1/43
from textbook
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is a Network?
A group of computers and other devices (like printers) that are connected by some type of transmission media. From 2 computers connected by a cable to the Internet with billions of computers and devices.
Compare physical topology and logical topology
Physical topology refers to a networks hardware and how computers, other devices, cables and radio signals work together to form the physical network,
while logical topology refers to how the software controls access to network resources (including how users/software’s initially gain access to network) and how those resources (applications and databases) are shared on the network
Compare the differences between a client-server network model and a peer-to-peer network model.
in a client-server network, the security, access, and resources are managed by 1 or more network operating systems (NOS) as long as they have similar NOS’s installed
in a peer-to-peer network model, the administration, resources, and security are managed by each host/node in the peer-to-peer network
What are the pros and cons of using peer-to-peer networks?
Pros
simple to configure and usually cheaper to set up and maintain than other types of networks
Cons
not scalable or practical when the network has more than 15 computers (hosts) and not secure enough
In a Windows domain, what is the role of AD (active directory)?
to be the centralized directory database that contains user account information and security for the entire group of computers.
What process does AD DS (active directory domain services) manage?
AD DS manages the process where each user that has their own domain-level account that is assigned by the network admin, from a local account to Microsoft account that gets its’ resources with Microsoft cloud, can sign into any computer on the network to get access to resources the AD allows.
What is the NOS (network operating system) responsible for?
(examples are windows server 2019, Ubuntu server, or red hat enterprise Linux)
managing data and other resources for clients
ensuring that only authorized users access the network
controlling what types of files a user can open and read
restricting when and from where users can access the network
dictating which rules computers will use to communicate
in some situations, supplying applications and data files to clients
Even though servers that have NOS require more memory, processing power and storage capacity in a client-server network, what are the advantages it has over peer-to-peer?
user accounts and passwords to the network are assigned in one place
access to multiple shared resources (data files or printers) can be centrally granted to a single user or group of users
problems on the network can be monitored, diagnosed, and often fixed from one location
client-server networks are more scalable than p2p networks and is easier to add users and devices to a client-server network
What are the aka’s of client-server network models?
client-server architecture
client-server topology
Which of the following is part of a network’s physical topology?
a) a networks server’s operating system
b) a printer plugged into a nearby desktop computer
c) password for the wireless network
d) file permission settings on a desktop computer
b) a printer plugged into a nearby desktop computer
Which of the following is an advantage of P2P file sharing?
a) scalable
b) centrally controlled
c) secure
d) inexpensive
d) inexpensive
What group must clients join to access network resources in a client-server network?
a) work group
b) domain
c) peer group
d) RAID
b) domain
Which of the following is a secure protocol?
a) FTP
b) HTTP
c) Telnet
d) SSH
d) SSH
What is an example of an open source DBMS
a) MySQL
b) Microsoft SQL Server
c) TCP/IP suite
d) oracle database
a) MySQL
Which of these protocols could not be used to access a server in a nearby building?
a) Telnet
b) RDP
c) TLS
d) SSH
c) TLS
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?
a) bus topology
b) mesh topology
c) star topology
d) ring topology
c) star topology
Which networking device is best for connecting your network printer to three computers?
a) switch
b) hub
c) router
d) file server
a) switch
Which network types can your smartphone use?
a) WAN
b) LAN
c) PAN
d) WAN & LAN
e) WAN, LAN & PAN
e) WAN, LAN & PAN
At what OSI layer does your browser’s web page request its journey through the OSI layers?
a) application layer
b) network layer
c) data link layer
d) physical layer
a) application layer
Which layer hold the address of the target application running on the destination computer?
a) application layer
b) transport layer
c) network layer
d) data link layer
b) transport layer
Which OSI layer adds both a header and a trailer?
a) transport layer
b) network layer
c) data link layer
d) physical layer
c) data link layer
Which fire suppression level provides the most targeted protection?
a) desk level
b) rack lever
c) building level
d) room level
b) rack lever
What is the minimum amount of ESD required to damage sensitive electronic equipment?
a) 1,500 volts
b) 800 volts
c) 10 volts
d) 2 volts
c) 10 volts
What should you do after making a plan to solve a problem and carry out your plan?
a) document your work
b) find out what has recently changed
c) test your theory
d) verify functionality
d) verify functionality
While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?
a) safety data sheet
b) knowledge base
c) troubleshooting ticket in the call tracking system
d) instruction manual
b) knowledge base
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
a) HTTPS
b) TLS
c) HTTP
d) SSL
a) HTTPS
Which 2 encryption protocols might be used to provide secure transmissions for email services?
a) http and https
b) ssl and tls
c) ftp and sftp
d) ssh and rdp
b) ssl and tls
Which of the following applications could be used to run a website from a server?
a) hypertext transfer protocol
b) filezilla
c) microsoft exchange server
d) nginx
d) nginx
As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
a) identify the problem
b) test the theory to determine the cause
c) establish a plan of action to resolve the problem and identify potential effects
d) document findings, actions, outcomes, and lessons learned
a) identify the problem
In the event of a fire, the most appropriate failure policy is a ______ policy
a) power-off
b) fail-close
c) fail-open
d) shutdown
c) fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
a) hub-and -spoke
b) ring
c) hybrid
d) peer-to-peer
d) peer-to-peer
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a) client-server
b) mesh
c) hub-and-spoke
d) star
d) star
You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
a) ftp
b) sql
c) smtp
d) tls
b) sql
Which of the following is an application layer protocol?
a) ip
b) rdp
c) tcp
d) apache
b) rdp
What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
active directory
What is the fundamental distinction between a layer 2 switch and a router?
a layer 2 switch belongs only to its local network,
and router belongs to 2 or more networks
What is the fundamental distinction between a node and a host?
a host is an endpoint device that hosts or accesses a resource on the network,
and a node is any computer or device that can be addressed on the network
What is the fundamental distinction between a MAN and a WAN?
MAN covers smaller, more defined geographical area,
and a WAN covers a large geographical area
List 2 protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
TCP (transmission control protocol) and UDP (user datagram protocol)
the port addresses the receiving application
At the network layer, which type of address is used to identify the receiving host?
ip address
At the data link layer, which type of network address is used to identify the receiving node?
physical address, MAC address, hardware address, or data link layer address
A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
physical
the data link layer and physical layer
A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?
application layer because all email protocols (smtp, pop3, imap4) function at this layer
While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won’t even solve the problem. What should you do next in the troubleshooting process?
escalate the problem