3D152 Volume 2 UREs

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bryansomeone
B
Bryansomeone
Community Contributor
Quizzes Created: 2 | Total Attempts: 727
Questions: 93 | Attempts: 336

Settings

3D152 Volume 2 UREs

• 1.

What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

• A.

A code set is established.

• B.

A word is created.

• C.

An octet is formed.

• D.

Nothing.

A. A code set is established.
Explanation
"The more bits that are added to a digital signal, the greater the number of choices to be made. If the sender and receiver arrange these bits in a preset sequence that is understood, a code set is established." Page 1-1

Rate this question:

• 2.

How many possible symbols can 4 bits represent?

• A.

2.

• B.

4.

• C.

8.

• D.

16.

D. 16.
Explanation
"One bit can indicate only two possible messages. When a second bit is added, the number of possible messages increases to four (22). A further increase to 3 bits increases the possibilities to eight different choices (23). The number of bits (called X) available can have 2 to X possible combinations to represent
information. For example, a code with 8 bits (28) can represent 256 possible messages or symbols. Generally 8 bits of data refers to a unit of data transmission known as a “byte.”" Page 1-2

Rate this question:

• 3.

In networking, a byte is identified as a/an

• A.

Bit.

• B.

Word.

• C.

Octet.

• D.

Letter.

C. Octet.
Explanation
"Normally bytes are 8 (binary) data bits in length. However, since some systems use bytes that are longer than 8 bits, generally, the term octet is used when referring to networking." Page 1-2

Rate this question:

• 4.

What organization sets important computer networking wiring standards for residential and commercial network cabling?

• A.

Electronic Industries Alliance (EIA).

• B.

Telecommunications Industry Association (TIA).

• C.

The American National Standards Institute (ANSI).

• D.

The National Institute of Standards and Technology (NIST).

A. Electronic Industries Alliance (EIA).
Explanation
"An important computer networking function of the EIA is the series of standards for residential and commercial network cabling that are collectively known as the Electronic Industries Alliance/ Telecommunications Industry Association (EIA/TIA) wiring standards." Page 1-3

Rate this question:

• 5.

What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

• A.

568A.

• B.

569A.

• C.

570A.

• D.

606A.

A. 568A.
Explanation
"EIA/TIA 568A& B: Commercial Building Telecommunications Cabling Standard." Page 1-4

Rate this question:

• 6.

Which of the following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?

• A.

E-carrier.

• B.

Structured query language.

• C.

International Organization for Standardization.

• D.

American Standard Code for Information Interchange.

A. E-carrier.
Explanation
"E-carrier is the digital telecommunications services backbone system of Europe–a format standardized by the International Telecommunication Union (ITU)." Page 1-4

Rate this question:

• 7.

There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

• A.

Internet Engineering Task Force (IETF).

• B.

Institute of Electrical and Electronics Engineers (IEEE).

• C.

European Telecommunications Standards Institute (ETSI).

• D.

Internet Corporation for Assigned Names and Numbers (ICANN).

B. Institute of Electrical and Electronics Engineers (IEEE).
Explanation
"IEEE is a worldwide nonprofit association of technical professionals that promotes the development of standards and acts as a catalyst for new technology in all aspects of the engineering industry, including computer networking, telecommunications, electric power, aerospace, and consumer electronics." Page 1-5

Rate this question:

• 8.

A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

• A.

Internet Engineering Task Force (IETF).

• B.

Institute of Electrical and Electronics Engineers (IEEE).

• C.

European Telecommunications Standards Institute (ETSI).

• D.

Internet Corporation for Assigned Names and Numbers (ICANN).

B. Institute of Electrical and Electronics Engineers (IEEE).
Explanation
"A major contribution of the IEEE in the field of computer networking is Project 802; a collection of standards for local area network (LAN) architectures, protocols, and technologies. The 802 specifications define the operation of the physical network components—cabling, network adapters, and connectivity devices such as routers and switches." Page 1-5

Rate this question:

• 9.

