The 1000base-lx utilizes light with what wavelength?

Online tests are one of the most popular ways to test knowledge on the subject “Fundamentals of Network Technologies”. Probably everyone had to take the test, but not everyone did it on the Internet. Let’s see how the online tests differ from the usual ones that are performed on a piece of paper, and what you need to know to successfully pass the test through special programs and the Internet.

Questions from the Network Cabling sectionAnswers to the questions of the Network Cabling section802.11ac Wave 2 devices can theoretically support how much maximum throughput?3.47 GbpsA Fast Ethernet connection utilizes what pins on an RJ-45 plug?1, 2, 3, 6A junior administrator is having issues connecting to a router’s console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?The cable must be a rollover cable.A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?Fiber cleaverA wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?probe frameAn application is installed on computer A that uses TCP port 45000. The application is currently closed. What will computer A do if it accepts a SYN request from computer B over the TCP protocol?Since the application is closed, the port is also closed. Therefore, when receiving any segment on a closed port, computer A will send an RST in response.An application is installed on computer A that uses UDP port 45000. The application is currently closed. What will computer A do if it accepts a segment from computer B over the UDP protocol?Since the application is closed, port 45000 is also closed. Computer A, having accepted the UDP segment, will send the ICMP notification “Destination port unreachable”to the computer.At what layer of the OSI model do the 802.11 standards vary?Physical layerBidirectional transceivers utilize what technology to separate the data in each direction?wavelength division multiplexingBoth 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?40kmBroadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?RG-6Diffraction has what affect on a wireless signal’s propagation?The signal is split into secondary waves that continue in the direction in which they split.Due to what multiplexity (multichannel) is achieved in computer systems?By using ports. There are 65535 ports in total. If, for example, we take a web server running only on port 80, then theoretically up to 65535 connections from one computer can be organized with it. This is achieved due to the fact that the destination port is always equal to 80, and the source port can be equal to any value of 65535 ports.Healing messages are a feature of what smart home protocol?Z-WaveHow does refraction affect the propagation of a wireless transmission?It distorts the signal as it travels into and through a different transmission medium.How does the 802.11 data frame indicate how a large packet should be fragmented?The sequence control field indicates how packets will be subdivided.How many data streams are used in 802.11ac Wave 2 devices?4 data streamsIf you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?Wi-Fi analyzerIn a coaxial cabling, what does the RG rating measure?The materials used for shielding and conducting cores.In an 802.11 data frame, what is the maximum amount of data that can be sent?2312 bytesIn an 802.11 data frame, what is the size of the frame check sequence field?6 bytesIn IEEE terminology, a group of stations that share an access point are said to be part of which of the following?basic service setIn Linux, what command can be used for viewing and setting wireless interface parameters?iwconfigNear-field communication devices send data at what fixed frequency?13.56 MHzNode A initiated a connection with node B. After a while, node A received a SYN, ACK. What TCP state will node A be in after receiving such a response?SYN, ACK is sent only in response to a SYN request. Node A, after sending a SYN request, has entered the SYN-SENT state and is waiting for SYN, ACK. After receiving SYN, ACK node A does not change its state, that is, it remains in SYN-SENT. Only after sending the ACK, the state from SYN-SENT changes to ESTABLISHED.Node A sent a SYN request to node B. What is the length of the segment?When establishing and terminating connections, the segment length is always 0.Node A sent node B 5 segments of length 100, 200, 50, 300, 100 bytes, respectively. The ISN of the first segment is 0. What ACK number will node B respond to node A?If all segments are received without errors, then node B in the ACK will request the next “portion” of segments, that is, the sum of the lengths of all segments and plus 1 segment. In our case 100 + 200 + 50 + 300 + 100 + 1 = 751.Noise that can degrade or distort a signal on a network is measured with what unit?decibelsPoE+ devices are defined by what IEEE standard?802.3atSignals that can travel in only one direction on a medium are referred to as what type of signal?simplexT/F: A continuity tester should not be used on a live network segment.TrueT/F: A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port.FalseT/F: A short circuit is one where needed connections are missing, such as when a wire breaks.FalseT/F: A time domain reflectometer sends a signal and analyzes the return signal’s change in amplitude to determine where cable imperfections may exist.TrueT/F: A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable.TrueT/F: All wireless signals are carried through the air by electromagnetic waves.TrueT/F: An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.TrueT/F: Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.FalseT/F: In order to achieve 1000Base-T over CAT5e cable, 2 pairs of copper are needed.FalseT/F: Infrared technology utilizes an LED that emits light with shorter wavelengths than red light.FalseT/F: Latency on data networks is based on a calculation of a packet’s round trip time (RTT).TrueT/F: Multimode fiber contains a core that is larger than a single mode fiber core.TrueT/F: NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.FalseT/F: RG-59 is more expensive than RG-6, but has better resistance to attenuation.FalseT/F: The LLC sublayer is primarily concerned with managing MAC addresses in message frames.FalseT/F: The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.TrueT/F: The ST and SC fiber connectors are the most commonly found connectors due to their smaller sizes.FalseT/F: The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.TrueT/F: The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.TrueT/F: Z-Wave transmissions have a range of up to 50m per hop, and can tolerate up to 8 hops through repeaters.FalseTelephone connections follow what registered jack standard?registered jack 11 (RJ-11)The 1000Base-LX utilizes light with what wavelength?1300 nanometersThe 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)The figure shows a fragment of a network dump. What useful information can be extracted from it? (Click on the picture to enlarge)It can be seen that the local address 192.168.0.6 sent an Echo Request to the address 94.100.180.202. It can also be seen that the ICMP message Time to live exceeded was received from the node with the address 86.49.1.89. The TTL in this fragment is 3. Most likely, the local host has run the traceroute 94.100.180.202 command, and node 86.49.1.89 is the third detected node on the path of the packet to the destination device.The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?multiple input-multiple output (MIMO)The wireless spectrum, as defined by the FCC, spans between which two frequencies?9 kHz and 300 GHzUpon connecting to a Wi-Fi network, you’re redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?captive portalUtilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?statistical time division multiplexingWhat 802.11 frame type is involved in association and reassociation, including probe and beacon frames?management framesWhat happens if the sending node includes its IP address as the receiving node? The network card is turned on and connected to the network. What happens if the card is disconnected from the network?In this case, the packet will not reach the physical layer, that is, it will not leave the network device. For example, if you run the ping command to your own address, the user will receive an Echo-Reply from his own computer. Therefore, it does not matter whether the network card is connected to the network or not. However, the result depends on which service or service the user accesses on the local computer. For example, a web server is running on the computer, then you can enter the address of your computer in the browser and a web page will open. If the server is not running, the page will not open. The same applies to other services and programs.What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?10GBase-TWhat is the industry standard angle for an Angle Polished Connector (APC)?8 degreesWhat is the length of the UDP header?8 bytesWhat is the maximum supported throughput of a CAT6 cable?10 GbpsWhat is the minimum category of UTP cable required in order to support Gigabit speeds?Cat 5eWhat is the OSI model needed for?The OSI model was developed to simplify the interaction of various network devices with each other. In addition, this model allows us to lead to a unified standardization of network protocols running on equipment from different manufacturers. Each level describes certain processes and actions, and this division allows you to better and faster study the operation of protocols and devices.What is the point of having both UDP and TCP protocols, when TCP can successfully perform all UDP functions?TCP is responsible for reliable data delivery, unlike UDP. At the same time, due to its features, TCP is a much slower protocol than UDP. There are various applications. Some require a reliable connection for their work, even if it is slow, while others, on the contrary, require a high transfer