200 Câu Trắc Nghiệm 252 - On Thi Giua Ky
200 Câu Trắc Nghiệm 252 - On Thi Giua Ky
a) RFC
b) RCF
c) ID
d) DFC
Câu 2: In the layer hierarchy as the data packet moves from the upper to the lower layers, headers are
a) Added
b) Removed
c) Rearranged
d) Modified
Câu 3: The structure or format of data is called
a) Syntax
b) Semantics
c) Struct
d) Formatting
Câu 4: Communication between a computer and a keyboard involves transmission.
a) Automatic
b) Half-duplex
c) Full-duplex
d) Simplex
Câu 5: The first Network was called
a) CNNET
b) NSFNET
c) ASAPNET
d) ARPANET
Câu 6: A is the physical path over which a message travels.
a) Path
b) Medium
c) Protocol
d) Route
Câu 7: Which organization has authority over interstate and international commerce in the
communications field?
a) ITU-T
b) IEEE
c) FCC
d) ISOC
Câu 8: Which of this is not a network edge device?
a) PC
b) Smartphones
c) Servers
d) Switch
Câu 9: A set of rules that governs data communication.
a) Protocols
b) Standards
c) RFCs
d) Servers
Câu 10: Three or more devices share a link in connection.
a) Unipoint
b) Multipoint
c) Point to point
d) Simplex
Câu 11: When collection of various computers seems a single coherent system to its client, then it is
called
a) computer network
b) distributed system
c) networking system
d) mail system
Câu 12: Two devices are in network if
a) a process in one device is able to exchange information with a process in another device
b) a process is running on both devices
c) PIDs of the processes running of different devices are same
d) a process is active and another is inactive
Câu 13: Which of the following computer networks is built on the top of another network?
a) prior network
b) chief network
c) prime network
d) overlay network
Câu 14: In computer network nodes are
a) the computer that originates the data
b) the computer that routes the data
c) the computer that terminates the data
d) all of the mentioned
Câu 15: Communication channel is shared by all the machines on the network in
a) broadcast network
b) unicast network
c) multicast network
d) anycast network
Câu 16: Bluetooth is an example of
a) personal area network
b) local area network
c) virtual private network
d) wide area network
Câu 17: A is a device that forwards packets between networks by processing the routing
information included in the packet.
a) bridge
b) firewall
c) router
d) hub
Câu 18: A list of protocols used by a system, one protocol per layer, is called
a) protocol architecture
b) protocol stack
c) protocol suite
d) protocol system
Câu 19: Network congestion occurs
a) in case of traffic overloading
b) when a system terminates
c) when connection between two nodes terminates
d) in case of transfer
failure Câu 20: Which of
the following networks
extends a private network
across public networks?
a) local area network
b) virtual private network
c) enterprise private network
d) storage area network
Câu 21: Which of this is not a constituent of residential telephone line?
a) A high-speed downstream channel
b) A medium-speed downstream channel
c) A low-speed downstream channel
d) An ultra-high speed downstream
channel Câu 22: DSL telcos provide which
of the following services?
a) Wired phone access
b) ISP
c) Wired phone access and ISP
d) Network routing and ISP
Câu 23: The function of
DSLAM is to
a) Convert analog signals into digital signals
b) Convert digital signals into analog signals
c) Amplify digital signals
d) De-amplify digital signals
Câu 24: Which of the following terms is not associated with DSL?
a) DSLAM
b) CO
c) Splitter
d) CMTS
Câu 25: HFC contains
a) Fibre cable
b) Coaxial cable
c) A combination of Fibre cable and Coaxial cable
d) Twisted Pair Cable
Câu 26: Which of the following statements is not applicable for cable internet access?
a) It is a shared broadcast medium
b) It includes HFCs
c) Cable modem connects home PC to Ethernet port
d) Analog signal is converted to digital signal in DSLAM
Câu 27: Among the optical-distribution architectures that are essentially switched ethernet is
a) AON
b) PON
c) NON
d) MON
Câu 28: StarBand provides
a) FTTH internet access
b) Cable access
c) Telephone access
d) Satellite access
Câu 29: Home Access is provided by
a) DSL
b) FTTP
c) Cable
d) All of the mentioned
Câu 30: ONT is connected to splitter using
a) High speed fibre cable
b) HFC
c) Optical cable
d) Twisted pair cable
Câu 31: Which of the following factors affect transmission rate in DSL?