The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

• A.

Internet Engineering Task Force (IETF).

• B.

International Telecommunication Union (ITU).

• C.

Institute of Electrical and Electronics Engineers (IEEE).

• D.

International Telegraph and Telephone Consultative Committee (CCITT).

B. International Telecommunication Union (ITU).
Explanation
"The ITU is the “parent” organization for all other telecommunications organizations. ITU does not usually specify things itself, but merely coordinates the specification work of others. It may set the goals for some standardization work, but local organizations (ETSI, TIA, etc.) often do the actual work. In many cases, ITU works as a catalyst for future standardization work. ITU is a United Nations organization headquartered in Geneva, Switzerland." Page 1-6

Rate this question:

• 10.

What organization is responsible for the X-series and V-series standards?

• A.

Internet Engineering Task Force (IETF).

• B.

International Telecommunication Union (ITU).

• C.

Institute of Electrical and Electronics Engineers (IEEE).

• D.

International Telecommunication Union Telecommunications Standardization Sector (ITU-T).

D. International Telecommunication Union Telecommunications Standardization Sector (ITU-T).
Explanation
"The ITU-T is responsible for a number of important international networking and communication standards, including the following X and V series standards." Page 1-6

Rate this question:

• 11.

Which series of standards are recommended for data transmission using the telephone network?

• A.

T.

• B.

V.

• C.

X.

• D.

Z.

B. V.
Explanation
"The V-series is a code designation used to list the recommendations for data transmission using the telephone network." Page 1-7

Rate this question:

• 12.

The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

• A.

Internet Engineering Task Force (IETF).

• B.

International Telecommunication Union (ITU).

• C.

International Organization for Standardization (ISO).

• D.

Institute of Electrical and Electronics Engineers (IEEE).

C. International Organization for Standardization (ISO).
Explanation
"ISO’s major contribution to networking has been the definition of the OSI Reference Model, which is a layered architecture model for communication between open network systems." Page 1-7

Rate this question:

• 13.

Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS–232–C standard prescribes bipolar-voltage serial data transmission?

• A.

25.

• B.

50.

• C.

100.

• D.

200.

B. 50.
Explanation
"Normally cable between the two is no longer than 50 feet or 15 meters, but may be longer if load capacitance requirements are met." Page 1-8

Rate this question:

• 14.

Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

• A.

RS–232–C.

• B.

RS–423.

• C.

RS–485.

• D.

RS–530.

D. RS–530.
Explanation
"The RS–530 is also based on a 25-pin connection (fig. 1–2). It works in either balanced or unbalanced electrical circuits." Page 1-11

Rate this question:

• 15.

What transmission rates does Electronic Industries Alliance (EIA) RS–530 accommodate?

• A.

20 kilobits per second (Kbps) to 200 Kbps.

• B.

20 Kbps to 2 megabits per second (Mbps).

• C.

20 Kbps to 20 Mbps.

• D.

20 Kbps to 22 Mbps.

B. 20 Kbps to 2 megabits per second (Mbps).
Explanation
"The RS-530 accommodates data transmission rates from 20 Kbps to 2 Mbps; and its maximum distance depends on which electrical interface is used." Page 1-11

Rate this question:

• 16.

What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

• A.

High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC).

• B.

Logical Link Control (LLC) and Media Access Control (MAC).

• C.

Data communications equipment (DCE) and data terminal equipment (DTE).

• D.

Electronic Industries Alliance (EIA) RS–232 and RS–530.

B. Logical Link Control (LLC) and Media Access Control (MAC).
Explanation
"The IEEE has subdivided the data link layer into two sublayers: LLC and media access control (MAC)." Page 1-14

Rate this question:

• 17.

At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

• A.

Application.

• B.

Session.

• C.

Presentation.

• D.

Transport.

C. Presentation.
Explanation
"Some examples of presentation layer coding and conversion schemes include common data representation formats, conversion of character representation formats, common data compression schemes, and common data encryption schemes." Page 1-15

Rate this question:

• 18.

