingmax segment length 185fiber optic cablingmax segment length 5 km8p8c connector |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the characteristic features of the 1000BaseT Ethernet standard? (Select all that apply) 
Max segment length 100 meterstwisted pair cabling (cat 5e or higher)Use of all four pairs of wires for data transmissionmax segment length 185 metersuses two pairs of wiresdata transmissionr rate of 1 Gbpstwisted pair cat 3 or higher8p8c connector |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refer(s) to the 1000BaseTX standard? (Select all that apply) 
max segment length of 100 meterstwisted pair cat 6 or higheruses all four pairs for transmissionsmax segment length 2 kmuses two pairs of wires for transmission1 Gbps (gigabit ethernet standard)twisted pair cat 5 or higher8p8c connector |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refer(s) to the 10GBaseT Ethernet standard? (Select all that apply) 
twisted pair copper cabling8p8c connectormax segment length 55 meters (cat 6 cable)fiber optic cablingmax segment length 100 meters cat 6a or higher |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | What are the characteristic features of the 10GBaseSR Ethernet standard? (Select all that apply) 
coaxial cablingsingle-mode fiber optic cablingmax segment length 400 mtwisted pair copper cablingmiltimode fiber optic cablingmax segment length of 40 km8p8c connector |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the answers listed below refer(s) to the 10GBaseSW Ethernet standard? (Select all that apply) 
multimode fiber optic cablingSONET connectionmax segment length 300 meterssingle mode fiber opticsmax segment length 10 km |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Which of the following answers refers to the application of the IEEE 1901 standard? 
environmental monitoring toolsbroadband over power lines method WLANsCSMA/CA |  | Definition 
 
        | broadband over power lines |  | 
        |  | 
        
        | Term 
 
        | What's the difference between AUP, SLA, MOU, MSA and SOW? |  | Definition 
 
        | AUP= acceptable use policy SLA = service level agreement SOW = scope of work MOU = memorandum of understanding MSA = master service agreement |  | 
        |  | 
        
        | Term 
 
        | What's the difference between MDF and IDF? |  | Definition 
 
        | MDF = Main distribution frame, IDF = intermediate distribution frame. Use your imagination, the difference between the two isn't hard to figure out. |  | 
        |  |