IT Questions and Answers :)

Wednesday, April 15, 2020

What category cabling should be used in VOIP where throughput of greater than 100Mbps is desired?

What category cabling should be used in VOIP where throughput of greater than 100Mbps is desired?

  • CAT-3
  • CAT-6
  • CAT-5
  • CAT-5a 

EXPLANATION

CAT-6 cabling should be used where throughput of greater than 100Mbps is desired.

SOURCE

https://www.centurylink.com/business/help/voip/equipment/phone-and-computer-connection-diagrams.html
Share:

Monday, April 15, 2019

What is the standard command for a modem to answer?

What is the standard command for a modem to answer?

  • AT DT
  • AT A
  • A/
  • AT Z 

 
What is the standard command for a modem to answer?

EXPLANATION

Modem Command strings are prefixed with "AT" to get the modem's "attention".  A is the code for "Answer".  This typically requires no Carriage Return to follow, as that is interpreted by the
modem as a cancellation.  AT Z resets the modem, AT DT Dials touch tone (usually the default dialing method), and A/ repeats the last command.

SOURCE

https://en.wikipedia.org/wiki/Hayes_command_set
Share:

Wednesday, April 10, 2019

Which of the following is NOT a business phone technology?

Which of the following is NOT a business phone technology?

  • SIP
  • DNS
  • PRI
  • PBX 

 
Which of the following is NOT a business phone technology?

EXPLANATION

Domain name system (DNS) is not a business phone technology. The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for
carrying multiple DS0 voice and data transmissions between the network and a user. The Session Initiation Protocol (SIP) is an Internet Engineering Task Force (IETF) standard protocol for initiating an interactive user session that involves multi-media elements, such as video, voice, chat, gaming, and virtual reality. A PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. 

Share:

Thursday, August 2, 2018

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • Digital ID
  • IMAP
  • Secure SMTP
  • SPF

What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework 
Share:

Tuesday, May 29, 2018

Which of the following is a software implementation of a telephone private branch exchange (PBX)?

Which of the following is a software implementation of a telephone private branch exchange (PBX)?

  • Snom
  • Digium
  • Asterisk
  • Polycom 

 
Which of the following is a software implementation of a telephone private branch exchange (PBX)?

EXPLANATION

Digium is the company and hardware (appliance) name where Asterisk is software name. Polycom and Snom provide VoIP equipment.

SOURCE

https://en.wikipedia.org/wiki/Asterisk_(PBX)
Share:

Friday, March 9, 2018

What type of jack would you normally use for a POTS line?

What type of jack would you normally use for a POTS line?

  • RJ9
  • RJ31X
  • RJ11
  • RJ45 

 
What type of jack would you normally use for a POTS line?

EXPLANATION

An RJ11 jack supports one POTS (Plain Old Telephone Service) line.
An RJ9 is an unofficial 4P4C plug that is sometimes used for the handset connection to the telephone.  Think the coiled cord. (http://blog.jabra.com/4-types-of-wired-headset-connectors/)
An RJ31X is a special type of jack that can accommodate up to two POTS lines, but is wired using 4 pairs of wire.  This can be described as an intercept or "Man in the Middle" plug.  It is most commonly used with alarm systems,  When the alarm panel is plugged into the jack, the POTS lines pass through the alarm system.  This allow the alarm system to seize the line, possibly dropping a call in progress.  When the alarm system is not plugged into the jack, the POTS lines work normally.

An RJ45 is the jack most IT people are familiar with.  It is the 4 pair plug we normally associate with ethernet and patch cables.

Share:

Thursday, February 1, 2018

Macro, Micro, Pico, Femto and Umbrella are all types of what?

Macro, Micro, Pico, Femto and Umbrella are all types of what?

  • Cell sizes in a GSM network
  • GSM filters
  • GSM interfaces
  • Uplink and downlink channels 

Macro, Micro, Pico, Femto and Umbrella are all types of what?

EXPLANATION

GSM mobile phone networks are "cellular," which means that mobile phones connect to it by nearest cell.
MACRO cells can be regarded as cells where the base station antenna is installed on a mast or larger building structures that are taller than an average roof-top level. Cell radius is typically from 1 up to 35 km.
MICRO cells are cells whose antenna height below average rooftop level and are typically used in urban areas. Size is from 400 m to 2 km. 
PICO cells are small cells whose diameter is only few dozen meters; they are used mainly in indoor applications.
UMBRELLA cells: A layer with micro cells is covered by at least one macro cell, and a micro cell can in turn cover several pico cells. A covering cell is called an umbrella cell.