a) The gauge of the twisted-pair line
b) Degree of electrical interfernece
c) Shadow fading
d) The gauge of the twisted-pair line and degree of electrical interference
Câu 32: How many layers are present in the Internet protocol stack (TCP/IP model)?
a) 5
b) 7
c) 6
d) 10
Câu 33: The number of layers in ISO OSI reference model is
a) 5
b) 7
c) 6
d) 10
Câu 34: Which of the following layers is an addition to OSI model when compared with TCP IP model?
a) Application layer
b) Presentation layer
c) Session layer
d) Session and Presentation layer
Câu 35: Application layer is implemented in
a) End system
b) NIC
c) Ethernet
d) Packet transport
Câu 36: Transport layer is implemented in
a) End system
b) NIC
c) Ethernet
d) Signal transmission
Câu 37: The functionalities of the presentation layer include
a) Data compression
b) Data encryption
c) Data description
d) All of the mentioned
Câu 38: Delimiting and synchronization of data exchange is provided by
a) Application layer
b) Session layer
c) Transport layer
d) Link layer
Câu 39: In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
Câu 40: In TCP IP Model, when data is sent from device A to device B, the 5th layer to receive data at B is
a) Application layer
b) Transport layer
c) Link layer
d) Session layer
Câu 41: In the OSI model, as a data packet moves from the lower to the upper layers, headers are
a) Added
b) Removed
c) Rearranged
d) Randomized
Câu 42: Which of the following statements can be associated with OSI model?
a) A structured way to discuss and easier update system components
b) One layer may duplicate lower layer functionality
c) Functionality at one layer no way requires information from another layer
d) It is an application specific network model
Câu 43: OSI stands for
a) open system interconnection
b) operating system interface
c) optical service implementation
d) open service Internet
Câu 44: The number of layers in ISO OSI reference model is
a) 4
b) 5
c) 6
d) 7
Câu 45: TCP/IP model does not have layer but OSI model have this layer.
a) session layer
b) transport layer
c) application layer
d) network layer
Câu 46: Which layer is used to link the network support layers and user support layers?
a) session layer
b) data link layer
c) transport layer
d) network layer
Câu 47: Which address is used on the internet for employing the TCP/IP protocols?
a) physical address and logical address
b) port address
c) specific address
d) all of the mentioned
Câu 48: TCP/IP model was developed the OSI model.
a) prior to
b) after
c) simultaneous to
d) with no link
to
Câu 49: Which layer is responsible for process to process delivery in a general network model?
a) network layer
b) transport layer
c) session layer
d) data link layer
Câu 50: Which address is used to identify a process on a host by the transport layer?
a) physical address
b) logical address
c) port address
d) specific address
Câu 51: Which layer provides the services to user?
a) application layer
b) session layer
c) presentation layer
d) physical layer
Câu 52: Transmission data rate is decided by
a) network layer
b) physical layer
c) data link layer
d) transport layer
Câu 53: The physical layer is concerned with
a) bit-by-bit delivery
b) process to process delivery
c) application to application delivery
d) port to port delivery
Câu 54: Which transmission media provides the highest transmission speed in a network?
a) coaxial cable
b) twisted pair cable
c) optical fiber
d) electrical cable
Câu 55: Bits can be sent over guided and unguided media as analog signal by
a) digital modulation
b) amplitude modulation
c) frequency modulation
d) phase modulation
Câu 56: The portion of physical layer that interfaces with the media access control sublayer is called
a) random error
b) burst error
c) inverted error
d) double error
Câu 69: CRC stands for
a) cyclic redundancy check
b) code repeat check
c) code redundancy check
d) cyclic repeat check
Câu 70: Which of the following is a data link protocol?
a) ethernet
b) point to point protocol
c) hdlc
d) all of the mentioned
Câu 71: Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Câu 72: The technique of temporarily delaying outgoing acknowledgements so that they can be hooked
onto the next outgoing data frame is called
a) piggybacking
b) cyclic redundancy check
c) fletcher’s checksum
d) parity check
Câu 73: Transport layer aggregates data from different applications into a single stream before passing it
to
a) network layer
b) data link layer
c) application layer
d) physical layer
Câu 74: Which of the following are transport layer protocols used in networking?
