CompTIA CN0-201 Dumps and Practice Tests
CompTIA CTP+ Certification Exam: CN0-201 Exam
- CN0-201 Questions & Answers
- Exam Code: CN0-201
- Exam Name: CompTIA CTP+ Certification Exam
- Updated: February 14, 2012
- Q & A: 314 Q&As
1.Which of the following devices is used to make decisions based on MAC addresses and is considered the most appropriate device to use when limiting broadcast domains for devices that will process voice data?
A. Layer 3 switch
C. Layer 2 switch
2.Which of the following are endpoints in Cisco Unified Communications.?
Each correct answer represents a complete solution. Choose two.
D. IP phones
3.Which of the following is a mechanism used by the Multimedia Extensions (WME) standard to avoid contentions in a particular traffic category?
A. Sliding Window Protocol
B. Contention Window (CW)
C. Auto-Rate Fallback
D. Maximum Segment Size (MSS)
4.Adam works as a Sales Engineer for Umbrella Inc. One of his customers complains that the PBX is getting reset several times in a day. Adam finds that the power LEDs of PBX are fluttering. He suspects that faulty power supply is the cause of this problem. Which of the following troubleshooting tools should Adam use to verify these suspicions?
A. Continuity tester
B. Line tester
C. Volt meter
D. T-BERD 4000
5.You work as a network consultant for Net World International. You are designing a network for a client company. The proposed network will use a class B address for its network. The network will be divided into thirty-two subnets.
Which of the following subnet masks will you use to design the network?
6.Which of the following ITU standards specifies PCM voice coding at 64 kbps?
7.Which of the following statements are true about session hijacking? Each correct answer represents a complete solution. Choose all that apply.
A. Use of a long random number or string as the session key reduces session hijacking.
B. It is used to slow the working of victim's network resources.
C. TCP session hijacking is when a hacker takes over a TCP session between two machines.
D. It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
8.Rick, an administrator of a TCP/IP network, wants to achieve the following goals: l Reduce congestion of network traffic. l Optimize the utilization of the IP address space. Which of the following technologies may help him to accomplish the task?
9.Voice over IP is an application that requires efficient use of bandwidth and reliability. VoIP must not suffer the delays that can be seen at times with Web sites and Web applications. Which technology can be used to help ensure the efficient transport of VoIP traffic?
10.Which of the following are examples of interactive communication? Each correct answer represents a complete solution. Choose all that apply.
A. Video Conferencing
D. Phone call
11.Which of the following devices is used to create VLANs in a small network?
12.Which of the following protocols provides sequence numbers to VoIP packets?
13.You have just set up a wireless network for customers at a coffee shop. Which of the following are good security measures to implement? Each correct answer represents a complete solution. Choose two.
A. Not broadcasting SSID
B. MAC filtering the router
C. Using WEP encryption
D. Using WPA encryption
14.Which of the following protocols is used by VoIP applications for communication initiation in the network?
15.Which of the following standards designates international numbering plans for devices connected to the PSTN?
16.You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network.
Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?
17.Andrew is working for a television station in North America and South America. What video standard is more possibly be used with the video stored in the archives of these stations?
D. IEEE 1394
18.Which of the following layers of the OSI model manages communication between communication entities in a network?
19.When a phone is lifted off-hook, it connects the two wires causing an electrical signal to flow from the phone exchange to the phone. What is this electrical signal called?
A. Off-hook signal
B. Ground start signal
C. Loop start signal
D. On-hook signal
20.Trace analysis tools, management tools, and NBAR are used while implementing QoS policies. Which of the following tasks is performed by these tools during implementation of QoS policies?
A. Defining policies
B. Network audit
C. Network security configuration
D. Division of traffic into classes
Latest CompTIA CN0-201 Dumps and Practice Tests Download