speed, even if it is an unreliable connection. For example, financial transactions require a reliable and secure connection. The transmission of video and audio data is critical to the transmission speed, so reliable delivery can be neglected in a certain sense. Therefore, it is inappropriate to say which protocol is better and which is better. Both were designed to solve specific tasks.What is the process of adding headers to data when passing them from one OSI layer to another?EncapsulationWhat is the purpose of the Layer 2 LLC sublayer?It is used to handle multiplexing, flow and error control, and reliability.What kind of tool can you use to measure voltage on a cable length?multimeterWhat level does the segment form?Transport levelWhat level forms the frame?Data Link LayerWhat multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?coarse wavelength division multiplexingWhat optional protocol can be used in 802.11 to reserve the medium for one node’s use?RTS/CTS (Request to Send/Clear to Send)What scenario describes an evil twin attack?A malicious access point is configured with the SSID of a non-malicious public access point.What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?beacon frameWhat statement correctly describes “jitter”?Jitter is what happens when packets experience varying amounts of delay and arrive out of order.What statement describes a transmission flaw that is occurring due to attenuation?A customer modem is continuously losing signal due to large distance from the transmitting device.What statement regarding the Power Over Ethernet standards is inaccurate?Power over Ethernet requires CAT6 or better copper cable.What type of device can be used to assess the quality of a wireless signal?spectrum analyzerWhat type of network is the most reliable?Full MeshWhen terminating an Ethernet cable, about how far should the cable sheath extend into the plug?3/8 inchWhen troubleshooting wireless issues, what statement is accurate?Access points that use overlapping channels can cause interference with each other if they are too close.When using RFID, what is an ARPT (Active Reader Passive Tag)?It is a tag that is activated by an active reader, and uses power from the reader’s radio to power its transmission.When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?white/orange, orange, white/green, blue, white/blue, green, white/brown, brownWhich 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?control framesWhich Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?Class 1Which of the following statements about fiber-optic cabling is accurate?Light experiences virtually no resistance when traveling through glass.Which of the following statements correctly describes the SFP+ transceiver?SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.Which of the following statements regarding the 802.11ac standard is NOT accurate?802.11ac access points function more like a hub than a switch.Which OSI layer is responsible for reliable data delivery?Transport levelWhich statement accurately describes what near end crosstalk (NEXT) is?NEXT is crosstalk that occurs between wire pairs near the source of a signal.Why should you terminate coaxial cable with connectors that are rated for the exact cable type?A mismatched connector will have different impedance ratings, causing data errors.You are troubleshooting a client’s wireless networking issue. Which of the following will prevent the client from connecting to the network?The client has a wireless profile configured for the “campus” SSID, but the access point is broadcasting the “CAMPUS” SSID.You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?TIA/EIA 568AYou’ve been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?local connector (LC)

Which wavelength is used by 1000baselx fiber optic cabling?

The “LX” in 1000BASE-LX stands for long wavelength, indicating that this version of Gigabit Ethernet is intended for use with long-wavelength transmissions (1270–1355 nm) over long cable runs of fiber optic cabling.

What type of fiber optic cable is used in a 1000BASE

1000Base-LX uses single mode fiber (SMF) optic cable instead of copper twisted pair cable. The letter L in 1000Base-LX stands for Long. 1000Base-LX Gigabit Ethernet uses single mode fiber optic cables and long-wavelength light. Documents say that it can send data up to 5 kilometers distance.

Which type of cable is used in the 1000BASE SX standard?

1000BASE-SX is a short laser wavelength on multimode fiber optic cable for a maximum length of 550 m. 1000BASE-LX/LH/LX10 is a long wavelength for a long-haul fiber optic cable for a maximum length of 10 kilometers (km). 1000BASE-ZX is an extended wavelength single-mode optical fiber for up to 100 km.

How many cable pairs are needed for 1000BASE

You need to use 4 pairs on Cat5e cable for 1000Base-T transmission. This adheres to IEEE 802.3ab (gigabit ethernet). Cat5e cable can be run up to 328 feet and is suitable for speeds up to gigabit.