What Open System Interconnect (OSI) layer is closest to the end user?

• A.

Application.

• B.

Session.

• C.

Presentation.

• D.

Transport.

A. Application.
Explanation
"The application layer is the OSI layer closest to the end user, which means that both the OSI application layer and the user interact directly with the software application." Page 1-15

Rate this question:

• 19.

In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

• A.

Layer above.

• B.

Layer below.

• C.

Lowest layer.

• D.

Peer layer.

C. Lowest layer.
Explanation
"With the exception of the layers on each end, any layer in the OSI model communicates with three other OSI layers: the layer directly above it, the layer directly below it, and its peer layer in other networked devices." Page 1-16

Rate this question:

• 20.

Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

• A.

Frame.

• B.

Packet.

• C.

Segment.

• D.

Datagram.

D. Datagram.
Explanation
"The term datagram usually refers to an information unit whose source and destination are network layer entities that use connectionless network service." Page 1-18

Rate this question:

• 21.

What data communication protocol is used to govern the flow and format of information between systems?

• A.

Character-oriented.

• B.

Bit-oriented.

• C.

Routing.

• D.

Network.

A. Character-oriented.
Explanation
"Character-oriented protocols (COP) use characters and symbols (character code set) to govern the flow and format of information between systems." Page 1-20

Rate this question:

• 22.

In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

• A.

SEQ.

• B.

SYN.

• C.

STX.

• D.

EST.

B. SYN.
Explanation
"Establishes and maintains character synchronization prior to the message block and during transmission. Also used as time fill in the absence of control characters and data." Table on Page 1-21

Rate this question:

• 23.

What data communication protocol is based on bits and the position of the bits?

• A.

Character-oriented.

• B.

Bit-oriented.

• C.

Routing.

• D.

Network.

B. Bit-oriented.
Explanation
"Whereas COPs are based on characters, bit-oriented protocols (BOP) are based on bits and the position of the bits." Page 1-24

Rate this question:

• 24.

What data communication protocol ensures that the receiving station can distinguish information from garbage?

• A.

Asynchronous protocol.

• B.

Binary synchronous protocol.

• C.

Synchronous Data Link Control (SDLC).

• D.

High-Level Data Link Control (HDLC).

D. High-Level Data Link Control (HDLC).
Explanation
"HDLC’s major difference over SDLC is that it ensures that the receiving station can distinguish information from garbage." Page 1-28

Rate this question:

• 25.

A group of computers and associated devices that share a common communications line within a small geographic area is a

• A.

Metropolitan area network (MAN).

• B.

Local area network (LAN).

• C.

Wide area network (WAN).

• D.

Virtual private network (VPN).

B. Local area network (LAN).
Explanation
"A LAN is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area (for example, within an office building)." Page 1-29

Rate this question:

• 26.

The interconnection of several networks in a city into a single larger network is a

• A.

Local area network (LAN).

• B.

Wide area network (WAN).

• C.

Virtual private network (VPN).

• D.

Metropolitan area network (MAN).

D. Metropolitan area network (MAN).
Explanation
"A MAN is a network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large LAN but smaller than the area covered by a WAN. The term is applied to the interconnection of networks in a city into a single larger network." Page 1-29

Rate this question:

• 27.

What type of network connects networks that are typically separated by geographical distances?

• A.

Local area network (LAN).

• B.

Wide area network (WAN).

• C.

Virtual private network (VPN).

• D.

Metropolitan area network (MAN).

B. Wide area network (WAN).
Explanation
"A WAN is a network that links LANs and MANs by using long-distance communication links that are leased or purchased from a telecommunications company. Long-distance communication links can be described as telephone lines, microwave, or satellite communications. A WAN connects networks that are typically separated by geographical distances. These distances are between two cities within a state, between two states, across a country, or around the world." Page 1-29

Rate this question:

• 28.

