System Engineer Atsi Quiz

45 Questions | Total Attempts: 15

SettingsSettingsSettings
Please wait...
System Engineer Atsi Quiz

.


Questions and Answers
  • 1. 
    You are implementing a converged network. You need to run a cable to a computer that is located 250 meters from the current network. You will need to install either switches or repeaters to implement the connection using standard CAT5 UTP cable. How many switches or repeaters would you need?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 2. 
    Which of the following are protocols used to dynamically configure the IP addresses on IP devices?
    • A. 

      DNS

    • B. 

      BOOTP

    • C. 

      DHCP

    • D. 

      FTP

  • 3. 
    You are implementing a Voice over IP solution. You want to make sure that your data is delivered in a timely fashion to the receiving device. Which of the following protocols is the right choice?
    • A. 

      HTTP

    • B. 

      SSH

    • C. 

      TCP

    • D. 

      UDP

  • 4. 
    At which layer of the OSI model does IP address management occur?
    • A. 

      Layer 3

    • B. 

      Layer 1

    • C. 

      Layer 2

    • D. 

      Layer 4

  • 5. 
    What is the difference between a frame and a packet?
    • A. 

      The term frame usually refers to the data at Layer 2 that is ready to be transmitted.

    • B. 

      The term packet usually refers to the data at Layer 2 that is ready to be transmitted

    • C. 

      Frames are encrypted, and packets are not

    • D. 

      Packets are encrypted, and frames are not

  • 6. 
    You need a device that will allow you to move data throughout your network based on IP address information. Which of the following devices are you most likely to implement?
    • A. 

      Switch

    • B. 

      Router

    • C. 

      Access Point

    • D. 

      CSU/DSU

  • 7. 
    Which of the following reduces bandwidth consumption by taking advantage of the fact that users do not talk 100 percent of the time while on a telephone conversation?
    • A. 

      Chatter removal

    • B. 

      Noise reduction

    • C. 

      Silence suppression

    • D. 

      Silence compression

  • 8. 
    Which of the following features is generally not found in a traditional PBX?
    • A. 

      Voice mail

    • B. 

      Call forwarding

    • C. 

      Call interruption

    • D. 

      Instant messaging

  • 9. 
    You are attaching an ISDN PRI line (E1) to your voice gateway. Which channel carries signaling and control information?
    • A. 

      B Channel

    • B. 

      C Channel

    • C. 

      D Channel

    • D. 

      E Channel

  • 10. 
    What is the resulting data rate of Pulse Code Modulation (PCM), as traditionally defined?
    • A. 

      8 Kbps

    • B. 

      16 Kbps

    • C. 

      56 Kbps

    • D. 

      64 Kbps

  • 11. 
    How does a Computer attached to an IP phone send data to the switch?
    • A. 

      As tagged (using the voice VLAN)

    • B. 

      As untagged

    • C. 

      As tagged (using the data VLAN)

    • D. 

      As tagged (using the CoS value)

  • 12. 
    Identify the issues facing converged enterprise networks. (Choose four)
    • A. 

      Scarce bandwidth

    • B. 

      Delay issues

    • C. 

      CAS issues

    • D. 

      Jitter

    • E. 

      E&M connectivity issues

    • F. 

      Packet Loss

  • 13. 
    Voice over IP is an application that requires efficient use of bandwidth and reliability. Which technology can be used to help ensure the efficient transport of VoIP traffic?
    • A. 

      RTP

    • B. 

      QoS

    • C. 

      DNS

    • D. 

      RSTP

  • 14. 
    Which of the following could be a valid Media Access Control (MAC) address?
    • A. 

      0-0-f-f-1-2

    • B. 

      0e0-8y0-5hkf-fie-184-cq2

    • C. 

      300-180-55f-2fe-514-c82

    • D. 

      00-80-5f-fe-14-c2

  • 15. 
    You are using private IP addresses for your Windows, Linux and Macintosh systems behind a firewall. What must you do with these addresses in order for them to access the Internet?
    • A. 

      Enable Network Address Translation (NAT)

    • B. 

      Enable Dynamic Host Configuration Protocol (DHCP)

    • C. 

      Enable Simple Network Management Protocol (SNMP)

    • D. 

      Enable a default gateway

  • 16. 
    Several customers call informing you that a computer responsible for enabling client use of the VoIP network is issuing malformed packets. You suspect that TCP packets with the address of 1718 are malformed, and you need to verify this. Which tool could you use to read the contents of the packets?
    • A. 

      A network analyzer

    • B. 

      The netstat command

    • C. 

      The traceroute utility

    • D. 

      An ARP cache

  • 17. 
    Which protocol is generally used to establish calls in SIP implementations?
    • A. 

      UDP

    • B. 

      TCP

    • C. 

      RTP

    • D. 

      H.225

  • 18. 
    When a technician connects a North American T-1 trunk to a European E-1 trunk using a conversion device, which of the following will result?
    • A. 

      No less than 80% of the T-1 can be used.

    • B. 

      No more than 80% of the E-1 trunk can be used.

    • C. 

      No connection can be made between E-1 and T-1.

    • D. 

      The connection will fail, because E-1 uses out-of-band transmission, and T-1 lines use in-band transmission.

  • 19. 
    How many B Channels and D Channels does E1 voice line support
    • A. 

      E1 supports 24 B Channels and 1 D Channel

    • B. 

      E1 supports 24 D Channels and 1 B Channel

    • C. 

      E1 supports 30 D Channels and 1 B Channel

    • D. 

      E1 Supports 30 B Channels and 1 D Channel

  • 20. 
    Which of the following describes an E-1 line used for voice data?
    • A. 

      It uses in-band signaling.

    • B. 

      It provides 30 64-Kbps channels.

    • C. 

      It provides 24 64kbps data channels

    • D. 

      It provides a connection speed of 1.544 Kbps

  • 21. 
    Your company's users on the primary LAN have been asked to use soft phones on their personal computers to make voice calls. You have implemented a VLAN. What priority should you mark voice and computer data?
    • A. 

      Computer data: 0. Voice data: 6

    • B. 

      Computer data: 0. Voice data: 9

    • C. 

      Computer data: 1. Voice data: 0

    • D. 

      Computer data: 5. Voice data: 6

  • 22. 
    Which of the following is responsible for ensuring that incoming customer calls are properly queued according to the order in which they were received?
    • A. 

      SIP proxy

    • B. 

      Edge router

    • C. 

      Automatic Call Distributer (ACD)

    • D. 

      Gatekeeper

  • 23. 
    Which of the following describes the ability to seamlessly combine e-mail, voice, real-time applications and Web chat features for a call center representative to use?
    • A. 

      Multi-channel blending

    • B. 

      On-screen phone control

    • C. 

      Automatic Call Routing (ACR)

    • D. 

      Computer telephony integration (CTI).

  • 24. 
    As a general rule, which of the following statements is correct?
    • A. 

      Decreasing compression increases bandwidth usage and reduces voice quality.

    • B. 

      Increasing compression to reduce bandwidth consumption increases voice quality.

    • C. 

      Increasing compression increases bandwidth consumption and reduces voice quality.

    • D. 

      Increasing compression to reduce bandwidth consumption reduces voice quality.

  • 25. 
    You have just changed codecs from G.711 to G.729. Which of the following statements explains the resulting change in voice quality?
    • A. 

      Voice quality is unaffected by compression rates

    • B. 

      Voice quality improves as compression increases

    • C. 

      Voice quality degrades as compression decreases

    • D. 

      Voice quality degrades as compression increases

Back to Top Back to top