a) TCP and FTP
b) UDP and HTTP
c) TCP and UDP
d) HTTP and FTP
Câu 75: User datagram protocol is called connectionless because
a) all UDP packets are treated independently by transport layer
b) it sends data as a stream of related packets
c) it is received in the same order as sent order
d) it sends data very quickly
Câu 76: Transmission control protocol
a) is a connection-oriented protocol
b) uses a three way handshake to establish a connection
c) receives data from application as a single stream
d) all of the mentioned
Câu 77: An endpoint of an inter-process communication flow across a computer network is called
a) socket
b) pipe
c) port
d) machine
Câu 78: Socket-style API for windows is called
a) wsock
b) winsock
c) wins
d) sockwi
Câu 79: Which one of the following is a version of UDP with congestion control?
a) datagram congestion control protocol
b) stream control transmission protocol
c) structured stream transport
d) user congestion control protocol
Câu 80: A is a TCP name for a transport service access point.
a) port
b) pipe
c) node
d) protocol
Câu 81: Transport layer protocols deals with
a) application to application communication
b) process to process communication
c) node to node communication
d) man to man communication
Câu 82: Which of the following is a transport layer protocol?
a) stream control transmission protocol
b) internet control message protocol
c) neighbor discovery protocol
d) dynamic host configuration protocol
Câu 83: The network layer is concerned with of data.
a) bits
b) frames
c) packets
d) bytes
Câu 84:
Which one of
the following
is not a
function of
network
layer?
a) routing
b) inter-networking
c) congestion control
d) error control
Câu 85: A 4 byte IP address consists of
a) only network address
b) only host address
c) network address & host address
d) network address & MAC address
Câu 86: In virtual circuit network
each packet contains
a) full source and destination address
b) a short VC number
c) only source address
d) only destination address
Câu 87: Which of the
following routing
algorithms can be used for
network layer design?
a) shortest path algorithm
b) distance vector routing
c) link state routing
d) all of the mentioned
Câu 88: Which of the
following is not
correct in relation to
multi-destination
routing?
a) is same as broadcast routing
b) contains the list of all destinations
c) data is not sent by packets
d) there are multiple receivers
Câu 89: A subset of a network
that includes all the routers
but contains no loops is called
a) spanning tree
b) spider structure
c) spider tree
d) special tree
Câu 90:
Which one of
the following
algorithm is
not used for
congestion
control?
a) traffic aware routing
b) admission control
c) load shedding
d) routing information protocol
Câu 91: The network layer
protocol for internet is
a) ethernet
b) internet protocol
c) hypertext transfer protocol
d) file transfer protocol
Câu 92: ICMP is
primarily used for
a) error and diagnostic functions
b) addressing
c) forwarding
d) routing
Câu 93:
Which is
not a
applicatio
n layer
protocol?
a) HTTP
b) SMTP
c) FTP
d) TCP
Câu 94:
The
packet of
informati
on at the
applicatio
n layer is
called
a) Packet
b) Message
c) Segment
d) Frame
Câu 95:
Which
one of
the
following
is an
architect
ure
paradigm
s?
a) Peer to peer
b) Client-server
c) HTTP
d) Both Peer-to-Peer & Client-Server
Câu 96: Application developer has
permission to decide the following
on transport layer side
a) Transport layer protocol
b) Maximum buffer size
c) Both Transport layer protocol and Maximum buffer size
d) None of the mentioned
Câu 97: Application layer
offers service.
a) End to end
b) Process to process
c) Both End to end and Process to process
d) None of the mentioned
Câu 98: E-mail is
a) Loss-tolerant application
b) Bandwidth-sensitive application
c) Elastic application
d) None of the mentioned
Câu 99: Pick the odd one
out.
a) File transfer
b) File download
c) E-mail
d) Interactive games
Câu 100: Which of
the following is an
application layer
service?
a) Network virtual terminal
b) File transfer, access, and management
c) Mail service
d) All of the mentioned
e) Câu 101: To
deliver a message to
the correct
application program
running on a host,
the
address must be consulted.
a) IP
b) MAC
c) Port
d) None of the mentioned
Câu 102: Which is a time-
sensitive service?
a) File transfer
b) File download
c) E-mail
d) Internet telephony
Câu 103: Transport
services available to
applications in one
or another form
a) Reliable data transfer
b) Timing
c) Security
d) All of the mentioned
Câu 104: Electronic
mail uses which
Application layer
protocol?