What type of network enables a group of two or more computer systems to communicate over the public Internet?

• A.

Local area network (LAN).

• B.

Wide area network (WAN).

• C.

Virtual private network (VPN).

• D.

Metropolitan area network (MAN).

C. Virtual private network (VPN).
Explanation
"A virtual private network (VPN) provides a private tunnel through a public cloud (the internet). A VPN enables a group of two or more computer systems to communicate over the public internet." Page 1-29

Rate this question:

• 29.

Which type network enables users to share resources, files, and printers in a decentralized way?

• A.

Intranet.

• B.

Extranet.

• C.

Peer-to-peer.

• D.

Client-server.

C. Peer-to-peer.
Explanation
"Peer-to-peer networking enables users to share resources, files, and printers in a decentralized way." Page 1-30

Rate this question:

• 30.

What Network layer protocol provides information about how and where data should be delivered, including the data’s source and destination addresses?

• A.

Internet protocol (IP).

• B.

Address Resolution Protocol (ARP).

• C.

Reverse Address Resolution Protocol (RARP).

• D.

Internet Control Message Protocol (ICMP).

A. Internet protocol (IP).
Explanation
"IP provides information about how and where data should be delivered, including the data’s source and destination addresses." Page 2-2

Rate this question:

• 31.

Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

• A.

IP.

• B.

Address Resolution Protocol (ARP).

• C.

Reverse Address Resolution Protocol (RARP).

• D.

Internet Control Message Protocol (ICMP).

B. Address Resolution Protocol (ARP).
Explanation
"ARP provides the service of matching a known IP address for a destination device to a MAC address." Page 2-4

Rate this question:

• 32.

Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

• A.

IP.

• B.

Address Resolution Protocol (ARP).

• C.

Reverse Address Resolution Protocol (RARP).

• D.

Internet Control Message Protocol (ICMP).

C. Reverse Address Resolution Protocol (RARP).
Explanation
"The RARP provides the reverse of the ARP service. Rather than finding out the MAC address of a device whose IP address is already known, RARP provides the IP address for a device that knows its own MAC address." Page 2-4

Rate this question:

• 33.

Which Transport layer protocol does not guarantee that packets will be received at all?

• A.

Internet protocol (IP).

• B.

User Datagram Protocol (UDP).

• C.

Transmission Control Protocol (TCP).

• D.

Internet Control Message Protocol (ICMP).

B. User Datagram Protocol (UDP).
Explanation
"UDP is a connectionless transport service. In other words, UDP offers no assurance that packets will be received in the correct sequence. In fact, this protocol does not guarantee that the packets will be received at all." Page 2-6

Rate this question:

• 34.

Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

• A.

File Transfer Protocol (FTP).

• B.

Trivial File Transfer Protocol (TFTP).

• C.

Simple Mail Transfer Protocol (SMTP).

• D.

Hypertext Transfer Protocol (HTTP).

A. File Transfer Protocol (FTP).
Explanation
"File transfer protocol (FTP) is used to send and receive files by way of TCP/IP. In FTP exchanges, a host running the FTP server portion accepts commands from another host running the FTP client portion." Page 2-6

Rate this question:

• 35.

Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

• A.

FTP.

• B.

Trivial File Transfer Protocol (TFTP).

• C.

Simple Mail Transfer Protocol (SMTP).

• D.

Hypertext Transfer Protocol (HTTP).

B. Trivial File Transfer Protocol (TFTP).
Explanation
"Trivial file transfer protocol (TFTP) is a protocol that enables file transfers between computers, but it is simpler (or more trivial) than FTP. A significant difference between FTP and TFTP is that TFTP relies on UDP at the Transport layer." Page 2-7

Rate this question:

• 36.

Which Application layer protocol is a terminal emulation used to log on to remote hosts?

• A.

Teletype Network.

• B.

Trivial File Transfer Protocol (TFTP).

• C.

Simple Mail Transfer Protocol (SMTP).

