3-a : Quiz Physical Network Media Flashcards

1
Q

(1)An organization is considering type of transmission media which provide best security against
unauthorized access. Which of the following provides best security?

A. Unshielded twisted pair
B. Shielded twisted pair
C. Fiber-optic cables
D.Coaxial cables

A

Answer: C. Fiber-optic cables

Explanation:
In fiber-optic cables, glass fibers are used to carry binary signals as flashes of light- Fiber-optic cables have proven to be more secure than the other media. They have very low transmission loss, not affected by EMI and preferred choice for high volumes and long distance calls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(2)Which of the following transmission error can occur in wired as well as wireless communication?

A. Cross-talk
B. Attenuation
C. Sags, spikes and surges
D. Multipath interference

A

Answer: B. Attenuation

Explanation:
Attenuation is the weakening of signals during transmission. Attenuation can occur in both wired
and wireless transmissions. Crosstalk can refer to electromagnetic interference from one unshielded twisted pair to another twisted pair, normally running in parallel. Cross-talk occurs only in wired communication. Multipath interference results in a direct signal coming with one or more reflected radio (wireless) signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(3)Which of the following transmission error can be caused by the length of cable if UTP is more than 100 meters long?

A. Electromagnetic interference (EMI)
B. Cross-talk
C. Attenuation
D. Sags, spikes and surges

A

Answer: C. Attenuation

Explanation:
Attenuation is the weakening of signals during transmission. Attenuation exists in both wired and
wireless transmissions. Length of wire impacts the severity of attenuation. Electromagnetic interference (EMI) is caused by outside disturbance which is not the case here. Sags spikes & surges and cross-talk has nothing to do with the length of the UTP cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(4)To minimize the risk of data corruption, which of the following options can be effective?

A. Separate conduits for electrical and data cables.
B. Encryption
C.Check-digits
D. Hashing

A

Answer: A. Separate conduits for electrical and data cables.

Explanation:
Using separate conduits for data cables and electrical cables, minimizes the risk of data corruption
due to an induced magnetic field created by electrical current. Other options will not prevent data
from being corrupted. Data encryption minimizes the risk of data leakage & hashing ensures data integrity however they cannot prevent corruption. A check-digit will help detect the data corruption during communication, but will not prevent it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(5)Which transmission method would provide best security?

A. Dedicated lines
B.Wireless Network
C.Dial-up
D.Broadband network

A

Answer: A. Dedicated lines

Explanation:
In computer networks and telecommunications, a dedicated line is a communications cable or
other facility dedicated to a specific application, in contrast with a shared resource such as the
telephone network or the Internet. Dedicated lines are most secured amongst the above options.
Since there are no sharing of lines, data security can be assured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly