Net + Practice Tests

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the Physical Layer up to the Application Layer.

False

2
New cards

In the OSI model, the Layer 4 TCP protocol data unit is referred to as:

Segment

3
New cards

Which of the answers listed below refers to the Physical Layer of the OSI model?

Layer 1

4
New cards

Layer 7 of the OSI model is also known as:

Application Layer

5
New cards

At which OSI layers is the protocol data unit referred to simply as data?

Application Layer, Presentation Layer, and Session Layer

6
New cards

Which of the following answers refers to Layer 5 of the OSI model?

Session Layer

7
New cards

What is the name of Layer 3 in the OSI model?

Network Layer

8
New cards

Which of the answers listed below refers to Layer 4 of the OSI model?

Transport Layer

9
New cards

Which of the following answers describe the characteristics of a router?

  • Connects multiple networks together

  • Operates at Layer 3 of the OSI model

  • Uses IP addresses to send data packets to their destination

10
New cards

Which of the answers listed below refer to a network switch?

  • Connects multiple devices within a single network

  • Uses MAC addresses to forward data frames to the correct port

  • Operates at Layer 2 of the OSI model

11
New cards

Which of the following answers refers to a hardware security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Firewall

12
New cards

Which of the answers listed below illustrates the difference between passive and active network security breach response?

IDS vs. IPS

13
New cards

Which of the following answers can be used to describe the characteristic features of an IDS?

  • Does not take direct action to block or prevent attacks

  • Generates alerts and notifies security personnel when suspicious activity is detected

  • Monitors network traffic without direct involvement in traffic routing or packet modification

14
New cards

Which of the answers listed below refer to an IPS?

  • Takes proactive measures to block or mitigate intrusion attempts

  • Operates in an inline mode, actively intercepting and inspecting network traffic

  • Can drop or reject network packets, terminate connections, or take other actions to stop the attack

15
New cards

A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is called:

Load Balancer

16
New cards

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Proxy

17
New cards

A dedicated storage appliance that can be added to a local network is known as:

NAS (Network Attached Storage)

18
New cards

A dedicated local network consisting of devices providing data access is called:

SAN (Storage Area Network)

19
New cards

A WAP is a specific type of AP that allows Wi-Fi capable devices to connect to a wired network.

True

20
New cards

Which network infrastructure device enables centralized management of WAPs?

Wireless LAN Controller (WLC)

21
New cards

One of the key benefits provided by a CDN is the improvement of:

Content load times

22
New cards

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

VPN (Virtual Private Network)

23
New cards

Which of the following answers refers to a solution that allows network administrators to prioritize certain types of network traffic?

QoS (Quality of Service)

24
New cards

A field in an IP packet that specifies how many more hops a packet can travel before being discarded is known as:

TTL (Time to Live)

25
New cards

Which of the answers listed below refers to a solution that enables the replacement of traditional network hardware functionalities with software via virtualization?

NFV (Network Functions Virtualization)

26
New cards

Which of the following terms can be used to describe an isolated network area hosted within a public cloud environment?

VPC (virtual private cloud)

27
New cards

Which of the answers listed below can be used to describe the concept of a Network Security Group (NSG)?

  • Provides firewall-like capabilities

  • Applies security rules to specific virtual NICs (more granular control)

  • Used for controlling inbound and outbound traffic in cloud computing environments

28
New cards

Which of the following answers refer to the characteristics of a Network Security List (NSL)

  • Provides firewall-like capabilities

  • Applies security rules at the subnet level (less granular control)

  • Used for controlling inbound and outbound traffic in cloud computing environments

29
New cards

A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet is called:

Internet Gateway

30
New cards

Which of the statements listed below describe the functions of a cloud gateway using NAT?

  • Enables instances within a VPC to access external networks

  • Translates private IP addresses to a public IP address

  • Restricts inbound connections from external networks

31
New cards

Which network connectivity option enables a secure, encrypted Internet connection between an on-premises network and cloud resources?

VPN (Virtual Private Network)

32
New cards

Which cloud connectivity option provides a dedicated, private connection between an on-premises network and a cloud provider?

Direct Connect

33
New cards

Which of the following answers refers to a cloud deployment model where computing resources (such as servers, storage, and applications) are owned and operated by a third-party cloud service provider and shared across multiple organizations or tenants?

Public Cloud

34
New cards

A type of cloud deployment model where cloud resources are used exclusively by a single organization is referred to as:

Private Cloud

35
New cards

A hybrid cloud is a cloud computing environment that combines elements of both public and private clouds.

True

36
New cards

A cloud computing service model that provides remote access to software applications based on a subscription fee is known as:

SaaS (Software as a Service)

37
New cards

Which of the answers listed below refers to a cloud computing service model where clients, instead of buying hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

IaaS (Infrastructure as a Service)

38
New cards

Which cloud computing service model would provide the best solution for a web developer intending to create a web app?

PaaS (Platform as a Service)

39
New cards

Which of the following terms refers to the ability of a system to handle increased load by gradually adding resources, such as additional servers or storage, in a planned and deliberate manner over time?

Scalability

40
New cards

Which of the terms listed below refers to the automatic and dynamic adjustment of resources based on real-time demand changes?

Rapid elasticity

41
New cards

Which of the following terms refers to a software architecture where multiple users, each with their own isolated environment and resources, are served by a single application instance?

Multitenancy

42
New cards

What is the function of FTP?

File exchange

43
New cards

Which of the answers listed below refers to a network protocol for secure file transfer over SSH?

SFTP (Secure File Transfer Protocol)

44
New cards

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:

SSH (Secure Shell)

45
New cards

What are three key characteristics of Telnet?

  • Provides username & password authentication

  • Transmits data in an unencrypted form

  • Enables remote login and command execution

46
New cards

Which of the following answers refers to a secure replacement for Telnet?

SSH ( Secure Shell)

47
New cards

The SMTP protocol is used for:

  • Sending email messages between mail servers

  • Sending email messages from a client device

48
New cards

Which of the answers listed below refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS (Domain Name System)

49
New cards

Which of the following network protocols provides an alternative solution to the manual allocation of IP addresses?

DHCP (Dynamic Host Configuration Protocol)

50
New cards

What are the characteristic features of TFTP?

  • Provides no security features

  • A very basic form of file-sharing protocol