Module 1 Questions
What is the minimum, amount of ESD (Electrostatic Discharge) required to damage sensitive electronic equipment? 1500 volts 800 volts 10 volts 2 volts
10 volts
Which of the following is part of a networks physical topology? A network servers operating system A printer plugged into a nearby desktop computer Password for the wireless network File permission settings on a desktop computer
A printer plugged into a nearby desktop computer
What psi layer does your browser's webpage request begin its journey through the psi layer? Application layer Network layer Data link layer Physical layer
Application layer
A network consist of five computers, suppose one computer is upgraded from windows 10 professional to windows server 2019. Which networking model can the network now support that it could not without the upgrade?
Client-server
Which osi layer adds both a header and a trailer? Transport layer Network layer Data link layer Physical layer
Data link layer
What group must clients join to access network resources in a client-server network? Workgroup Domain Peer group Raid
Domain
In the event of a fire, the most appropriate failure policy is a ____ policy. Power-off Shutdown Fail-close Fail-open
Fail-open
In the client-server model, what is the primary secure protocol used for communication between a browser and a web server?
HTTPS
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issue s you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Identify the problem
Which of the following is an advantage of a peer 2 peer (p2p) file sharing? Scalable Centrally controlled Secure Inexpensive
Inexpensive
While exploring the problem and development theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past? Safety data sheet Knowledge base Troubleshooting ticket in the call tracking system Instruction manual
Knowledge base
What is an example of an open source DBMS (Database Management System) MySQL Microsoft sql server Tcp/ip suite Oracle database
MySQL
What application can be used to run a website from a server?
Ngnix
Which of the following is an application layer protocol? TCP IP RDP APACHE
RDP
Which fire suppression level provides the most targeted protections? Desk level Rack level Building level Room level
Rack level
Which two encryption protocols might be used to provide secure transmissions for email services?
SSL and TLS
Which of the following is a secure protocol? Ftp Http Telnet Ssh
Secure shell (ssh)
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star topology
when you connect your keyboard, mouse, and monitor to your computer, what king of network topology are you using? Bus topology Mesh topology Star topology Ring topology
Star topology
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
Structured query language (SQL)
Which network device is best for connecting your network printer to three computers? Switch Hub Router File server
Switch
Which layer holds the address of the target application running on the destination computer? Application layer Transport layer Network layer Data link layer
Transport layer
Which of the following protocols could not be used to access a server in a nearby building? Telnet Rdp Tls Ssh
Transport layer security (TLS)
What should you do after making a plan to solve a problem and carrying out your plan? Document your work Finds out what has recently changed Test your theory Verify functionality
Verify functionality
Which network types can your smartphone use? WAN LAN PAN WAN AND LAN WAN, LAN, AND PAN
WAN, LAN, AND PAN
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
peer-to-peer (p2p)