a) SMTP
b) HTTP
c) FTP
d) SIP
Câu 105:
The
entire
hostnam
e has a
maximu
m of
a) 255 characters
b) 127 characters
c) 63 characters
d) 31 characters
Câu 106: A DNS
client is called
a) DNS updater
b) DNS resolver
c) DNS handler
d) none of the mentioned
Câu 107: Servers handle
requests for other
domains
a) directly
b) by contacting remote DNS server
c) it is not possible
d) none of the mentioned
Câu 108: DNS database
contains
a) name server records
b) hostname-to-address records
c) hostname aliases
d) all of the mentioned
Câu 109: If a server
has no clue about
where to find the
address for a
hostname then
a) server asks to the root server
b) server asks to its adjcent server
c) request is not processed
d) none of the mentioned
Câu 110: Which one of
the following allows
client to update their
DNS entry as their IP
address change?
a) dynamic DNS
b) mail transfer agent
c) authoritative name server
d) none of the mentioned
Câu 111: Wildcard
domain names start with
label
a) @
b) *
c) &
d) #
Câu 112: The right to use a domain name is delegated by domain name registers which are accredited by
a) internet architecture board
b) internet society
c) internet research task force
d) internet corporation for assigned names and numbers
Câu 113: The domain name system is maintained by
Câu 124: The TTL field has value 10. How many routers (max) can process this datagram?
a) 11
b) 5
c) 10
d) 1
Câu 125: If the value in protocol field is 17, the transport layer protocol used is
a) TCP
b) UDP
c) ICMP
d) IGMP
Câu 126: The data field cannot carry which of the following?
a) TCP segment
b) UDP segment
c) ICMP messages
d) SMTP messages
Câu 127: What should be the flag value to indicate the last fragment?
a) 0
b) 1
c) TTl value
d) Protocol field value
Câu 134: In classless addressing, there are no classes but addresses are still granted in
a) IPs
b) Blocks
c) Codes
d) Sizes
Câu 136: First address in a block is used as network address that represents the
a) Class Network
b) Entity
c) Organization
d) Codes
Câu 137: In classful addressing, a large part of available addresses are
a) Organized
b) Blocked
c) Wasted
d) Communicated
Câu 142: If there are N routers from source to destination, the total end to end delay in sending packet
P(L-> number of bits in the packet R-> transmission rate) is equal to
a) N
b) (N*L)/R
c) (2N*L)/R
d) L/R
Câu 143: What are the Methods to move data through a network of links and switches?
a) Packet switching and Line switching
b) Circuit switching and Line switching
c) Line switching and bit switching
d) Packet switching and Circuit
switching
Câu 144: The required resources for communication between end systems are reserved for the duration
of the session between end systems in method.
a) Packet switching
b) Circuit switching
c) Line switching
d) Frequency switching
Câu 145: As the resources are reserved between two communicating end systems in circuit switching,
is achieved.
a) authentication
b) guaranteed constant rate
c) reliability
d) store and forward
Câu 148: allows LAN users to share computer programs and data.
a) Communication server
b) Print server
c) File server
d) Network
Câu 149: With respect to physical media, STP cables stands for
a) Shielded Twisted Pair Cable
b) Spanning Tree Protocol Cable
c) Static Transport Protocol Cable
d) Shielded Two Power Cable
Câu 150: A standalone program that has been modified to work on a LAN by including concurrency
controls such as file and record locking is an example of
a) LAN intrinsic software
b) LAN aware software
c) Groupware
d) LAN ignorant software
Câu 151: The portion of LAN management software restricts access, records user activities
and audit data, etc.
a) Configuration management
b) Security management
c) Performance management
d) Recovery management
Câu 152: What is the max length of the Shielded twisted pair cable?
a) 100 ft
b) 200 ft
c) 100 m
d) 200 m
Câu 154: Which of the following architecture uses the CSMA/CD access method?
a) ARC net
b) Ethernet
c) Router
d) STP server
Câu 155: Which type of Ethernet framing is used for TCP/IP and DEC net?
a) Ethernet 802.3
b) Ethernet 802.2
c) Ethernet II
d) Ethernet SNAP
Câu 156: Novell’s implementation of RIP updates routing tables every seconds.
a) 60
b) 90
c) 10
d) 30
Câu 158: The computation of the shortest path in OSPF is usually done by
a) Bellman-ford algorithm
b) Routing information protocol
c) Dijkstra’s algorithm
d) Distance vector routing
Câu 167: For default gateway, which of following commands will you use on a Cisco router?
