1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
A controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet is called?
D) extranet
The physical or logical arrangement of a network is called the _.
C) Topology
Which of the following is a main advantage of network layering?
B) Allows modular development and troubleshooting
Why is communication over networks broken down into different layers in the OSI model?
B) To allow each layer to handle a specific function
What is a data packet?
B) A small unit of data that is used in network communication
Why are protocols necessary in computer networks?
B) To help different devices to communicate with and understand each other
What is the difference between lossy and lossless data compression?
B) Lossy results in permanent deletion, lossless can recover data compression
Which of the following statements about wireless transmission is CORRECT?
C) It eliminates the need for physical cabling infrastructure
Which switching method breaks data into smaller units and sends them separately?
C) Packet Switching
What's an advantage of wireless networks?
a) Convenience of mobility(very mobile)
Which of the following combinations best describes the hardware and software components needed to successfully connect a PC to a wireless network?
C) Network adapter (hardware), Driver (software)
What best describes how Peer-to-Peer networking works?
B) Devices connect directly to each other to share data, often after discovering peers through a central server.
What is a characteristic of wireless Wi-Fi?
c) Operates at different frequencies mostly
What makes one wireless network more secure than another?
B) on the encryption used and whether there are strong passwords or firewalls
Which of the following is more commonly seen in wireless connection(as opposed to wired)?
A) Satellite
When consistent data flow and minimal external interference are critical, which is a key advantage of a wired network over a wireless one?
A) Lower susceptibility to signal interference
Which of the following pairs a network security method with it's correct disadvantage?
A) Firewall - Can block unauthorized access but cannot prevent attacks from inside the network
Which statement best describes the differences between transmission media?
B) Fiber optic cables provide high-speed and secure transmission but are more costly and harder to install.
Which of the following best explains how data is transmitted using packet switching?
C) Data is divided into packets that may take different routes to the destination and are reassembled in order.
Which Cable uses light to send data?
C) Fiber Optic
How is communication over networks typically organized in a layered architecture?
B) By dividing the communication process into distinct layers, each with specific functions and protocols.
Which of the following are layers within the OSI model? (select all that apply)
A, B, D) Transport, Network, Session
What is the primary purpose of the OSI model in networking?
C) To standardize communication functions into layers
What are protocols?
C) Define actions/ Rules for data transmission
Why are protocols necessary in computer networks?
B) To help different devices to communicate with and understand each other
For internet packetized data, what are the three elements of communication?
D) Preparation, Transmission, Delivery
How is lossless and lossy compression different?
A) Lossless keeps all original data while lossy losses some data
What is one main characteristic of a wireless network?
B) It uses radio waves to transmit data
Which of the following best describes the purpose of a firewall in network security?
B) To monitor and block unauthorized access to or from a private network
Which of the following is an advantage of using firewalls for network security?
C) Firewalls can block unauthorized access from external sources
Which of the following are advantages of Packet Switching? Choose ALL that apply.
A, C) It is more flexible in routing packets over multiple shared links, More robust – packets are resettable in the case of problems
What's a deadlock?
D) When two or more processes are unable to proceed because each are waiting for the other to release a resource
What is the function of a VPN?
B) A VPN encrypts your internet traffic and hides your IP address
Which of the following best describes a peer-to-peer (P2P) network architecture?
B) Each device can act as both a client and a server
What is a benefit of a VPN?
A) It protects your data by encrypting your connection
Which of the following best describes the key hardware and software components of a wireless network?
B) Router, wireless access point, and network management software
What best describes a Virtual Private Network?
C) A secure network connection that allows users to access a private network over a public one
What is a primary reason for dividing communication over a network into layers, as in the OSI model?
B) To allow interoperability between different systems through standardized interface
Which of the following correctly defines "protocol" and "data packet"?
B) A protocol is a set of transmission rules, and a data packet is a unit of data.
When transmitting data across a network, why might lossless compression be preferred over lossy compression?
B) Lossless compression ensures that all original data can be restored after transmission.
What is a characteristic that differentiates wireless networks and wired networks?
Wired networks use metals like copper and silver, while Wireless networks generally use EMF waves (radio frequencies specifically).
Which of the following is an aspect of packet switching?
Packets travel independently through static routes.
Which of the following is true about Wimax?
B) Cheap method for providing internet over a large area
What Is MAC address?
C.) A unique Hardware identifier hard-coded into a device's network interface.
Which of the following network security methods is most effective for encrypting wireless network traffic and is widely recommended today?
B) WPA2