• D.

Hypertext Transfer Protocol (HTTP).

A. Teletype Network.
Explanation
"Telnet is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. Using Telnet, a TCP connection is established and keystrokes on the user’s machine act like keystrokes on the remotely connected machine." Page 2-8

Rate this question:

• 37.

Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

• A.

Dynamic Host Configuration Protocol (DHCP).

• B.

Trivial File Transfer Protocol (TFTP).

• C.

Simple Mail Transfer Protocol (SMTP).

• D.

Hypertext Transfer Protocol (HTTP).

A. Dynamic Host Configuration Protocol (DHCP).
Explanation
"Dynamic host configuration protocol (DHCP) is an automated means of assigning a unique IP address to every device on a network." Page 2-8

Rate this question:

• 38.

Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

• A.

Dynamic Host Configuration Protocol (DHCP).

• B.

Network Time Protocol (NTP).

• C.

File Transfer Protocol (FTP).

• D.

Ping.

D. Ping.
Explanation
"Ping is a utility that can verify that TCP/IP is installed, bound to the network interface card (NIC), configured correctly, and communicating with the network. It is often employed simply to determine whether a host is responding (or “up”). Ping uses ICMP services to send echo request and echo reply messages that determine the validity of an IP address." Page 2-9

Rate this question:

• 39.

The physical address of any device on the network is a/an

• A.

Internet protocol version 4 (IPv4) address.

• B.

Internet protocol version 6 (IPv6) address.

• C.

Static internet protocol (IP) address.

• D.

Media Access Control (MAC) address.

D. Media Access Control (MAC) address.
Explanation
"Media Access Control (MAC) address. This is the physical address of any device—such as the NIC in a computer—on the network. The MAC address, which is made up of two equal parts, is 6 bytes long." Page 2-11

Rate this question:

• 40.

What are the two parts to an Internet Protocol version 4 (IPv4) address?

• A.

Network and host.

• B.

Network and class.

• C.

Class and host.

• D.

Network and octet.

A. Network and host.
Explanation
"The octets are split into two sections: Net and Host. The Net section always contains the first octet. It is used to identify the network that a computer belongs to. Host (sometimes referred to as Node) identifies the actual computer on the network. The Host section always contains the last octet." Page 2-11

Rate this question:

• 41.

What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

• A.

Subnet host.

• B.

Subnet network.

• C.

• D.

Explanation
"A computer on a TCP/IP network uses a subnet mask to determine what network it is on and whether a computer that it needs to send data to is located on a local network or on a remote network." Page 2-12

Rate this question:

• 42.

How many subnet bits are required to support 90 subnets on a Class B network?

• A.

Three.

• B.

Five.

• C.

Seven.

• D.

Nine.

C. Seven.
Explanation
http://www.subnet-calculator.com/

Rate this question:

• 43.

How many bits are available for host bits on a Class B network using seven bits?

• A.

Three.

• B.

Five.

• C.

Seven.

• D.

Nine.

D. Nine.
Explanation
http://www.subnet-calculator.com/

Rate this question:

• 44.

What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

• A.

• B.

Re-address the entire network.

• C.

Aim to use contiguous subnets where possible.

• D.

Choose one or more available subnets and subnet further.

B. Re-address the entire network.
Explanation
"A number of points are worth emphasizing in relation to VLSM:
 Start with the shortest mask. Plan the subnets that support the most hosts. This is typically the mask used on most or all of the LAN segments.
 Choose one or more available subnets and subnet further. This is sometimes called “subnetting the subnets.” It is important to remember that this can be done only with one or more subnets that have not already been used up.
 Aim to use contiguous subnets where possible. Although it is not essential, it certainly makes very good sense to choose a continuous range of addresses and apply a particular mask to them. The advantage of this type of consistency is that it can be determined from the third octet address that this is a LAN segment and also that the mask is 24-bit." Page 2-17

Rate this question:

• 45.

What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

• A.

Auto-sense.

• B.

Auto negotiation.

• C.

Auto configuration.

• D.

Auto summarization.

C. Auto configuration.
Explanation
"A problem with a 32 hexadecimal address is assigning them correctly; it’s easy to mistype a character. IPv6 uses dynamic host configuration protocol (DHCP) similar to IPv4 but there’s another option to acquire an IPv6 address, and it is called autoconfiguration. In autoconfiguration, the host appends the prefix information of its closest router to its own unique hardware or media access control (MAC) address to make up the IPv6 address, making it easier to allocate addresses." Page 2-19

Rate this question:

• 46.

Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?

• A.

Translation.

• B.

Tunneling.

• C.

Dual stack.

• D.

Auto configuration.

D. Auto configuration.
Explanation
Pages 2-19 through 2-23

Rate this question:

• 47.

Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

• A.

6to4.

• B.

Teredo.

• C.

Tunnel Broker.

• D.

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP).

B. Teredo.
Explanation
"Teredo attempts to solve the lack of functionality issue 6to4 has with Network Address Translation (NAT). Tunneling from the hosts presents an issue for NAT: IPv6 packets that are
encapsulated within IPv4 have the Protocol field in the IPv4 header set to 41." Page 2-21

Rate this question:

• 48.

Teredo has four tunneling components. Which one is not one of them?

• A.

Teredo host-specific relay.

• B.

Teredo client.

• C.

Teredo server.

• D.

Teredo agent.

D. Teredo agent.
Explanation
"-Teredo client is an IPv6/IPv4 node that supports a Teredo tunneling interface through which packets are tunneled to either other Teredo clients or nodes on the IPv6 Internet (via a Teredo relay). A Teredo
client communicates with a Teredo server to obtain an address prefix from which a Teredo-based IPv6 address is configured or to help initiate communication with other Teredo clients or hosts on the IPv6 Internet.
-A Teredo server is a IPv6/IPv4 node that is connected to both an IPv4 network and a IPv6 network, and acts as a Teredo tunneling interface over which packets are received. The role of the Teredo server is to assist in the address configuration of the Teredo client and to facilitate the initial communication between Teredo clients and other Teredo clients or between Teredo clients and IPv6-only hosts. The Teredo server listens on UDP port 3544 for Teredo traffic.
-A Teredo relay is an IPv6/IPv4 router that can forward packets between Teredo clients on the IPv4 network, using a Teredo tunneling interface, and IPv6-only hosts. The Teredo relay interacts with a Teredo server to help it facilitate initial communication between Teredo clients and IPv6-only hosts. The Teredo relay listens on UDP port 3544 for Teredo traffic.
-A Teredo host-specific relay is an IPv6/IPv4 node that has an interface and connectivity to both the IPv4 Internet and the IPv6 Internet and can communicate directly with Teredo clients over the IPv4 Internet, without the need for an intermediate Teredo relay."Pages 2-21 through 2-22

Rate this question:

• 49.

The combination transmitter/receiver device, in a single package, is called a

• A.

Transceiver.

• B.

Repeater.

• C.

Router.

• D.

Hub.

A. Transceiver.
Explanation
"a transceiver is a combination transmitter/receiver in a single package." Page 3-1

Rate this question:

• 50.

What device provides the physical, electrical, and electronic connections to the network media?

• A.

Bridge.

• B.

Router.

• C.

Gateway.

• D.

Network interface card (NIC).

D. Network interface card (NIC).
Explanation
"The network interface card (NIC), as its name suggests, is an expansion card you install in your computer to connect, or interface, your computer to the network. The NICs can be viewed as the actual interface between workstations, servers, clients, and the shared media of the network. These devices provide the physical, electrical, and electronic connections to the network media." Page 3-1 through 3-2

Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

• Current Version
• Mar 21, 2023
Quiz Edited by
ProProfs Editorial Team
• Dec 09, 2014
Quiz Created by
Bryansomeone

Related Topics