CN0-201 - CompTIA CTP+ Certification Exam
Go back to CompTIA
Flow based QoS tools automatically recognize flows. On which of the following things, this flow recognition is based? Each correct answer represents a part of the solution. Choose three.
Source and destination address
Transport layer protocol
Which of the following communications technologies provides access to a large pool of customer service agents and multiple channels of communication as well as customer self-help tools?
Power over Ethernet (PoE) technology describes a system to safely pass electrical power, along with data, on Ethernet cabling. What are the advantages of Power over Ethernet?
Symmetric distribution is possible.
A Gigabit of data per second to every device is possible.
PoE supports cheap cabling.
Which of the following statements are true about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.
Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is not disconnected.
Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.
Which of the following is an audio data compression algorithm for voice that compresses digital voice in packets of 10 milliseconds duration?
Which of the following is NOT a part of the Public Switched Telephone Network (PSTN)?
Which of the following network configuration utilities is used to display information about current TCP/IP connections?
Which of the following devices works at the data link layer of the OSI model and is therefore an ideal device for creating a new broadcast domain for a voice device?
You are a Voice Technologies Administrator and connecting a VoIP network to the PSTN. You are using E.164 standard address for your telephone system. Which of the following are the components of E.164 numbering plan? Each correct answer represents a part of the solution. Choose three.
National destination code
Trace analysis tools, management tools, and NBAR are used while implementing QoS policies. Which of the following tasks is performed by these tools during implementation of QoS policies?
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?
Which of the following protocols is used by voice terminal to communicate with the VoIP server? Each correct answer represents a complete solution. Choose all that apply.
Your client wants to choose a DSL connection with the fastest download rate possible. Which DSL would you recommend?
Which of the following techniques allows multiple computers to share one or more IP addresses?
Which of the following statements are true about session hijacking? Each correct answer represents a complete solution. Choose all that apply.
Use of a long random number or string as the session key reduces session hijacking.
TCP session hijacking is when a hacker takes over a TCP session between two machines.
It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.
Which of the following applications provides an ACD service for a Cisco VoIP network?
Cisco Unified Contact Center
In which of the following OSI model layers does VLAN operate?
Data link layer
h323 is a group of protocols defined by the International Telecommunication Union for multimedia conferences over Local Area Networks. H.323 uses ASN.1 binary code. Which of the following layers of the OSI model is responsible for translating, processing, and reading ASN.1 and ASCII messages?
John works as a Sales Engineer for KBC Inc. He has been assigned a project to install a soft phone on different computers. One of the computer systems on the LAN is experiencing problems in voice quality. Which of the following actions should John perform to resolve the problem?
Upgrade the Network Interface Card (NIC).
You work as a Network Administrator for McNeil Inc. The company has a TCP/IP-based network. Performance of the network is slow because of heavy traffic. A hub is used as a central connecting device in the network. Which of the following devices can be used in place of a hub to control the network traffic efficiently?
Which of the following priorities will you recommend for voice in an 802.1 p VLAN?
John works as a Technician for Blue Tel Inc. He notices errors in a routing table. Which of the following layers of the OSI model is associated with this situation?
Which of the following is a set of networking protocols that permits networked devices to seamlessly discover each others presence on the network?
Which of the following have the specifications that a VLAN has? Each correct answer represents a complete solution. Choose two.
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network. John has been assigned a project to build a network for the sales department of the company. It is important for the LAN to continue working even if there is a break in the cabling. Which of the following topologies should John use to accomplish the task?
Which of the following are the benefits of using Virtual local area network (VLAN) in a company's network? Each correct answer represents a complete solution. Choose all that apply.
It improves security, as broadcasts are limited.
It allows access to network services based on a department, not the physical location.
It simplifies adding and moving hosts on the network.
Andrea works as a Technical Representative for KBC Inc. The company has provided two PBXs of different manufacturers to Andrea and she wants to connect these PBXs and ensure that these interconnected PBXs retain their basic and supplementary services. Which of the following protocols should Andrea use to accomplish the task?
