1/72
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is part of a network’s physical topology?
a) a networks server’s operating system
b) a printer plugged into a nearby desktop computer
c) password for the wireless network
d) file permission settings on a desktop computer
b) a printer plugged into a nearby desktop computer
Which of the following is an advantage of P2P file sharing?
a) scalable
b) centrally controlled
c) secure
d) inexpensive
d) inexpensive
What group must clients join to access network resources in a client-server network?
a) work group
b) domain
c) peer group
d) RAID
b) domain
Which of the following is a secure protocol?
a) FTP
b) HTTP
c) Telnet
d) SSH
d) SSH
What is an example of an open source DBMS
a) MySQL
b) Microsoft SQL Server
c) TCP/IP suite
d) oracle database
a) MySQL
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?
a) bus topology
b) mesh topology
c) star topology
d) ring topology
c) star topology
Which networking device is best for connecting your network printer to three computers?
a) switch
b) hub
c) router
d) file server
a) switch
Which network types can your smartphone use?
a) WAN
b) LAN
c) PAN
d) WAN & LAN
e) WAN, LAN & PAN
e) WAN, LAN & PAN
At what OSI layer does your browser’s web page request its journey through the OSI layers?
a) application layer
b) network layer
c) data link layer
d) physical layer
a) application layer
Which layer hold the address of the target application running on the destination computer?
a) application layer
b) transport layer
c) network layer
d) data link layer
b) transport layer
Which OSI layer adds both a header and a trailer?
a) transport layer
b) network layer
c) data link layer
d) physical layer
c) data link layer
Which fire suppression level provides the most targeted protection?
a) desk level
b) rack lever
c) building level
d) room level
b) rack lever
What is the minimum amount of ESD required to damage sensitive electronic equipment?
a) 1,500 volts
b) 800 volts
c) 10 volts
d) 2 volts
c) 10 volts
What should you do after making a plan to solve a problem and carry out your plan?
a) document your work
b) find out what has recently changed
c) test your theory
d) verify functionality
d) verify functionality
While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?
a) safety data sheet
b) knowledge base
c) troubleshooting ticket in the call tracking system
d) instruction manual
b) knowledge base
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
a) HTTPS
b) TLS
c) HTTP
d) SSL
a) HTTPS
Which 2 encryption protocols might be used to provide secure transmissions for email services?
a) http and https
b) ssl and tls
c) ftp and sftp
d) ssh and rdp
b) ssl and tls
Which of the following applications could be used to run a website from a server?
a) hypertext transfer protocol
b) filezilla
c) microsoft exchange server
d) nginx
d) nginx
As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
a) identify the problem
b) test the theory to determine the cause
c) establish a plan of action to resolve the problem and identify potential effects
d) document findings, actions, outcomes, and lessons learned
a) identify the problem
In the event of a fire, the most appropriate failure policy is a ______ policy
a) power-off
b) fail-close
c) fail-open
d) shutdown
c) fail-open
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a) client-server
b) mesh
c) hub-and-spoke
d) star
d) star
You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
a) ftp
b) sql
c) smtp
d) tls
b) sql
Which of the following is an application layer protocol?
a) ip
b) rdp
c) tcp
d) apache
b) rdp
At what point does the ISP hand over responsibility to the customer?
a) MDF
b) patch panel
c) demarc
d) IDF
c) demarc
According to structured cabling standards, there must be at least one __ on each floor.
a) IDF
b) MDF
c) demarc
d) work area
a) IDF
Which of the following causes physical layer failures?
a) SCADA
b) PVC
c) STP
d) EMI
d) EMI
Which network diagram shows a logical topology?
a) rack diagram
b) network map
c) floor plan
d) wiring diagram
b) network map
In which life cycle phase is an old device removed from the network?
a) evaluation
b) documentation and maintenance
c) implementation
d) requirement analysis
c) implementation
When an internet connection goes down, what business document defines a customer’s options for paying a reduced rate?
a) MOU
b) SOW
c) RFP
d) SLA
d) SLA
Which change is designed to close a security vulnerability without affecting other component of an application?
a) patch
b) rollback
c) upgrade
d) installation
a) patch
Which change management principle must you apply to all changes regardless of scope or impact?
a) acquire review board approval
b) apply the change as soon as possible
c) submit a change request document
d) document the change
d) document the change
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
a) IDF
b) work area
c) CEO’s office
d)EF
Answers vary but not c
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
a) look at whether the device is located on the ISP’s side of demarc
b) look at the manufacturer info on the device’s lable
c) look at purchase records for the device to determine when it was acquired
d) look at what kinds of cables are connected to this device
a) look at whether the device is located on the ISP’s side of demarc
Which of the following devices are you likely to find in the MDF? Choose all that apply.
a) routers
b) switches
c) network printer
d) KVM switch
a) routers, b) switches & d) KVM switch
Which device converts signals from a campus’s analog phone equipment into IP data that can travel over Internet?
a) legacy PBX
b) VoIP phone
c) voice gateway
d) dedicated telephone switch
c) voice gateway
If you’re shopping for a rack switch, what component on the switch tells you it can be
mounted to a rack?
a) AC adapter
b) rack ears
c) padded feet
d) large fans
b) rack ears
You’ve decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
a) zenmap
b) microsoft Edge
c) command Prompt
d) powerShell
a) zenmap, c) command Prompt & d) powerShell
What type of diagram shows a graphical representation of a network’s wired infrastructure?
a) rack diagram
b) wiring diagram
c) network map
d) network topology
b) wiring diagram
Which of these is considered a secure place to store a list of documented network passwords?
a) the CEO’s smartphone
b) a sticky note under the keyboard
c) a password manager
d) the MDF
c) a password manager
What is the first step of inventory management?
a) interview users.
b) identify network requirements.
c) list an administrative account’s username and password for each device on a network.
d) list all components on the network.
d) list all components on the network.
