1/39
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
D. A network is a group of computers and other devices (printers) that are connected by some type of transmission media
What is the definition of a network?
A. A building is comprised of the wiring that flows throughout an office space or building
B. A network is computer hardware working together
C. A network is a group of devices
D. A network is a group of computers and other devices (printers) that are connected by some type of transmission media
A. Logical network topology refers to how data is transmitted between devices in a network. Physical topology deals with the actual layout of devices and cables
What are the differences between physical and logical network topology?
A. Logical network topology refers to how data is transmitted between devices in a network
B. Bus network topology refers how data is transmitted between devices in a network. Ring topology deals with the actual layout of devices and cables
C. Physical computer topology refers to how data is transmitted between devices in a network. Logical topology deals with the actual layout of devices and cables
D. Peer-to-peer network topology refers to how data is transmitted between devices in a network. Star topology deals with the actual layout of devices and cables
A. A peer-to-peer network is simple to configure and requires little technical expertise
C. The computers on a peer-to-peer network can share folders and files without the need for an expensive server
Connie is configuring the network for a new restaurant that her company is about to open. She has five desktop computers, four LaserJet printers, and three laptops. She plans on using a peer-to-peer environment. What makes peer-to-peer suitable for Connie's restaurant? (Choose all that apply)
A.A peer-to-peer network is simple to configure and requires little technical expertise
B. Peer-to-peer is scalable, which means, as the network grows, it is easy to add and change elements
C. The computers on a peer-to-peer network can share folders and files without the need for an expensive server
D. A peer-to-peer network is practical for connecting more than a few computers, since it is not time-consuming to manage network resources
A. Access to multiple shared resources (data files or printers) can be centrally granted to individual users or groups of users
B. Problems on the network can be monitored, diagnosed, and often fixed from one location
C. User accounts and passwords to the network area assigned in one place
What are some of the benefits of working in a client-server environment?
(choose all that apply)
A. Access to multiple shared resources (data files or printers) can be centrally granted to individual users or groups of users
B. Problems on the network can be monitored, diagnosed, and often fixed from one location
C. User accounts and passwords to the network area assigned in one place
D. A central server makes upgrading the network cheaper
B. Client-server can sign in to the network from any computer and get access to the resources that AD allows, a process managed by AD.DS). Sharing files on a peer-to-peer network means creating 30 user accounts to share documents and then set up each workstation with the same user accounts
C. In a client-server network, an administrator can ensure only authorized users can access the network
D. In a client-server network, an administrator can control what files a user can open, read, or edit
Why is it better for a company with 30 users to use a client-server architecture over peer-to-peer?
(choose all that apply)
A. In a client-server network, servers only need as much memory as the clients since their workload is the same
B. Client-server can sign in to the network from any computer and get access to the resources that AD allows, a process managed by AD.DS). Sharing files on a peer-to-peer network means creating 30 user accounts to share documents and then set up each workstation with the same user accounts
C. In a client-server network, an administrator can ensure only authorized users can access the network
D. In a client-server network, an administrator can control what files a user can open, read, or edit
True
Protocols are rules between networked devices for communication
True
False
TCP/IP
What are the two primary network protocols used for communication?
A. SMPT/POP3
B. SSL/TLS
C. TCP/UDP
D. TCP/IP
C. The SMTP server address is used whenever Larkin's sends email
Larkyn is in the process of setting up his email account and is being prompted for his SMTP server address. What is the SMTP server address for?
A. The SMTP server address decrypts email as it is received
B. The SMTP server address encrypts email as it sends it
C. The SMTP server address is used whenever Larkin's sends email
D. The SMTP server address downloads messages to Larkin's computer
D. The POP3 server is responsible for receiving email on a mail server. When Mace logs on, the POP3 server will download the email to his email client, such as Outlook, and then typically remove it from the server
Mace is in the process of setting up his email account and is being prompted for his POP3 server address. What does the POP3 server do when email is sent to it?
A. The POP3 server is responsible for sending emails to the mail server when Mace sends email
B. The POP3 server will encrypt email as it is sent from Mace's client
C. The POP3 server is responsible for receiving email on the mail server. When Mace logs on, the POP3 server will download the email to Mace's client and keep it on the email server
D. The POP3 server is responsible for receiving email on a mail server. When Mace logs on, the POP3 server will download the email to his email client, such as Outlook, and then typically remove it from the server
False
When using IMAP4, email is downloaded to the client computer and then usually deleted from the server. In contrast, with POP3, the client application manages the email while it remains on the server, making it ideal for accessing email from multiple devices.