Which of the following parameters are generally used to describe quality of service for IP-based voice and video? Each correct answer represents a complete solution. Choose all that apply.
You work as a technician for McNeil Inc. You want to capture packets linked to SIP and HTTP using the same application. Which of the following monitoring tools will you use to accomplish the task?
You work as a technician for TechPerfect Inc. There are up to 25 telecommuters using VoIP at any given time. You want to ensure that the Web browsing performed by the valid users on your network does not interfere with the required bandwidth for VoIP communications across the Internet. Which of the following technologies will allow you to ensure that the users can browse the Internet while not allowing these users to thwart the operations of the telecommuters?
Which of the following protocols provides sequence numbers to VoIP packets?
Which of the following is responsible for publishing the requests for RFCs that are used to establish TCP/IP specifications?
Which of the following commands are valid only under the POTS dial peers? Each correct answer represents a complete solution. Choose all that apply.
Adam works as a Technician for Inc. He has been asked to recommend an appropriate network bandwidth for a medium to large business. The company will use it for the IP phones, as well as for the data connection. Which of the following would Adam recommend?
Which of the following depicts the ability to smoothly combine e-mail, voice, real-time applications, and Web chat features for a call center representative to use?
Maria works as a Network Administrator for BlueWells Inc. The company has a Windows-based network. The company has created a new network for the Sales department. Maria has been assigned a project to increase the number of devices connected in this network with ease of installation and management. She wants to provide a dedicated link to each device in order to reduce traffic on the network. Which of the following topologies should Maria use to accomplish the task?
Which of the following statements are true about routers? Each correct answer represents a complete solution. Choose all that apply.
Routers organize addresses into classes, which are used to determine how to move packets from one network to another.
Routers act as protocol translators and bind dissimilar networks.
Routers are responsible for making decisions about which of several paths network (or Internet) traffic will follow.
For outside cabling, which of the following cable types is most immune to the effects of lightning?
Rick, an administrator of a TCP/IP network, wants to achieve the following goals: Reduce congestion of network traffic. Optimize the utilization of the IP address space. Which of the following technologies may help him to accomplish the task?
Henry works as a Sales Engineer for BlueWells Inc. Sam, a customer, has asked him to create a solution that allows an application to be shared across the internet. The solution should be extensible and based on industry standards. The solution should not use a proprietary protocol and the application should be delivered to multiple recipients at the same time. The solution should also be robust, as clients will be using the application from Macintosh, Windows, and Linux systems. Which of the following protocols should Henry choose to fulfill Sam's requirement?
The H.323 protocol uses ASN.1 binary code and the Session Initiation Protocol (SIP) uses ASCII text standard to format its messages. Which of the following layers of the OSI model is responsible for translating, processing, and reading ASN.1 and ASCII messages?
Which of the following are examples of interactive communication? Each correct answer represents a complete solution. Choose all that apply.
Which of the following is the process of rewriting source and destination addresses of IP packets as they pass through a router or firewall?
Which of the following is a mechanism used by the Multimedia Extensions (WME) standard to avoid contentions in a particular traffic category?
Contention Window (CW)
Which of the following are the advantages of the Diffserv model? Each correct answer represents a complete solution. Choose two.
Large number of service classes
Computer telephony integration, also called computer-telephone integration or CTI, is technology that allows interactions on a telephone and a computer to be integrated. Which of the following functions can be implemented using CTI? Each correct answer represents a complete solution. Choose all that apply.
Agent state control
Automatic dialing and computer controlled dialing
Call control for quality monitoring/call recording software
Call information display
Voice over IP is an application that requires efficient use of bandwidth and reliability. VoIP must not suffer the delays that can be seen at times with Web sites and Web applications. Which technology can be used to help ensure the efficient transport of VoIP traffic?
Which of the following T.120 recommendations includes multipoint communication service?
Which of the following protocols is responsible for host-to-host communication services?
Which of the following factors are related with bandwidth requirements of a VoIP call? Each correct answer represents a part of the solution. Choose all that apply.
Layer 2 media type
Speech samples per packet