270

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are a senior programmer for Mercantile Timber Ltd., and you have been tasked to develop a database that would contain all the user account information and security for the entire group of computers operating within Mercantile Timber Ltd. Can you apply any of the options provided?

AD (The centralized directory database that contains user account information and security for an entire group of computers is known as AD (Active Directory). Hence, applying this would serve the purpose in this scenario.)

Godwin Pharmaceuticals has a private web server for its corporate network that runs on a Linux operating system. You have been contacted to make its network remotely accessible to the IT department so that the IT department can have secure access to the workstations and, at the same time, the transmissions remain encrypted. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? a. Telnet b. POP3 c. RDP d. SSH

SSH (SSH (Secure Shell) protocols are mostly used for Linux operating systems to provide a secure remote access to the networks, so this protocol should be used in this situation because the system is running on Linux.)

Whistle blowers, a talent management company, wants to set up a network connection for its branch office in los angeles. It has contracted vince cabling solutions for this. The administration department of whistle blowers has specifically mentioned that the nodes of the devices used in the division should all be connected through a common cable so that the material costs can be minimized. Analyze which topology vince cabling solutions should use in such a scenario

A bus typology (In a bus topology, all the devices are connected through a single cable instead of a central hub. It is also least expensive amongst other topologies and hence should be preferred in this scenario.)

Your client has multiple LAN connections for his business. He wants you to install a device so that the traffic between two networks can be efficiently managed by finding the best path for traffic to get from one network to another. Which of the following will you use in this case?

An industrial-grade router (An industrial-grade router can have several network ports, one for each of the networks it connects to. In such a case, an industrial router should be used because the router can connect multiple LAN connections.)

Which of the following protocols is used to transfer files between two computers?

FTP (The FTP protocol is used to transfer files between two computers.)

Kevin Mills is a network technician who has been hired by Globcom Telecommunications to fix an error related to emails and messages. The error primarily did not allow the messages sent out by the HR department to arrive intact at the receiving applications on the employees' workstations. Kevin plans to follow the OSI model for troubleshooting. Analyze the statements and suggest which layer of the OSI model Kevin should inspect to understand and resolve the issue.

One should troubleshoot the issue using the session layer. (The session layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application. As the problem is primarily related to messages not being received by the applications installed at the employees' workstations, Kevin should troubleshoot this layer.)

Which of the following represents a network of personal devices?

PAN (PAN (personal area network) is a much smaller network type, which is a network of personal devices, such as the network you use when you sync your smartphone and your computer.)

Which of the following items would you use when a server used a hard disk as a backup in case a hard drive fails?

Raid (Raid is used as a backup by servers so that if one hard drive fails, another one automatically takes its place.)

Which of the following explains how to properly handle substances such as chemical solvents?

SDS (An SDS (safety data sheet) explains how to properly handle substances such as chemical solvents and how to dispose of them.)

You have been called to troubleshoot a problem, and you have successfully managed to establish a theory of probable cause. You have managed to reach this layer after considering multiple approaches through the OSI model. Which recommended step should you perform next if you follow the OSI model of troubleshooting?

Test your theory to determine the cause (After you have managed to establish a theory of probable cause, you should always test your theory to assure yourself that it will indeed solve the problem before you implement the solution.)


Ensembles d'études connexes

Chapter 11, 12 and 13 Nervous System

View Set

JA: UNIT 1: knowledge of capital markets

View Set

Chapter 27: Caring for Clients with Hypertension

View Set

Honors Geo Chap 5 Postulates, Theorems, & Definitions

View Set