IST 166- Module 1 Review Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

FTP client application

FileZilla

a popular email server application

Microsoft Exchange Server

would lock people inside the burning building

fail-close policy

In which topology are all devices connect to one central device such as a switch

star

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS (Hypertext Transfer Protocol)

protocol used to communicate between web servers and web clients

Hypertext Transfer Protocol

What is the fundamental distinction between a MAN and a WAN?

A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.

What is the fundamental distinction between a node and a host?

A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network.

What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

Active Directory

A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?

Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer.

While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won't even solve the problem. What should you do next in the troubleshooting process?

Escalate the problem

Which protocol service is a client-server application that transfers files between two computers

FTP (File Transfer Protocol)

In the event of a fire, the most appropriate failure policy is a _______ policy.

Fail-open

At the network layer, what type of address is used to identify the receiving host?

IP Address

Which of the following applications could be used to run a website from a server?

Ngnix

The operating system of each computer on the network is responsible for controlling access to its resources without centralized control

P2P (peer-to-peer) network model

A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?

Physical Layer Data link layer

At the data link layer, which type of network address is used to identify the receiving node?

Physical address, MAC address, hardware address, or data link layer address

Which of the following is an application layer protocol?

RDP

What does the 's' in HTTPS stand for?

Secure

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) The port addresses the receiving application

In which model can resources be managed by Windows Server 2019 via a centralized directory database called AD (Active Directory).

client-server network model

quickly shuts down a data center's computers, though hard on computers and their data

emergency power-off switch

all exit doors stay unlocked so that people can safely leave the building and firefighters can enter the building, even though this might present a security risk for thieves entering the building

fail-open policy

In which topography is a central switch connects to multiple peripheral switches that each connect to computers in their areas

hub and spoke

In which topology does each device connects to multiple other devices

mesh

The computers form a logical group of computers and users that share resources

nodes or hosts

What is the fundamental distinction between a layer 2 switch and a router?

A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.

Suppose one of six computers on a peer-to-peer network model is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

Client Server

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-Peer

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL (Structured Query Language)

Which two encryption protocols might be used to provide secure transmissions for email services?

SSL and TLS

True or False: The peer-to-peer network model is possible without Windows Server 2019 or any other NOS

True


Conjuntos de estudio relacionados

Maths - Exponentials and Logarithms

View Set

MGMT473: Ch. 17: Planning for Growth

View Set