a) IP default network
b) IP default gateway
c) IP default route
d) Default network
Câu 169: EIGRP uses the algorithm for finding shortest path.
a) SPF
b) DUAL
c) Linkstat
d) Djikstra’s
Câu 170: In EIGRP best path is known as the successor, where as backup path is known as
a) Feasible successor
b) Back-up route
c) Default route
d) There is no backup route in EIGRP
Câu 171: DHCP (dynamic host configuration protocol) provides to the client.
a) IP address
b) MAC address
c) Url
d) None of the mentioned
Câu 175: DHCP uses UDP port for sending data to the server.
a) 66
b) 67
c) 68
d) 69
Câu 176: The DHCP server can provide the of the IP addresses.
a) dynamic allocation
b) automatic allocation
c) static allocation
d) all of the mentioned
Câu 177: DHCP client and servers on the same subnet communicate via
a) UDP broadcast
b) UDP unicast
c) TCP broadcast
d) TCP unicast
Câu 178: After obtaining the IP address, to prevent the IP conflict the client may use
a) internet relay chat
b) broader gateway protocol
c) address resolution protocol
d) none of the mentioned
Câu 180: If DHCP snooping is configured on a LAN switch, then clients having specific can access
the network.
a) MAC address
b) IP address
c) Both MAC address and IP address
d) None of the mentioned
Câu 181: You are creating a network for a small business with only four employees. Because employees
often leave the office to visit clients, a minimum of one person is in the office and using a computer
at any given time. Currently there are two computers in the office, but the company is willing to
purchase more if needed. Based on this information, what is the minimum number of computers that
you’ll need to create a network?
A. One
B. Two
C. Three
D. Four
Câu 182: A new intranet has been created in your organization, and includes an FTP site to download
files and a news server for sharing information. The network is internetworked with a network
belonging to a subsidiary of the company. The subsidiary’s network uses Apple computers, and uses
AppleTalk as a network protocol. To access the intranet, which of the following protocols would need
to be installed on your computer?
A. IPX/SPX
B. NWLink
C. TCP/IP
D. AppleTalk
Câu 183: The LAN used by your organization is on the single floor of a building. The network has servers
and other resources that are kept in a secure server room. You are the only network administrator in
the organization and have sole responsibility of managing these resources and administration of
network security for all of the users who are distributed throughout the network. What type of
network model is being used?
A. Centralized
B. Decentralized
C. Distributed
D. Peer-to-Peer
Câu 184: Your company’s network is on several floors of a building. Because of the amount of data being
stored, there are three file servers, a Web server for the intranet, an e-mail server for internal e-mail,
and a SQL server that is used for several databases that have been developed in house. Because of
security reasons, floppy disks and other devices to transfer or transmit data to and from the
computer have been removed and aren’t permitted. What type of network model is being used?
A. Client/Server
B. Peer-to-Peer
C. MAN
D. PAN
Câu 185: Your company’s network spans three buildings that are within a mile of one another. Three
servers are kept in a secure server room in the building where your office is located, while each other
building has a server that is locked in a closet. Users at each of these locations have been trained on
how to replace the backup tapes in these servers and have the ability to give permissions for user
accounts to print to specific printers in those locations. You solely control other aspects of security,
inclusive to password requirements, and access to folders on these servers. What type of network
model is being used?
A. Centralized
B. Decentralized
C. P2P
D. Peer-to-Peer
Câu 186: A company has hired you to create a network for their small business. Security isn’t an issue,
and there isn’t enough money to hire or train a permanent network administrator. Users of the
network routinely work on similar projects, and need to access one another’s data on a regular basis.
What type of network model will you use?
A. Client/Server
B. Peer-to-Peer
C. Client
D. Server
Câu 187: A company has multiple offices that are internetworked. Office A has a single computer that
has the ability to dial into the Internet, but isn’t connected to the other offices. Office B is in another
part of the country from the other offices, but doesn’t have its network interconnected to the other
offices. Office C and D are in separate states, but have a dedicated connection between them. Office
C has 20 computers that access each other’s machines, and provide services and data to one another.
Office D has 50 computers that log onto the network using a single server. Based on this information,
which of the Offices are part of a LAN and a WAN?
