Question 12 WLANs can be categorized based on their use of wireless APs. The three main categories are ________, ________, and ________. Question 13 Which is NOT a security threat for WLAN’s? Question 14 Which of the following is one of the broad categories of wireless antennae that are based on coverage? Question 15 The Wide Area Network (WAN) design below represents what type of fault-tolerant network design?
11. C. The PCs use two wires to create a circuit to send data from PC1 to PC2. 12. B. Ethernet defines MAC addresses, but when used in a TCP/IP network, it does not use the addresses, instead relying on IP addresses. 13.
Week 4 Knowledge Check Concepts Telecommunications Networks Networking Technologies The Internet Wireless Technologies Cellular Technologies Mastery 100% 67% 100% 100% 67% Questions 1 2 3 Score: 13/15 4 5 6 7 8 9 10 11 12 13 14 15 Concept: Telecommunications Networks Concepts Telecommunication s Networks Mastery 100% Questions 1 2 3 1. What are the principal components of a telecommunications network? A. Computers, clientâserver devices, and smart phones B. Voice or data computers, network interfaces, and transmission medium C. Modems, transmission links, and wireless access points D. TCP/IP software, modems, and transmission links Correct!
Routers R1 and R2 are directly connected via their serial interfaces and are both running the EIGRP routing protocol. R1 and R2 can ping the directly connected serial interface of their neighbor, but they cannot form an EIGRP neighbor adjacency. What action should be taken to solve this problem? Configure both routers with the same EIGRP process
Which of the following is the most likely reason why EMI from one wire does not affect the electrical behavior of another wire inside the same cable? b 7. Which of the following facts are in common between both of the Ethernet standards discussed in this chapter, 10BASE-T and 100BASE-T? (Choose two answers.) a,b 8.
2. Which layer of the TCP/IP model processes requests from hosts to make sure a connection is made to the appropriate port? i. Application Layer 3. What are well known ports?
I Exercise 8.1.1 Class A networks are defined as those that use only the first byte ( also called an octet) of the address as the network identifier. The rest of the address is considered the host identifier. In this type of network, the number of possible networks is much smaller than the number of hosts that can be connected to the same network. If the IP address in Figure 8- 1 belongs to a class A network, what is the network ID and what is the host ID? 110 (network ID), 10.10.1 (host) What are the binary values of the host ID and the network ID?
d. The two companies must each connect to a Tier 1 ISP. Answer: B. to send packets through the Internet, a company needs just one connection to an ISP. The ISP then commits to having connections to the rest of the Internet. The two companies do not need a connection to each other, or even to the same ISP. 2.
A Primitive is a single copy of a component in a PLD file. T 3. We can let the Quartus II software assign pin numbers to make the best use of the internal resources; unless specific pin locations are required. T 4. A volatile device does not hold its programmed information if power to the device is removed.
D. The binary equivalent to 123456789 8. Which of the following is not a feature of a file system that might be used with a hard disk drive? A.An actuator arm 9. Which of the following are some of the important features supplies by files as defined by a computer OS? (Choose three answers.)A.