1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
C
Which of the following is the name for all computers connected to a network that participate directly in network communication?
A. Servers
B. Intermediate devices
C. Hosts
D. Media
B
When data is encoded as pulses of light, which media is being used to transmit the data?
A. Wireless
B. Fiber-optic cable
C. Copper cable
B
Which device is an intermediary device?
A. Hosts
B. Routers
C. Servers
C
Which device is an intermediary device?
A. Hosts
B. Servers
C. Switches
B
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?
A. Physical topology
B. Logical topology
A
Which type of network topology lets you see the actual location of intermediary devices and cable installation?
A. Physical topology
B. Logical topology
C
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?
A. Extranet
B. Intranet
C. LAN
D. WAN
A
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?
A. Extranet
B. Intranet
C. LAN
D. WAN
D
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?
A. Extranet
B. Intranet
C. LAN
D. WAN
D
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?
A. Fault tolerance
B. Scalability
C. QoS
D. Security
C
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
A. Fault tolerance
B. Scalability
C. QoS
D. Security
A
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
A. Fault tolerance
B. Scalability
C. QoS
D. Security
A
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
A. Extranet
B. Extendednet
C. Intranet
D. Internet
What is an ISP?
A. It is a networking device that combines the functionality of several different networking devices in one.
B. It is a protocol that establishes how computers within a local network communicate.
C. It is a standards body that develops cabling and wiring standards for networking.
D. It is an organization that enables individuals and businesses to connect to the Internet.
What characteristic of a network enables it to quickly grow to support new users and
applications without impacting the performance of the service being delivered to existing
users?
A. Reliability
B. Scalability
C. Quality of service
D. Accessibility
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
A. Quality of service (QoS)
B. Scalability
C. Security
D. Fault tolerance
Which is a characteristic of a scalable network?
A. Easily overloaded with increased traffic
B. Grows in size without impacting existing users
C. Is not as reliable as a small network
D. Offers limited number of applications
Which is a characteristic of a scalable network?
A. Easily overloaded with increased traffic
B. Is not as reliable as a small network
C. Suitable for modular devices that allow for expansion
D. Offers limited number of applications
Which device performs the function of determining the path that messages should take through internetworks?
A. A router
B. A DSL modem
C. A web server
D. A firewall
Which Internet connection option does not require that physical cables be run to the building?
A. DSL
B. Cellular
C. Dialup
D. Dedicated leased line
Which Internet connection option does not require that physical cables be run to the building?
A. DSL
B. Satellite
C. Dialup
D. Dedicated leased line
What type of network must a home user access in order to do online shopping?
A. An intranet
B. The Internet
C. An extranet
D. A local area network
What is the Internet?
A. It is a network based on Ethernet technology.
B. It provides network access for mobile devices.
C. A worldwide collection of interconnected LANs and WANs.
D. It is a private network for an organization with LAN and WAN connections.
What is a function of end devices on a network?
A. They originate the data that flows through the network.
B. They direct data over alternate paths in the event of link failures.
C. They filter the flow of data to enhance security.
D. They provide the channel over which the network message travels
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
A. An intranet
B. The Internet
C. An extranet
D. A local area network
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
A. Fault tolerance
B. Scalability
C. Security
D. Quality of Service (QoS)
What type of network traffic requires QoS?
A. Email
B. On-line purchasing
C. Video conferencing
D. Wiki
What term describes a network where one computer can be both client and server?
A. Peer-to-peer
B. Cloud
C. BYOD
D. Quality of service
What term describes a type of network used by people who work from home or from a small remote office?
A. SOHO network
B. BYOD
C. Quality of service
D. Converged network
What term describes a computing model where server software runs on dedicated computers?
A. Client/server
B. Internet
C. Intranet
D. Extranet
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
A. Quality of service
B. Internet
C. Intranet
D. Extranet
What term describes a private collection of LANs and WANs that belongs to an organization?
A. Intranet
B. Internet
C. Extranet
D. Peer-to-peer
D
What is the primary function of intermediary devices in a network?
A) To manage user accounts
B) To store data packets
C) To originate messages from devices
D) To connect end devices to a network
D
What is a key characteristic of a Peer-to-Peer Network?
A) It requires a centralized administration.
B) It is limited to wired connections.
C) Only specific devices can act as servers.
D) All devices can act as both clients and servers.
C
What does Quality of Service (QoS) primarily manage?
A) Physical network infrastructure
B) User authentication processes
C) Congestion and reliable delivery of content
D) Network security protocols
A
Analyze the three goals of network security. Which of the following combinations correctly identifies these goals?
A) Confidentiality, Integrity, Availability
B) Confidentiality, Accessibility, Reliability
C) Availability, Authentication, Integrity
D) Integrity, Security, Confidentiality
A
Which type of network allows packets to take different paths to their destination?
A) Packet-switched network
B) Hybrid network
C) Virtual circuit network
D) Circuit-switched network
B
If an organization wanted to implement a converged network, which approach should they take?
A) Develop a new standard for each technology.
B) Use a single network that supports multiple services.
C) Maintain separate cabling for each service.
D) Continue using outdated technologies.
C
Which characteristic of network architecture ensures continuous operation during hardware failures?
A) Quality of Service (QoS)
B) Scalability
C) Fault Tolerance
D) Security
C
What is the primary purpose of a physical topology diagram?
A) To show the logical connections between devices
B) To represent the protocol used in the network
C) To illustrate the physical location of devices and cable installations
D) To detail the addressing scheme of the network