Networked AV Systems Pretest



Similar documents
SSVVP SIP School VVoIP Professional Certification

IT Data Communication and Networks (Optional)

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Networking 4 Voice and Video over IP (VVoIP)

SSVP SIP School VoIP Professional Certification

Data Communication and Computer Network

COMPUTER NETWORK TECHNOLOGY (300)

CompTIA Network+ (Exam N10-005)

Networking Technology Online Course Outline

Network System Design Lesson Objectives

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

VPN. Date: 4/15/2004 By: Heena Patel

CCT vs. CCENT Skill Set Comparison

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Data Communication Networks and Converged Networks

Hands on VoIP. Content. Tel +44 (0) Introduction

Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Advanced Higher Computing. Computer Networks. Homework Sheets

Study Guide CompTIA A+ Certification, Domain 2 Networking

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Internet Protocol: IP packet headers. vendredi 18 octobre 13

COMPUTER NETWORK TECHNOLOGY (40)

Interconnecting Cisco Network Devices 1 Course, Class Outline

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

IP Telephony Deployment Models

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

IT4405 Computer Networks (Compulsory)

BASIC ANALYSIS OF TCP/IP NETWORKS

Level 1 Technical. Networking and Technology Basics. Contents

Network Access Security. Lesson 10

Ethernet. Ethernet. Network Devices

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

Layer 3 Network + Dedicated Internet Connectivity

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Networking Devices. Lesson 6

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

GregSowell.com. Mikrotik Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

How To Understand and Configure Your Network for IntraVUE

Security. TestOut Modules

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Local Area Networks (LANs) Blueprint (May 2012 Release)

White Paper Creating a Video Matrix over IP

Transport and Network Layer

"Charting the Course...

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Technical Support Information Belkin internal use only

CTS2134 Introduction to Networking. Module Network Security

Chapter 5. Data Communication And Internet Technology

Introduction. Translating Client Needs into a Design. CTS Prep Online. CTS Prep Introduction. Introduction to Chapter 1.

CompTIA Convergence Examination Objectives

Network Security TCP/IP Refresher

Interconnecting Cisco Networking Devices Part 2

Network Protocol Configuration

LifeSize Video Communications Systems Administrator Guide

Linux Network Security

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Cisco Networking Professional-6Months Project Based Training

10CS64: COMPUTER NETWORKS - II

How To Learn Cisco Cisco Ios And Cisco Vlan

SIP Trunking and Voice over IP

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Network Design. Yiannos Mylonas

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Test Code: 8148 / Version 1

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Glossary of Terms and Acronyms for Videoconferencing

Top-Down Network Design

Review: Lecture 1 - Internet History

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Basic Network Configuration

Mathatma Gandhi University

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Networking Test 4 Study Guide

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Applications that Benefit from IPv6

UPPER LAYER SWITCHING

Lab Organizing CCENT Objectives by OSI Layer

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Cisco Data Centre: Introducing Cisco Data Center Networking

Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.

21.4 Network Address Translation (NAT) NAT concept

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Computer Networks III

Lab VI Capturing and monitoring the network traffic

Transcription:

Networked AV Systems Pretest Instructions Choose the best answer for each question. Score your pretest using the key on the last page. If you miss three or more out of questions 1 11, consider taking Essentials of AV Technology to learn more about AV signals, devices, and systems before taking Networked AV Systems. If you miss three or more out of questions 12 20, consider taking CTS Prep to learn more about AV design and project management before taking Networked AV Systems. If you miss five or more out of questions 21 40, consider taking Networking Technology to learn more about the basics of IP networking before taking Networked AV Systems. 1) determine(s) the range of frequencies that can pass through a circuit. a) Bandwidth b) Compression algorithms c) khz and MHz d) Low pass and high pass settings 2) A two conductor circuit is said to be balanced if. a) its bandwidth is divided equally among all signal types b) the conductors impedances are the same with respect to ground and each other c) the conductors input and output circuitry are exactly opposite d) the signals on the conductors are mirror images of each other 3) In order to accurately capture an analog signal, the minimum sampling rate must be the frequency being sampled. a) equal to b) at least twice c) at least four time d) at least ten times 4) The digital waveform is represented by a. a) complex waveform b) sawtooth wave c) sine wave d) square wave 1

