1/50
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following is part of a network’s physical topology?
SHOW ANSWER
A network server’s operating system
A printer plugged into a nearby desktop computer
Password for the wireless network
File permission settings on a desktop computer
A printer plugged into a nearby desktop computer
Which of the following is an advantage of P2P file sharing?
HIDE ANSWER
Scalable
Centrally controlled
Secure
Inexpensive
Explanation: Peer-to-peer networks are often less expensive to set up and maintain than other types of networks. A network operating system, such as Windows Server 2019, is much more expensive than a desktop operating system, such as Windows 10. P2P networks are not scalable and are not necessarily secure. Client-server networks store user accounts and passwords in one place, and access permissions are centrally granted.
Inexpensive
What group must clients join to access network resources in a client-server network?
SHOW ANSWER
Workgroup
Domain
Peer group
RAID
Domain
Which of the following is a secure protocol?
SHOW ANSWER
FTP
HTTP
Telnet
SSH
SSH
Which of the following is a secure protocol?
SHOW ANSWER
FTP
HTTP
Telnet
SSH
MySQL
Which of these protocols could not be used to access a server in a nearby building?
SHOW ANSWER
Telnet
RDP
TLS
SSH
TLS
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?
SHOW ANSWER
Bus topology
Mesh topology
Star topology
Ring topology
star
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?
SHOW ANSWER
Bus topology
Mesh topology
Star topology
Ring topology
switch
Which network types can your smartphone use?
SHOW ANSWER
WAN
LAN
PAN
WAN and LAN
WAN, LAN, and PAN
WAN, LAN, and PAN
At what OSI layer does your browser’s web page request begin its journey through the OSI layers?
SHOW ANSWER
Application layer
Network layer
Data link layer
Physical layer
Application layer
Which layer holds the address of the target application running on the destination computer?
SHOW ANSWER
Application layer
Transport layer
Network layer
Data link layer
Transport layer
Which OSI layer adds both a header and a trailer?
SHOW ANSWER
Transport layer
Network layer
Data link layer
Physical layer
Data link layer
Which fire suppression level provides the most targeted protection?
SHOW ANSWER
Desk level
Rack level
Building level
Room level
Rack level
What is the minimum amount of ESD required to damage sensitive electronic equipment?
HIDE ANSWER
1,500 volts
800 volts
The correct answer 10 volts
Explanation: When your body and a component have different static charges and you touch the component, you can discharge up to 1,500 volts of static electricity without seeing a spark or feeling the discharge. However, it only takes 10 volts to damage the component. This means you could fry a motherboard and never even feel a shock.
2 volts
10 volt
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
HTTPS
Which two encryption protocols might be used to provide secure transmissions for email services?
HTTP and HTTPS
SSL and TLS
FTP and SFTP
SSH and RDP
SSL and TLS
Which of the following applications could be used to run a website from a server?
Hypertext Transfer Protocol
FileZilla
Microsoft Exchange Server
Ngnix
Nginx
As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Identify the problem.
Test the theory to determine the cause.
Establish a plan of action to resolve the problem and identify potential effects.
Document findings, actions, outcomes, and lessons learned.
Identify the problem.
In the event of a fire, the most appropriate failure policy is a blank 1 policy.
power-off
fail-close
fail-open
shutdown
fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Hub-and-spoke
Ring
Hybrid
Peer-to-peer
Peer-to-peer
In Question 6, suppose Windows Server 2019 is installed on one computer. Which networking model can the network now support that it could not support without the upgrade? Hybrid Client-server Hub-and-spoke Peer-to-peer
Client-server
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Client-server
Mesh
Hub-and-spoke
Star
star
You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
FTP
SQL
SMTP
TLS
sql
Which of the following is an application layer protocol?
IP
RDP
TCP
Apache
RDP
. What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
Active Directory (AD) database
2. What is the fundamental distinction between a layer 2 switch and a router?
A layer 2 switch belongs only to its local network and router belongs to two or more networks
3. What is the fundamental distinction between a node and a host?
A host is an endpoint device that hosts or accesses a resource on the network, and a
node is any computer or device that can be addressed on the network
4. What is the fundamental distinction between a MAN and a WAN?
MAN = covers a city.
👉 WAN = covers a country/world.
5. List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
Protocols: TCP and UDP
👉 They add a port number to their headers.
👉 The port identifies the application/service (like web or email).
6. At the network layer, what type of address is used to identify the receiving host?
IP address
7. At the data link layer, which type of network address is used to identify the receiving node?
👉 MAC address, physical address,hardware address, and data link layer address
9. A user can access websites but not email. At which layer of the OSI model should you begin troubleshooting this problem and why?
Application layer — because the problem is with the email app/protocol, not the whole network.
While troubleshooting, you find the problem is complex, affects many users, and even testing your theory won’t solve it. What should you do next?
Escalate the problem (pass it to higher-level support).
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
IDF
Work area
CEO’s office
EF
EF
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP’s side of the demarc.
Look at the manufacturer information on the device’s label.
Look at purchase records for the device to determine when it was acquired.
Look at what kinds of cables are connected to this device.
Look at whether the device is located on the ISP’s side of the demarc
Which of the following devices are you likely to find in the MDF? Choose all that apply.
a. Routers
b. Switches
c. Network printer
d. KVM switch
a. Routers, b. Switches, and d. KVM switch
Which device converts signals from a campus’s analog phone equipment into IP data that can
travel over the Internet?
a. Legacy PBX
b. VoIP phone
c. Voice gateway
d. Dedicated telephone switch
Voice getaway
If you’re shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
AC adapter
Rack ears
Padded feet
Large fans
rack ears
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Fiber-optic cable
Patch cable
Backbone cable
Plenum-rated cable
patch cable
You’ve decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
Zenmap
Microsoft Edge
Command Prompt
PowerShell
. Zenmap, c. Command Prompt, and d. PowerShell
What type of diagram shows a graphical representation of a network’s wired infrastructure?
a. Rack diagram
b. Wiring diagram
c. Network map
d. Network topology
wiring diagram
Which of these is considered a secure place to store a list of documented network passwords?
The CEO’s smartphone
A sticky note under the keyboard
A password manager
The MDF
password manager
What is the first step of inventory management?
Interview users.
Identify network requirements.
List an administrative account’s username and password for each device on a network.
List all components on the network.
List all components on the network.
Give three examples of networked devices that are not computers.
ecurity cameras, SCADA sensors that might be
monitoring environmental controls (such as HVAC), electric utilities, water and sewage, traffic
signals, mass transit, manufacturing equipment, refrigeration units, or lighting and entry systems.
Answers should not include networking devices such as routers, switches, and access points, or
networked devices that run on computers, such as servers
Why is it important to use a structured cabling standard when installing and managing cabling systems?
describes best ways to install various types of networking media to ma performance and upkeep
Why is it important to use plenum-rated cabling in the area above the ceiling tile?
safer than regular coated PVC cabling. produces less smoke when burned and smoke is less toxic
What is the unit of measurement that defines the space available in a rack? How tall are standard racks?
Rack height is measured in rack units (RU or U) with the industry standard being 42U
tall—about 6 feet
Why is it important to minimize cable clutter in a rack?
minimize cable clutter and help prevent airflow blockage and heat buildup
What are some elements that are typically included in network diagrams
physical layout, logical topology, IP address reserves, names of major network devices, types of transmission data
How can you go about gathering the information needed to assemble a thorough operations
manual
visits to data rooms, examination of servers and desktops, review of receipts for software and hardware purchases, use of protocol analyzer or network mgmt software package
n a large organization, how do you typically request permission to perform a network 20.
change?
submit a change of request doc