Networks and servers QUIZES

0.0(0)
studied byStudied by 2 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/50

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

51 Terms

1
New cards

Which of the following is part of a network’s physical topology?

SHOW ANSWER

A network server’s operating system

A printer plugged into a nearby desktop computer

Password for the wireless network

File permission settings on a desktop computer

A printer plugged into a nearby desktop computer

2
New cards

Which of the following is an advantage of P2P file sharing?

HIDE ANSWER

Scalable

Centrally controlled

Secure

Inexpensive

Explanation: Peer-to-peer networks are often less expensive to set up and maintain than other types of networks. A network operating system, such as Windows Server 2019, is much more expensive than a desktop operating system, such as Windows 10. P2P networks are not scalable and are not necessarily secure. Client-server networks store user accounts and passwords in one place, and access permissions are centrally granted.

Inexpensive

3
New cards

What group must clients join to access network resources in a client-server network?

SHOW ANSWER

Workgroup

Domain

Peer group

RAID

Domain

4
New cards

Which of the following is a secure protocol?

SHOW ANSWER

FTP

HTTP

Telnet

SSH

SSH

5
New cards

Which of the following is a secure protocol?

SHOW ANSWER

FTP

HTTP

Telnet

SSH

MySQL

6
New cards

Which of these protocols could not be used to access a server in a nearby building?

SHOW ANSWER

Telnet

RDP

TLS

SSH

TLS

7
New cards

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?

SHOW ANSWER

Bus topology

Mesh topology

Star topology

Ring topology

star

8
New cards

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?

SHOW ANSWER

Bus topology

Mesh topology

Star topology

Ring topology

switch

9
New cards

Which network types can your smartphone use?

SHOW ANSWER

WAN

LAN

PAN

WAN and LAN

WAN, LAN, and PAN

WAN, LAN, and PAN

10
New cards

At what OSI layer does your browser’s web page request begin its journey through the OSI layers?

SHOW ANSWER

Application layer

Network layer

Data link layer

Physical layer

Application layer

11
New cards

Which layer holds the address of the target application running on the destination computer?

SHOW ANSWER

Application layer

Transport layer

Network layer

Data link layer

Transport layer

12
New cards

Which OSI layer adds both a header and a trailer?

SHOW ANSWER

Transport layer

Network layer

Data link layer

Physical layer

Data link layer

13
New cards

Which fire suppression level provides the most targeted protection?

SHOW ANSWER

Desk level

Rack level

Building level

Room level

Rack level

14
New cards

What is the minimum amount of ESD required to damage sensitive electronic equipment?

HIDE ANSWER

1,500 volts

800 volts

The correct answer 10 volts

Explanation: When your body and a component have different static charges and you touch the component, you can discharge up to 1,500 volts of static electricity without seeing a spark or feeling the discharge. However, it only takes 10 volts to damage the component. This means you could fry a motherboard and never even feel a shock.

2 volts

10 volt

15
New cards

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

16
New cards

Which two encryption protocols might be used to provide secure transmissions for email services?

HTTP and HTTPS

SSL and TLS

FTP and SFTP

SSH and RDP

SSL and TLS

17
New cards

Which of the following applications could be used to run a website from a server?

Hypertext Transfer Protocol

FileZilla

Microsoft Exchange Server

Ngnix

Nginx

18
New cards

As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem.

Test the theory to determine the cause.

Establish a plan of action to resolve the problem and identify potential effects.

Document findings, actions, outcomes, and lessons learned.

Identify the problem.

19
New cards

In the event of a fire, the most appropriate failure policy is a blank 1 policy.

power-off

fail-close

fail-open

shutdown

fail-open

20
New cards

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Hub-and-spoke

Ring

Hybrid

Peer-to-peer

Peer-to-peer

21
New cards

In Question 6, suppose Windows Server 2019 is installed on one computer. Which networking model can the network now support that it could not support without the upgrade? Hybrid Client-server Hub-and-spoke Peer-to-peer

Client-server

22
New cards

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Client-server

Mesh

Hub-and-spoke

Star

star

23
New cards

You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

FTP

SQL

SMTP

TLS

sql

24
New cards

Which of the following is an application layer protocol?