5) Bit rate is a measurement of the quantity of information in a digital signal stream and quantified in bits per second. a) over a given distance b) over time c) per frame d) per packet 6) Bit depth is defined as the number of states you have in which to describe the sampled signal s a) intensity b) phase relationship c) voltage level d) wave form 7) In the program phase, what must be determined to assure that a functional AV system scope will be created? a) Considerations regarding access to loading dock facilities b) The goals of equipment supplier sales representatives c) The specific tasks, functions, and applications of the end users d) What technology will be available for the audiovisual system 8) A is a piece of equipment or software that uses an algorithm to decode or encode a signal. a) codec b) digital signal processor c) high pass filters d) limiter 9) MP3 and MPEG-4 files are examples of files using compression a) 4:1 b) 4:4:2 c) Lossless d) Lossy 10) HDCP is a protocol supported by a) Digital Rights Management b) DisplayPort, DVI, and HDMI c) HD-15 d) HDMI exclusively 11) conferencing uses a switched telephone network to simultaneously share voice, video, and data among participants. a) H.264 b) ISDN c) POTS d) SVC 2

12) How can you address ambient noise issues in a room? a) Use acoustically absorptive materials in the room. b) Use hard surface materials such as gypsum board. c) Use marble floors and wood paneling. d) Use materials with strong reverberating qualities. 13) Ambient light can be described as. a) display light that is present but inconsequential to the presentation b) environment and display light that is necessary for the presentation environment and display c) light in the presentation environment other than the displayed light d) light which enhances the presentation environment 14) The required height of a display should be based upon. a) brightness required and screen resolution b) closest viewer distance and viewing angles c) farthest viewer distance and viewer task d) largest available size and customer budget 15) If text will be displayed during a presentation, the farthest viewer distance should be no more than. a) the diagonal of the screen b) the width of the screen c) eight times the height of the screen d) 150 times the height of the text 16) Which signal processor best compensates for the sound pressure level differences between loud and soft-spoken presenters? a) Acoustic echo canceller b) Automatic gain controller c) Downward expander d) Limiter 17) Audioconferencing equipment includes either line or acoustic echo technology. a) cancellation b) enhancement c) filtering d) propagation 3

18) What type of wiring do both of the images below illustrate? a) Combination parallel/series circuit b) Parallel circuit c) Series circuit d) Stereo pair circuit 19) The use of an RCA connector, or phono connector, indicates a(n) circuit. a) balanced b) shielded c) unbalanced d) unprocessed 20) What is a logic network diagram used for in AV management activities? a) Allows display of financial information in chronological form b) Allows tracking of quality for tasks and sub-tasks c) Helps avoid dependencies d) Helps in sequencing project milestones 21) Which of the following statements accurately describes IPv6? a) IPv6 has larger IP headers than IPv4 to simplify routing. b) IPv6 is backward compatible with IPv4. c) IPv6 uses a 64-bit address space. d) IPv6 uses three types of addresses: unicast, multicast, and anycast. 22) Which of the following best describes the function of Address Resolution Protocol (ARP)? a) ARP ensures that all addresses within a subnet fall into the same address range. b) ARP identifies the transport protocols that may be delivered to a particular address. c) ARP matches domain names to IP addresses in a Domain Name System (DNS). d) ARP matches IP addresses to the appropriate link layer addresses. 23) Domain Name System (DNS) is used to convert a to an IP address. a) Fully Qualified Domain Name (FQDN) b) Logical address c) Media Access Control (MAC) address d) Network Interface Card (NIC) 4

