Free IC3-3 Exam Braindumps (page: 8)

Page 7 of 36

Which of the following connectors are used with fiber-optic cables? Each correct answer represents a complete solution. Choose three.

  1. SC
  2. ST
  3. MT-RJ
  4. F-Type

Answer(s): A,B,C

Explanation:

Following connectors are used with fiber-optic cables:
SC connector: A subscriber connector (SC) is a fiber-optic connector used with multimode fiber. It is a square shaped connector used for terminating fiber optic cables. SC connectors have a push-pull latching mechanism to provide quick insertion and removal while also ensuring a positive connection.
ST connector: A straight tip (ST) connector is a fiber-optic connector used with multimode fiber. An ST connector has a 2.5mm shaft and bayonet locking ring, and allows quick connect and disconnect of 125 micron multi-mode fiber.
MT-RJ connector: The MT-RJ connector is the most recent type of small form factor fiber optic connector. The MT-RJ fiber connector is less than half the size of the SC duplex connector and transceiver, so it doubles the port density of fiber-optic LAN equipment. The connector is a 2-fiber connector and takes up no more room than an RJ-45 jack.
Answer option D is incorrect. An F-type connector is a threaded medium performance coaxial signal connector, which is used in TVs and VCRs. The pin of the connector is actually the center conductor of the coaxial cable. It is an inexpensive connector.



Which of the following IEEE standards defines the local multipoint distribution service?

  1. IEEE 802.16.1
  2. IEEE 802.18
  3. IEEE 802.15.1
  4. IEEE 802.19

Answer(s): A

Explanation:

The IEEE 802.16.1 standard defines the local multipoint distribution service.
Answer option C is incorrect. The IEEE 802.15.1 standard defines Bluetooth certification.
Answer option B is incorrect. The IEEE 802.18 standard defines Radio Regulatory TAG.
Answer option D is incorrect. The IEEE 802.19 standard defines the Coexistence TAG.



The goal of computer security is to protect information and property from theft, corruption, or natural disasters while allowing the information and property to remain accessible to authorized users.
Which of the below mentioned actions would you perform to secure your system? Each correct answer represents a complete solution. Choose all that apply.

  1. Install a firewall.
  2. Run unknown e-mail attachments.
  3. Install an antivirus.
  4. Update and patch an operating system.

Answer(s): A,C,D

Explanation:

Security is a process, not a product. The goal of computer security is to protect information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible to authorized users. The requirement of security is very high in all sectors, as practically everyone uses the Internet and wants to protect their resources and information against malicious attackers.
Some basic security tips are as follows:
Always take backups.
Update and patch the operating system, Web browser, and other software.
Install a firewall.
Review the Web browser and e-mail settings for optimal security. Install antivirus software and set for automatic updates. Do not open and run unknown e-mail attachments and programs.



Which of the following terms are allowed by Boolean search strings to refine a search? Each correct answer represents a complete solution. Choose all that apply.

  1. NAND
  2. NOT
  3. OR
  4. AND

Answer(s): B,C,D

Explanation:

Boolean search strings allow the use of terms such as AND, OR, and NOT to refine the search and produce results. Google acquires AND with every search on multiple keywords. By default, most search engines and directories use some Boolean terms.






Post your Comments and Discuss Certiport IC3-3 exam with other Community members:

IC3-3 Discussions & Posts