What business document request vendors to submit a proposal for products or services?
a) RFP
b) MOU
c) SOW
d) SLA
a) RFP (request for proposal)
What document has the the intentions of each party on paper to enter a binding agreement?
a) RFP
b) SOW
c) MOU
d) SLA
c) MOU (memorandum of understanding)
What document has the work that must be completed for a project on paper?
a) RFP
b) MOU
c) SOW
d) SLA
c) SOW (statement of work)
A network consists of five windows 10 pro computers. All connected to a switch, which is connected to a router and the internet. Which model does the network use?
a) bus
b) ring
c) hybrid
d) peer-to-peer
d) peer-to-peer
You want to make sure the connection to your windows server doesn’t fail or become overwhelmed by heavy traffic, what would help you achieve both aims?
a) CARP
b) clustering
c) trunking
d) NIC teaming
d) NIC teaming
When windows server controls network access to a group of computers, this logical group is called which of the following?
a) workgroup
b) homegroup
c) domain
d) access group
c) domain
Protocols in the __ layer accept data from the application (session) layer and manage end-to-end delivery of data.
a) transport
b) data link
c) network
d) physical
a) transport
What is the highest layer of the OSI model that a basic router operates at?
a) physical layer
b) transport layer
c) network layer
d) data link layer
c) network layer
When using NAT, how does an IP gateway ensure that outgoing traffic can traverse public networks?
a) it modifies each outgoing frame’s Type field
b) it assigns each outgoing packet a masked ID via the Options field
c) it replaces each outgoing packet’s Source address field with a public IP address
d) it modifies the frame length to create uniformly sized frames, called cells, which are required for public network transmission
c) it replaces each outgoing packet’s Source address field with a public IP address
The name given to a group of bits at layer 2 of the OSI model is which of the following?
a) frame
b) packet
c) protocol data unit (pdu)
d) segment
a) frame
Which of the following terms best describes the cables that provide interconnection between the MDF and IDF?
a) backbone
b) patch
c) dmarc
d) horizontal
a) backbone
Which of the following devices are you likely to find in the MDF?
a) wifi access points
b) switches
c) network printers
d) copy machines
b) switches
In equipment data rack, the standard width typically adheres to which specific measurement among the following options:
a) 19 inches
b) 20 inches
c) 25 inches
d) 30 inches
a) 19 inches
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
a) fiber-optic cable
b) patch cable
c) backbone cable
d) plenum-rated cable
b) patch cable
Which of the following terms best describes the process of discovering and identifying the devices on a network?
a) network diagram
b) wiring scheme
c) network mapping
d) network graphing
c) network mapping
What type of document is a legally binding contract that defines the aspects of a service provide?
a) MOU (memorandum of understanding)
b) SOW (statement of work)
c) SLA (service level agreement)
d) RFP (request for proposal)
c) SLA (service level agreement)
Which of the following terms best describe a major change to a software package that enhances the functionality?
a) service pack
b) rollback
c) backlevel
d) upgrade
d) upgrade
In the context of Ethernet horizontal cabling, what denotes the maximum permissible distance for transmission?
a) 10 m
b) 100 m
c) 1000 m
d) 50 m
b) 100 m
T/F: a client-server network is the simplest network model
False, not the simplest network model
What is the seventh layer of the OSI model?
a) physical layer
b) transport layer
c) application layer
d) session layer
c) application layer
What is the highest layer of the OSI model that a basic switch operates at?
a) session layer
b) transport layer
c) physical layer
d) data link layer
d) data link layer
The name given to a group of bits as it moves from one layer of the OSI model to the next is which of the following?
a) frame
b) packet
c) protocol data unit (pdu)
d) segment
c) protocol data unit (pdu)
A __ is a central conduit that connects the segments (pieces) of a network
a) bridge
b) backbone
c) WAN
d) LAN
b) backbone
Which of the following terms best describe location of the first point of interconnection between LAN and the Demarc?
a) data closet
b) MDF
c) IDF
d) work area
b) MDF
What is the term used to describe where the ISP’s line/cable enters your building?
a) IDF
b) work area
c) CEO’s office
d) entrance facility
d) entrance facility
What is the name adopted by the data link layer to denote its protocol data unit (PDU)?
a) bit
b) packet
c) frame
d) data
c) frame
Which of the following is an application layer protocol?
a) TCP
b) MAC
c) IP
d) RDP
d) RDP
T/F: Is it accurate to assume that firmware software is intricately woven into hardware devices, that can only be altered through a firmware upgrade?
True, only through an upgrade.
Which of the following protocols could not be used to access a server in a nearby building?
a) SSH
b) RDP
c) TLS
d) telnet
c) TLS
While executing a Nmap scan on your network, which application from the following options is least likely to be utilized for this purpose?
a) powershell
b) command prompt
c) microsoft edge
d) zenmap
c) microsoft edge
In the process of selecting a rack switch, the discerning factor indicating its mountability to a rack is identified through which specific component among the following:
a) patch panel
b) ac adapter
c) rack ears
d) rack height
c) rack ears
What classification accurately describes a graphical representation that specifically depicts the details of a network's wired infrastructure?
a) topology map
b) wiring diagram
c) network diagram
d) system diagram
b) wiring diagram
Which among the following statements accurately describes the fundamental purpose of a software patch, considering its role in the software domain?
a) a software patch is a correction or minor improvement to software.
b) a software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources.
c) a software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities.
d) a software patch involves the process of reverting to a previous version of software after attempting to upgrade it.
a) a software patch is a correction or minor improvement to software.