True
False
True
DNS helps clients find web servers over a network such as the Internet. It translates domain names (www.example.com) into IP addresses (192.0.2.1) that computers use to communicate with each other over a network.
True
False
B. Leave the website since HTTPS is not secure
(mistake?)
Katherine goes to her banking website to transfer money between her checking and savings accounts. Before she makes a transaction, she looks at the top left of her browser's navigation bar and sees that the website is using HTTP and not HTTPS. What should Katherine do?
A. Continue with her transaction; it doesn't matter if the website is secure as she had virus protection
B. Leave the website since HTTPS is not secure
C. Try another browser to see if the website is secure through the other browser
D. Call her bank to complain about the website
B. Telnet is not an encrypted application. Therefore, transmissions can be subject to spying
Gael wants to remote into a client's computer using Telnet, but the client refuses. Why is the client refusing to allow Gael to use Telnet?
A. Telnet is an old protocol and is no longer used
B. Telnet is not an encrypted application. Therefore, transmissions can be subject to spying
C. A user license for Telnet is required
D. Telnet has been known to have multiple vulnerabilities that make it susceptible to attack
A hub broadcasts incoming data to all ports, while a switch directs incoming data to the port(s) that will send it to its intended destination within the local network
What is the main difference between a switch and a hub?
A. Hubs can only be used in a star topology, whereas switches can only be used in a mesh topology
B. A hub broadcasts incoming data to all ports, while a switch directs incoming data to the port(s) that will send it to its intended destination within the local network
C. A switch broadcasts incoming data to all ports while a hub directs incoming data to the port(s) that will send it to its intended destination within the local network.
D. There's no difference between the two except switches move data faster than hubs
Star topology
Jacoby arranged five computers and two network-capable Laserjet printers in his office and connected them to a switch. What is this physical topology called?
A. ring
B. star
C. mesh
D. hybrid
mesh
Jenney wants to connect all her devices to one another without a central device, creating a fully interconnected network. What is this physical topology called?
A. hybrid
B. mesh
C. star
D. ring
router
printer
desktop computer
Which of the following devices have NICs either on board or attached to an expansion slot not including wireless adapters?
(choose all that apply)
standalone scanner
router
printer
desktop computer
spine
(mistake?)
Kenneth toured the new building's telecom room and saw a dozen switches connected with a fiber connection on one port and the rest of the ports connected to Cat 8 cable. What is the fiber conduit called?
A. wide area network
B. campus area network
C. spine
D. backbone
PAN
Tia is using a smartwatch , a Bluetooth headset, and carrying her phone. What type of network is this an example of?
A. WLAN
B. WAN
C. PAN
D. BAN
router
Maddox is setting up two separate networks on different floors of a building for the sales and marketing departments. Although the networks are completely separate, they need to be able to communicate with each other. Which device should be used so the networks can communicate?
switch
hub
router
node
A router with three routing ports serving the three offices and a switch for the hosts
Nan is the IT manager for a company that's expanding into new offices. She has three business units in different offices. She wants to keep the networks separate but also wants the devices on each network to communicate with each other in the same office. How should the office be set up?
A. Four switches, one for each office and one to connect the offices
B. A switch with three switching ports serving the three offices and a router for the hosts
C. A router with three routing ports serving the three offices and a switch for the hosts
D. Four routers, one for each office and one to connect the offices
San Francisco LAN-WAN/ISP/WAN-New York LAN
Xander is the IT manager for SimCo, which has offices located in San Francisco AND New York. Today, he is planning to test a new employee on their knowledge of how the network connects between the two offices. This is a standard connection, no encryption is involved. What is involved in making the connections between the San Francisco and New York offices?
A. San Francisco WAN-ISP-New York WAN
B. San Francisco-IAP-New York
C. San Francisco LAN-New York LAN
D. San Francisco LAN-WAN/ISP/WAN-New York LAN
Presentation Layer (Layer 6)
Which OSI model layer is responsible for reformatting, compressing and encrypting data in a way that the application on the receiving end can read?
A. Transport Layer (Layer 4)
B. Presentation Layer (Layer 6)
C. Network Layer (Layer 3)
D. Session Layer (Layer 5)
Session (Layer 5)
Which layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
A. Session (layer 5)
B. Application (layer 7)
C. Transport (layer 4)
D. Presentation (layer 6)
A. UDP is a connectionless protocol that doesn't guarantee delivery and is used for broadcasting, streaming video/audio over the web, and monitoring network traffic where guaranteed delivery is not as important as fast transmission. Referred to as best-effort protocol, or fire-and-forget protocol.
C. TCP is a connection-oriented protocol used by apps like web browsers and email. It ensures data delivery by making a connection with the end host, checking if the data is received, and resending it if required
What are the primary transport layer protocols, and what is their function in transporting application layer payloads from one app to another?
A. UDP is a connectionless protocol that doesn't guarantee delivery and is used for broadcasting, streaming video/audio over the web, and monitoring network traffic where guaranteed delivery is not as important as fast transmission. Referred to as best-effort protocol, or fire-and-forget protocol.
B. The principal protocol is the IP (Internet Protocol). IP adds its own network layer header to the segment or datagram.
C. TCP is a connection-oriented protocol used by apps like web browsers and email. It ensures data delivery by making a connection with the end host, checking if the data is received, and resending it if required
D. SNMP programs, which monitor and gather information about network traffic and can alert network admins about adverse conditions that need attention.
Network (layer 3)
Which OSI layer is responsible for transmitting messages from one node to another until they reach their intended destination host?
A. data link (layer 2)
B. physical (layer 1)
C. network (layer 3)
D. transport (layer 4)
True
An IP address is an address assigned to each node on a network, which the network layer uses to uniquely identify them across multiple networks
True
False
A. NICs work at the physical layer and the data link layer
B. Wi-Fi protocol
C. Ethernet protocol
On which layer or layers does the NIC operate, and what are some examples of the protocols that a NIC uses for communication?
A. NICs work at the physical layer and the data link layer
B. Wi-Fi protocol
C. Ethernet protocol
D. NICs work at the physical layer
False
A physical address is embedded on every network adapter on the globe. This is called a NAC (Network Access Control) address
True
False
SNMP (Simple Network Management Protocol)
Diana is seeking ways to effectively manage her network. There are protocols available that allow network managers to check, monitor, and gather information about network traffic. These protocols can alert network administrators about any adverse conditions that require attention to maintain the health of their network and host devices without relying on third-party software. Which protocol offers this capability?
A. ARP
B. SNMP
C. API
D. ICMP
D. Darwin needs 6 NICs for the router. One for each network and one for the ISP connection, and he needs 5 switches, one port on each switch will be dedicated to the NIC on the router
Darwin is planning to set up 5 different networks for 5 different offices for the same company and in the same building, all of which will be connected to a single ISP. Each network will be confined to a single large office, which will have 5 computers and a LaserJet printer. All devices within the individual offices will be interconnected. Darwin needs to know how many NICs in the router and how many switches will be needed for his plan to work. There will be no communication between networks.
A. Darwin needs two NICs for the router. One for a network port and one for the ISP connection, and he needs six switches, one for each office and as a central switch each office will connect to. One port on the switch will be dedicated to the NIC on the router.
B. Darwin needs two NICs for the router. One for the network and one for the ISP connection, and he can use one 35 port switch to connect all of the devices in all of the offices.
C. Darwin needs four NICs for the router. One for every two networks and one for the ISP connection, and he needs five switches one port on each switch will be dedicated to the NIC on the router.
D. Darwin needs six NICs for the router. One for each network and one for the ISP connection, and he needs five switches; one port on each switch will be dedicated to the NIC on the router.
room level
At what level do you find gas suppression systems?
room level
rack level
ground level
building level
OSHA
Lani just started working at a NOC and must follow certain guidelines whenever she uses tools in her job. Which government agency provides these guidelines?
OSHA
EPA
FDA
NHTSA
A. He discharged static electricity onto the motherboard because he wasn't grounded, which shocked the board and caused it to reboot.
D. He was working on his computer while it was turned on and the electronics inside were generating static electricity
Anwar was working on his desktop computer and left it on while he worked on it. Suddenly, the screen went blank, and the computer restarted. Just before this happened, Anwar felt a slight shock. What might have caused the computer to restart?
(choose all that apply)
A. He discharged static electricity onto the motherboard because he wasn't grounded, which shocked the board and caused it to reboot.
B. He accidentally hit the reset switch, so the computer rebooted
C. He accidentally jiggled the power cord, so the power momentarily went off and on
D. He was working on his computer while it was turned on and the electronics inside were generating static electricity
C. She unplugged the computer and grounded herself by touching the metal chassis and sometimes the power supply
Willanda had a passion for working with computers. In fact, she loved it so much that she would occasionally build them from scratch for her friends. One of her golden rules was to never work without an ESD wrist strap, which protects the computer from static electricity. However, one day a friend called her in need of help because a memory chip had died. Willanda went to her friend's house to fix it, but she realized that she had forgotten her ESD wrist strap at home. Despite this, she was still determined to complete the task. She proceeded very carefully, taking all necessary precautions to avoid any potential damage to the computer. How was Willanda able to accomplish her task without damaging the computer or injuring herself even though she did not have the wrist strap?
A. She took out the power supply
B. She worked on a wooden bench
C. She unplugged the computer and grounded herself by touching the metal chassis and sometimes the power supply
D. She wore rubber gloves
What has recently changed?
To identify the problem and its symptoms in troubleshooting, you have to start by asking one simple but important question. What is that question?
A. Did you add or take anything off your computer?
B. What has recently changed?
C. What did you do?
D. What happened?
Establish a theory of probable cause
Francisco worked in a Network Operations Center (NOC) for a medium-sized business. Everything was working fine on Friday, but on Monday, he received some technical service tickets complaining about the Internet being down. He started investigating the issue by looking through the visitor logs. He knew that a cleaning crew comes once a week to clean the floors of the NOC and make sure there is no dust around the desks. He discovered that the cleaning crew had been inside the NOC on Saturday. Francisco then checked every rack and noticed that some cables were unplugged, which were connected to a router connected to the WAN. He plugged the cable back in, and the Internet came back online. What troubleshooting step was Francisco on?
A. Establish a plan for resolving the problem
B. Identify the problem and its symptoms
C. Test your theory to determine the cause
D. Establish a theory of probable cause
Establish a plan for resolving the problem
Orien has recently discovered that two ports on one of his company's managed Layer 3 switches are intermittently failing. Since all ports on the switch are already in use, replacing the switch would cause significant disruption to the majority of the office staff. Orien must adhere to the change management policy in place and develop a plan that will minimize any potential disruption to the staff. What troubleshooting step is Orien on?
A. Document findings, actions, and outcomes
B. Test your theory to determine the cause
C. Establish a plan for resolving the problem
D. Implement the solution or escalate the problem
Verify functionality and implement preventative measures
Warda just finished repairing a company desktop computer. There seemed to be a power supply issue. The user told Warda that sometimes the computer would shut down for no reason and occasionally they would hear strange noises coming from the power supply fan. Once there was a burning smell coming from the computer. So after hearing those symptoms, Warda replaced the power supply with a new, more powerful one. She then ran tests on the power supply through the CMOS utilities, and the problem disappeared. What troubleshooting step was she on?
A. Verify functionality and implement preventative measures
B. Establish a plan for resolving the problem
C. Document findings, actions, and outcomes
D. Implement the solution or escalate the problem
D. Handle it like you would if you were on a trip. Roll it over different terrain in a suitcase for a couple of days, put it in and take it out of the car, and then check it again for errors by using the onboard diagnostic utilities.
Rayco just finished repairing a company laptop. There seemed to be a memory chip issue. Sometimes, while the user traveled with the laptop, the system would randomly crash and get a blue screen of death (BSOD), and occasionally the system became unstable or would sometimes lose data. This only happened when the laptop was traveling, such as in an airplane, or was just taken out of luggage after traveling. When the laptop was at the office, everything was fine. After the user explained the symptoms to Rayco, he believed he knew most likely what the problem was. So, he took apart the laptop and checked the memory modules. One of the chips was not all the way pressed into its slot. So, he pushed the chip back in its slot and checked the other chips; everything else was fine. Rayco then put the machine back together. What would be a good way for Rayco to test the laptop to see if he can get the same errors to happen again?
A. Roll it around in luggage for an hour or two and maybe into the parking lot and then check for errors
B. Hand it back to the user and tell her it's fixed, and they can take it on their next trip.
C. Shake it vigorously for a few minutes to see if that dislodges the memory chips.
D. Handle it like you would if you were on a trip. Roll it over different terrain in a suitcase for a couple of days, put it in and take it out of the car, and then check it again for errors by using the onboard diagnostic utilities.