IP

RDP

TCP

Apache

RDP

25
New cards

. What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

Active Directory (AD) database

26
New cards

2. What is the fundamental distinction between a layer 2 switch and a router?

A layer 2 switch belongs only to its local network and router belongs to two or more networks

27
New cards

3. What is the fundamental distinction between a node and a host?

A host is an endpoint device that hosts or accesses a resource on the network, and a
node is any computer or device that can be addressed on the network

28
New cards

4. What is the fundamental distinction between a MAN and a WAN?

MAN = covers a city.
👉 WAN = covers a country/world.

29
New cards

5. List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?

Protocols: TCP and UDP
👉 They add a port number to their headers.
👉 The port identifies the application/service (like web or email).

30
New cards

6. At the network layer, what type of address is used to identify the receiving host?

IP address

31
New cards

7. At the data link layer, which type of network address is used to identify the receiving node?

👉 MAC address, physical address,hardware address, and data link layer address

32
New cards

9. A user can access websites but not email. At which layer of the OSI model should you begin troubleshooting this problem and why?

Application layer — because the problem is with the email app/protocol, not the whole network.

33
New cards

While troubleshooting, you find the problem is complex, affects many users, and even testing your theory won’t solve it. What should you do next?

Escalate the problem (pass it to higher-level support).

34
New cards

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?

IDF

Work area

CEO’s office

EF

EF

35
New cards

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP’s side of the demarc.

Look at the manufacturer information on the device’s label.

Look at purchase records for the device to determine when it was acquired.

Look at what kinds of cables are connected to this device.

Look at whether the device is located on the ISP’s side of the demarc

36
New cards

Which of the following devices are you likely to find in the MDF? Choose all that apply.
a. Routers
b. Switches
c. Network printer
d. KVM switch

a. Routers, b. Switches, and d. KVM switch

37
New cards

Which device converts signals from a campus’s analog phone equipment into IP data that can
travel over the Internet?
a. Legacy PBX
b. VoIP phone
c. Voice gateway
d. Dedicated telephone switch

Voice getaway

38
New cards

If you’re shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

AC adapter

Rack ears

Padded feet

Large fans

rack ears

39
New cards

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Fiber-optic cable

Patch cable

Backbone cable

Plenum-rated cable

patch cable

40
New cards

You’ve decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.

Zenmap

Microsoft Edge

Command Prompt

PowerShell

. Zenmap, c. Command Prompt, and d. PowerShell

41
New cards

What type of diagram shows a graphical representation of a network’s wired infrastructure?
a. Rack diagram
b. Wiring diagram
c. Network map
d. Network topology

wiring diagram

42
New cards

Which of these is considered a secure place to store a list of documented network passwords?

The CEO’s smartphone

A sticky note under the keyboard

A password manager

The MDF

password manager

43
New cards

What is the first step of inventory management?

Interview users.

Identify network requirements.

List an administrative account’s username and password for each device on a network.

List all components on the network.

List all components on the network.

44
New cards

Give three examples of networked devices that are not computers.

ecurity cameras, SCADA sensors that might be
monitoring environmental controls (such as HVAC), electric utilities, water and sewage, traffic
signals, mass transit, manufacturing equipment, refrigeration units, or lighting and entry systems.
Answers should not include networking devices such as routers, switches, and access points, or
networked devices that run on computers, such as servers

45
New cards

Why is it important to use a structured cabling standard when installing and managing cabling systems?

describes best ways to install various types of networking media to ma performance and upkeep

46
New cards

Why is it important to use plenum-rated cabling in the area above the ceiling tile?

safer than regular coated PVC cabling. produces less smoke when burned and smoke is less toxic

47
New cards

What is the unit of measurement that defines the space available in a rack? How tall are standard racks?

Rack height is measured in rack units (RU or U) with the industry standard being 42U
tall—about 6 feet

48
New cards

Why is it important to minimize cable clutter in a rack?

minimize cable clutter and help prevent airflow blockage and heat buildup

49
New cards

What are some elements that are typically included in network diagrams

physical layout, logical topology, IP address reserves, names of major network devices, types of transmission data

50
New cards

How can you go about gathering the information needed to assemble a thorough operations
manual

visits to data rooms, examination of servers and desktops, review of receipts for software and hardware purchases, use of protocol analyzer or network mgmt software package

51
New cards

n a large organization, how do you typically request permission to perform a network 20.
change?

submit a change of request doc