Chapter 1 Exam question and answers
Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?
Byod
Which two Internet connection options do not require that physical cables be run to the building?
Cellular and sattelite
Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office?
dsl and cable
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?
implementing a firewall installing antivirus software
What is a characteristic of a converged network?
it delivers data, voice, and video over the same network infrastructure
A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to- peer network?
less cost to implement scalable easy to create
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
security
Which statement describes the use of powerline networking technology?
A device connects to an existing home LAN using an adapter and an existing electrical outlet.*
Which statement describes a characteristic of cloud computing?
Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.*
Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
Wireless Lan
Which expression accurately defines the term bandwidth?
a measure of the data carrying capacity of the media
Which device performs the function of determining the path that messages should take through internetworks?
a router
What security violation would cause the most amount of damage to the life of a home user?
capturing of personal data that leads to identity theft
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
congestion
A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
data confidentiality
A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
implementing a firewall and installing antivirus
An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
intranet
Which two statements describe intermediary devices?
Intermediary devices direct the path of the data.* Intermediary devices connect individual hosts to the network.*
What is the internet?
It provides connection with interconnected global networks.
What type of network must a home user access in order to do online shopping?
The internet
What are two functions of end devices on a network?
They originate the data that flows through the network.* They are the interface between humans and the communication network.*
What type of network traffic requires QoS?
Video Conferencing
Drag and drop Match the form of network communication with its description.
Web pages that groups of people can edit and view together -> wiki Interactive websites where people created and share user-generated content with friends and family -> Social media real-time communication of between two or more people -> instant messaging an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast
only made possible by requiring validation of the receiver only the intended recipients can access and read the data only encrypted connections (VPNs) are allowed to transfer data
ensuring confidentiality maintaining integrity ensuring availability
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
extranet
Uses
satellite -> Not suited for heavily wooded areas dialup telephone -> typically has very low bandwidth DSL -> splits the access line into three signals and high bandwith connection that runs over telephone line cable -> uses coaxial cable as a medium
What two criteria are used to help select a network medium from various network media?
the distance the selected medium can successfully carry a signal* the environment where the selected medium is to be installed*