A. Office A and B
B. Office B and C
C. Office C and D
D. The entire network (Office A, B, C, and D)
Câu 188: An organization has offices in two countries. Office A is a small field office with two networked
computers and is internetworked with Office B that is across the road and has 10 networked
computers. Because they are a subsidiary of the main company and perform different services from
the rest of the organization, neither of these offices have been internetworked with the other offices,
and is awaiting Internet connectivity to be provided next month. Office C is another field office that
has a single computer, isn’t networked with other offices, and only has an Internet connection. Office
D is the headquarters of the company, has 100 network users who are awaiting Internet connectivity
to be added to the network, and has a network connection to Office E in London, which is their
European office. Based on this information, which of the offices is connected to the largest WAN?
A. Office A
B. Office B
C. Office C
D. Office D
Câu 189: A company wants to create a LAN between two networks in different cities. To connect them,
you want to have the fastest possible connection to meet their needs. Each network has massive
amounts of data being sent between floors of their existing networked building, and you determine
that at maximum, 1 Mbps of data will need to be transmitted during normal business hours.
Although they are a large business, and cost is not a major issue, they don’t want to waste money on
getting a solution with a bandwidth that’s higher than they need. What type of connection will you
choose in connecting these networks?
A. Dial-up modem
B. ISDN
C. T1
D. T3
Câu 190: A company has several offices that are networked together across the city. Each of the sales
representatives uses PDAs to keep track of appointments with clients. The company has just
implemented a new system where the appointments taken by receptionists are automatically
uploaded to the PDAs whenever the sales staff enters the main reception area. What types of
networks are being used in this environment? Choose all that apply.
A. MAN
B. SAN
C. CAN
D. PAN
Câu 191: You have been hired by a company that uses a topology shown in Figure 1.8. In looking at the
physical layout of your network, which of the following types of topologies is being used?
A. Bus
B. Star
C. Mesh
D. Ring
Figure 1.8.
Câu 192: You receive a call that the network is down. In this network, all of the computers are
connected together using a single cable, which they are connected to using T-Connectors. Looking at
the situation, you find that there is no break through the trunk. Which of the following is most likely
the cause of the problem?
A. A failed network card.
B. One of the computers is turned off.
C. T-connectors are missing from the ends of the cable.
D. Terminators are missing from the ends of the cable.
Câu 193: Your network uses cells to send and receive data to and from computers. This allows
computers in different buildings to be networked together, so they can access data from servers in
either building. A topology map has been created, using circles to identify the areas that computers
can be placed to access the network. Based on this information, which of the following topologies is
being used?
A. Star
B. Mesh
C. Wireless
D. Ring
Câu 194: You are training a new member of the IT Staff, and decide to explain the topology of the
existing network, shown in the Figure 1.9. What topology is currently being used?
A. Bus
B. Star
C. Mesh
D. Ring
Figure 1.9.
Câu 195: Your network has 10 computers that are networked together using a star topology. Which of
the following is a possible point of failure for this topology, which could bring down the entire
network?
A. Cable
B. Network card
C. T-Connector
D. Switch
Câu 196: You are the network administrator of a 10BaseT network. On the weekend, when few people
are working, you run 110 m of cable to a new server that is being used as a file server. The cable is
installed in a new section of the building, where no cabling currently exists. When you attempt to
access files on the server, they are experiencing errors and corrupt data. Which of the following is
most likely the cause of this problem?
A. Bandwidth
B. Attenuation
C. Crosstalk from a neighboring cable
D. CSMA/CD issues
Câu 197: Your company uses UTP cable for all of its network connections including workstations and
servers. The users have reported problems connecting to one of the most important servers on the
network and you have been called in to look at it, due to a possible physical security breach by a
former employee. While examining the server, you find that a small battery-powered motor has been
placed and is running next to the server’s network connection. What is causing the network problem?
A. Electromagnetic interference
B. Static electricity
C. Transceivers
D. Unknown, but the motor is probably unrelated
Câu 198: You are designing a new network and are concerned about interference from other wires.
Which of the following is most susceptible to transmission errors due to crosstalk?
A. Coaxial
B. UTP
C. STP
D. Fiber optic
Câu 199: You are designing a new network for a grocery store. Cabling will have to run along the ceiling,
where there are a significant number of florescent lights. You are concerned about interference from
these lights. Which of the following cable types could be used, which would not be susceptible to this
type of interference?
A. Coaxial
B. UTP
C. STP
D. Fiber optic
Câu 200: Your network uses vampire taps and AUI connectors to access data from the network cable.
Which of the following cabling types is being used?
A. Thinnet
B. Thicknet
C. STP
D. Fiber optic