introduction to networking review questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the minimum amount of ESD required to damage sensitive electronic equipment?

10 volts

What is the fundamental distinction between a MAN and a WAN?

A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.

What is the fundamental distinction between a node and a host?

A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network

What is the fundamental distinction between a layer 2 switch and a router?

A layer 2 switch belongs only to its local network, and a router belongs to two or more networks

Which of the following is part of a network's physical topology?

A printer plugged into a nearby desktop computer

A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?

Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer

Which OSI layer adds both a header and a trailer?

Data link layer

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPs

At the network layer, what type of address is used to identify the receiving host?

IP address

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem.

While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?

Knowledge base

What is an example of an open source DBMS?

MySQL

At the data link layer, which type of network address is used to identify the receiving node?

Physical address, MAC address, hardware address, or data link layer address

Which of the following is an application layer protocol

RDP

Which fire suppression level provides the most targeted protection?

Rack level

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL

Which of the following is a secure protocol?

SSH

Which two encryption protocols might be used to provide secure transmissions for email services?

SSL and TLS

Which networking device is best for connecting your network printer to three computers?

Switch

List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)

Which of these protocols could not be used to access a server in a nearby building?

TLS

Which layer holds the address of the target application running on the destination computer?

Transport layer

What should you do after making a plan to solve a problem and carrying out your plan?

Verify functionality

Which network types can your smartphone use?

WAN, LAN, PAN

What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

active directory

At what OSI layer does your browser's web page request begin its journey through the OSI layers?

application Layer

In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

client-server

What group must clients join to access network resources in a client-server network?

domain

While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won't even solve the problem. What should you do next in the troubleshooting process?

escalate the problem

In the event of a fire, the most appropriate failure policy is a _______ policy

fail-open

Which of the following is an advantage of P2P file sharing?

inexpensive

Which of the following applications could be used to run a website from a server?

ngnix

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use

peer-to peer

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

star

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?

star topology

A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work

physical layer


Ensembles d'études connexes

APUSH Vocab Units 1-9 (Plus Territory Acquisition Vocab)

View Set

Biology 102 Chapter #2 (Michelle)

View Set

Essential Vocabulary: Society & Politics: Political Figures

View Set

Chapter 02 Quiz- Rhythm and Metric

View Set

Korematsu vs United States Supreme Court Case

View Set