24) Fault tolerance is best addressed by which network topology? a) Bus b) Mesh c) Ring d) Star 25) transport is preferable for live streaming video applications. a) MPLS (MultiProtocol Layer Switching) b) PSIP (Program and System Information Protocol) c) TCP (Transmission Control Protocol) d) UDP (User Datagram Protocol) 26) In order to securely connect to a remote host to execute command line commands, a network administrator would use. a) HTTPS b) Ports 20 and 21 c) SSH d) Telnet 27) A examines the contents of a physical layer payload and then forwards packets to the appropriate address using the best available path. a) bridge b) gatekeeper c) router d) switch 28) Telnet and Secure Shell (SSH) operate at which layer of the OSI Model? a) Data Link layer b) Network layer c) Presentation layer d) Application layer 29) A multilayer switch is so named because it. a) can operate both wired and wirelessly b) can perform functions at OSI Model Layer 3 and Layer 4 c) can perform functions at OSI Model Layers 2, 3 and sometimes higher d) operates only as a switcher and not a router 30) If supported by the equipment, VLANs allow. a) bridges to maintain multiple redundant paths between devices b) broadcast traffic across multiple LANs c) communication between separate Layer 2 switches without the use of a router d) multiple separate broadcast domains to be defined on the same equipment. 5

31) Which of the following statements best describes the function of a proxy server? a) A proxy server acts as an additional network situated between a public network and a private network. b) A proxy server examines HTTP traffic, blocking client access to sites it deems inappropriate. c) A proxy server grants remote permission to view event logs on clients without granting any unnecessary administrative rights. d) A proxy server replaces a client s address and other identifying information with its own before forwarding the client s requests to a remote host. 32) is a bandwidth optimization method that allows a network administrator to assign classes to certain types of traffic to ensure that bandwidth is available for high priority traffic. a) High availability b) Load balancing c) Quality of Service (QoS) d) Domain Host Control Protocol (DHCP) 33) A is hardware or software that is designed to divide network activity between multiple hosts. a) high availability network b) load balancer c) QoS d) traffic shaper 34) is a general term for all the protocols, policies, software, and hardware that manage access to a network. a) Media Access Control (MAC) filtering b) Network Access Control (NAC) c) Network administration d) Network Interface Card (NIC) authorization 35) IPsec and SSL/TLS can be used for. a) port security b) secure VPN connections c) secure wireless traffic d) securing LAN traffic 36) Which of the following statements accurately describes L2TP? a) L2TP is a Cisco tunneling protocol that provides Layer 2 tunneling, but no encryption. b) L2TP is a Layer 5 protocol that allows remote users to establish a VPN tunnel using only a web browser. c) L2TP is a Microsoft tunneling protocol for virtual private networks that has been largely replaced by interoperable standards. 6

d) L2TP is an IETF defined protocol that allows Layer 2 tunneling between networks for virtual private networks. 37) firewalls monitor addresses, ports, and connection data to determine if a packet is part of an existing communication stream or a new stream. a) Stateless b) Stateful c) Application d) Internet content filter 38) is/are a common firewall feature and/or security device that can block restricted websites or content. a) Content filtering b) Scanning services c) Signature identification d) Security zones 39) Configuring a firewall for security may involve a) manually allowing and denying services and ports b) publishing only open ports c) rotating open ports in a random fashion d) all of the above 40) Which of the following best describes a function of Network Address Translation (NAT)? a) NAT allows multiple computers on a network to connect to the Internet using a single IP address b) NAT converts IPv4 addresses to IPv6 addresses c) NAT enables devices with unregistered IP addresses to connect to the Internet d) All of the above 7

Networked AV Systems Pretest Key Question Answer Prerequisite 1 A If you miss three or more out of questions 1 11, 2 B consider taking Essentials of AV Technology, available as 3 B a classroom, virtual classroom, or online course. 4 D 5 B 6 C 7 C 8 A 9 D 10 B 11 B 12 A If you miss three or more out of questions 12 20, 13 C consider taking CTS Prep, available as an online, 14 C classroom or virtual classroom course. 15 D 16 B 17 A 18 B 19 C 20 D 21 D If you miss five or more out of questions 21 40, 22 D consider taking Networking Technology, available as a 23 A classroom or online course. 24 B 25 D 26 C 27 C 28 D 29 C 30 D 31 D 32 C 33 B 34 B 35 B 36 D 37 B 38 A 39 A 40 D 8