SOURCE

https://en.wikipedia.org/wiki/Cellular_network
Share:

Friday, December 22, 2017

In telecommunications, the Megaco (H.248) call-control protocol communicates between which of the following?

In telecommunications, the Megaco (H.248) call-control protocol communicates between which of the following?

  • Contexts and call agents
  • A network and a subnetwork
  • Two peers
  • A gateway controller and a gateway 
 
In telecommunications, the Megaco (H.248) call-control protocol communicates between which of the following?

EXPLANATION

Megaco (media gateway control protocol architecture) is a a signaling protocol that enables switching of voice, fax and multimedia calls between the PSTN and IP networks. It is used between the Media Gateway and Media Gateway Controller in a VoIP network. Megaco is also known as H.248.
Share:

Friday, December 8, 2017

What can be used to protect you from receiving email messages with a forged sender address?

What can be used to protect you from receiving email messages with a forged sender address?

  • SPF
  • Secure SMTP
  • Digital ID
  • IMAP 

 
What can be used to protect you from receiving email messages with a forged sender address?

EXPLANATION

Sender Policy Framework (SPF) is a simple email-validation system designed to detect email spoofing by providing a mechanism to allow receiving mail exchangers to check that incoming mail from a domain comes from a host authorized by that domain's administrators.[1] The list of authorized sending hosts for a domain is published in the Domain Name System (DNS) records for that domain in the form of a specially formatted TXT record. Email spam and phishing often use forged "from" addresses, so publishing and checking SPF records can be considered anti-spam techniques.
IETF publication RFC 7208 dated April 2014 defines Sender Policy Framework as "proposed standard".

SOURCE

https://en.wikipedia.org/wiki/Sender_Policy_Framework
Share:

Tuesday, November 28, 2017

How many channels are in a full T1 PRI trunk?

How many channels are in a full T1 PRI trunk?

  • 23
  • 6
  • 24
  • 32 

 

How many channels are in a full T1 PRI trunk?

 

EXPLANATION

T1 connections have 24 channels in total.

Typically, for T1 ISDN (CCS) protocols, 23 channels are used as B-channels and 1 channel is used as a D-channel. For this reason, the frame structure of a T1 PRI connection is said to be 23B+1D where the D-channel is located on timeslot 23 (channels numbered from 0 to 23) and the remaining channels are used as B-channels. Hence;
If you had an E1 PRI trunk, you would have 30 B channels and 2 D channels.

SOURCE

https://en.wikipedia.org/wiki/Primary_Rate_Interface
Share:

Thursday, November 23, 2017

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

  • 500 feet
  • 200 meters
  • 100 meters
  • 100 feet 

What is the maximum length for a cat 5e cable run before experiencing packet loss or latency?

EXPLANATION

The maximum length for a cable segment is 100 meters. If longer runs are required, the use of active hardware such as a repeater or network switch is necessary.
https://en.wikipedia.org/wiki/Category_5_cable
Share:

Wednesday, November 22, 2017

ICT is similar to IT, but focuses primarily on what?

ICT is similar to IT, but focuses primarily on what?

  • Coding
  • Centralization
  • Communications
  • Capacity
 ICT is similar to IT, but focuses primarily on what?
 

EXPLANATION

Information and Communications Technology (ICT) is an extended term for information communication technology (ICT) which stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information

SOURCE

https://en.wikipedia.org/wiki/Information_and_communications_technology
Share:

Which of the following is NOT a business phone technology?

Which of the following is NOT a business phone technology?

  • PBX
  • SIP
  • DNS
  • PRI 

Which of the following is NOT a business phone technology?










EXPLANATION

Domain name system (DNS) is not a business phone technology. The Primary Rate Interface (PRI) is a telecommunications interface standard used on an Integrated Services Digital Network (ISDN) for carrying multiple DS0 voice and data transmissions between the network and a user. The Session Initiation Protocol (SIP) is an Internet Engineering Task Force (IETF) standard protocol for initiating an interactive user session that involves multi-media elements, such as video, voice, chat, gaming, and virtual reality. A PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. 

Share:

Popular Posts