Test your basic knowledge |

Comptia Network + Wireless NOS Voip

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A form of filename substitution - similar to the use of wildcards in Windows and DOS.






2. In the context of 802.11n wireless networking - the ability for access points to issue multiple signals to stations - thereby multiplying the signal's strength and increasing their range and data-carrying capacity.






3. A wireless signal or path that travels directly in a straight line from its transmitter to its intended receiver.






4. A licensing mode that allows a fixed quantity of clients to use one software package simultaneously.






5. A series of two or more commands in which the output of prior commands is sent to the input of subsequent commands.






6. A type of satellite Internet access service in which a subscriber sends and receives data to and from the Internet over the satellite link. This is a symmetrical technology - in which both upstream and downstream throughputs are advertised to reach 4






7. A version of Linux packaged and distributed by Red Hat.






8. In the DiffServ QoS technique - a forwarding specification that allows routers to assign data streams one of several prioritization levels.






9. A logical representation of a networked printer's functionality.






10. In the context of wireless - the phenomenon that occurs when an electromagnetic wave encounters an obstacle and bounces back toward its source.






11. A service in which video signals are compressed and delivered over the Internet in a continuous stream so that a user can watch and listen even before all the data has been transmitted.






12. A program (usually text-based) that accepts and executes system programs and applications on behalf of users. Often - it includes the ability to execute a series of instructions that are stored in a file.






13. A routine of sequential instructions that runs until it has achieved its goal.






14. A unique character string used to identify an access point on an 802.11 network.






15. In general - a listing that organizes resources and correlates them with their properties. In the context of NOSs - a method for organizing and managing objects.






16. The diffusion of a wireless signal that results from hitting an object that has smaller dimensions compared to the signal's wavelength.






17. The characteristic of wireless signals that follow a number of different paths to their destination (for example - because of reflection - diffraction - and scattering).






18. In the context of wireless networking - the communication that occurs between a station and an access point to enable the station to connect to the network via that access point.






19. The name given to the public software project to implement a complete - free source code implementation of UNIX. It also refers to the collection of UNIX-inspired utilities and tools that are included with Linux distributions.|






20. A protocol suite codified by the IETF (in RFC 2543) as a set of Session layer signaling and control protocols for multiservice - packet-based networks.






21. A service that transmits faxes over a TCP/IP network.






22. A UNIX or Linux file system information storage area that holds all details about a file. This information includes the size - the access rights - the date and time of creation - and a pointer to the actual contents of the file.






23. The GUI environment for UNIX and Linux systems.






24. A logical representation of multiple - hierarchical levels in a directory.






25. A multiprocessing method that assigns each subtask to a specific processor.






26. A telephone switch used to connect calls within a private organization.






27. A type of software license that - for a fixed price - allows any number of users in one location to legally access a program.






28. A representation of a thing or person associated with the network that belongs in the NOS directory.






29. A proprietary implementation of the UNIX system distributed by IBM.






30. A transmission technique in which a signal's bits are distributed over an entire frequency band at once. Each bit is coded so that the receiver can reassemble the original signal upon receiving the bits.






31. A record of a user that contains all of her properties - including rights to resources - password - user name - and so on.






32. The relationship between two domains on a Windows Server 2003 or Server 2008 network that allows a domain controller from one domain to authenticate users from the other domain.






33. A connection from an Earth-based transmitter to an orbiting satellite.






34. A Transport layer protocol used with voice and video transmission. It operates on top of UDP and provides information about packet sequence to help receiving nodes detect delay and packet loss. It also assigns packets a timestamp that corresponds to






35. In Microsoft terminology - the type of client/server network that relies on domains - rather than workgroups.






36. The software that sits between the client and server in a 3-tier architecture.






37. A wireless networking standard that uses FHSS (frequency hopping spread spectrum) signaling in the 2.4-GHz band to achieve a maximum throughput of either 723 Kbps or 2.1 Mbps - depending on the version. IT was designed for use primarily with small of






38. A user account that has unlimited privileges to resources and objects managed by a server or domain.






39. A variable property associated with a network object. For example - a restriction on the time of day a user can log on is an attribute associated with that user object.






40. The proprietary version of UNIX that comes from Bell Labs.






41. The centralized management of multiple types of network-based communications - such as voice - video - fax - and messaging services.






42. A popular remote file system created by Sun Microsystems - and available for UNIX and Linux operating systems.






43. Any implementation of UNIX for which the source code is either unavailable or available only by purchasing a licensed copy from Novell (costing as much as millions of dollars).






44. A type of WLAN in which stations communicate with an access point and not directly with each other.






45. In Microsoft terminology - the primary purpose of a Windows Server 2008 server.






46. The technique of splitting tasks among multiple processors to expedite the completion of any single instruction.






47. The geographical area in which signals issued from an antenna or wireless system can be consistently and accurately received.






48. A technique for ensuring QoS by prioritizing traffic.






49. The complete database of hierarchical names (including host and domain names) used to resolve IP addresses with their hosts.






50. The core of a UNIX or Linux system. This part of the operating system is loaded and run when you turn on your computer. It mediates between user programs and the computer hardware.