Mod 1 | NETI 104 | Q & A
List 2 examples of FTP client applications.
FileZilla CuteFTP
List 6 responsibilities of a Network Operating System (NOS).
1. Managing data and other resources for clients 2. Ensuring that only authorized users access the network 3. Controlling which types of files a user can open and read 4. Restricting when and from where users can access the network 5. Dictating which rules computers will use to communicate 6. In some situations, supplying applications and data files to clients
Each operating system is configured to use what two models to connect to network resources?
1. Peer-to-peer model 2. Client-server model
What are the 2 primary network protocols?
1. TCP (Transmission Control Protocol) 2. IP (Internet Protocol)
List 4 advantages of a Client-Server Network.
1. User accounts and passwords to the network are assigned in one place. 2. Access to multiple shared resources (such as data files or printers) can be centrally granted to a single user or groups of users. 3. Problems on the network can be monitored, diagnosed, and often fixed from one location. 4. Client-server networks are more scalable than peer-to-peer networks. In other words, it's easier to add users and devices to a client-server network.
What are the 2 most popular web server applications that primarily run on Linux systems?
Apache Nginx
What is the primary protocol used by web servers and browsers (clients)?
HTTP (Hypertext Transfer Protocol)
What is a popular email server application?
Microsoft Exchange Server
What is a popular email client application?
Microsoft Outlook
List 3 examples of popular SQL database software.
Microsoft SQL Server Oracle Database MySQL
What is an example of an open source DBMS? MySQL Microsoft SQL Server TCP/IP suite Oracle Database
MySQL Explanation: Popular examples of SQL database software include Microsoft SQL Server, Oracle Database, and the open-source MySQL. Open source is the term for software whose code is publicly available for use and modification, which is often considered more secure because users can evaluate the source code of the software to ensure there are no loopholes left open for attackers to exploit. Note that "open source" is not synonymous with "free."
List 3 disadvantages of peer-to-peer networks.
Not scalable. Not very secure. Not practical for connecting more than a few computers because it's too time consuming to manage the resources on the network.
What two protocols are used to deliver mail messages?
POP3 (Post Office Protocol, version 3) or IMAP4 (Internet Message Access Protocol, version 4)
How can computers running Windows OS share files in a peer-to-peer network?
Resources can be shared using Windows folder and file sharing or A Windows workgroup
Which of the following is a secure protocol? FTP HTTP Telnet SSH
SSH Explanation: The SSH (Secure Shell) protocol creates an encrypted channel or tunnel between two computers, which provides security that Telnet lacks. HTTP (Hypertext Transfer Protocol) requires another protocol, such as TLS (Transport Layer Security), for security. FTP (File Transfer Protocol) does not provide encryption and is, therefore, not secure. However, an encrypted and secure file transfer protocol is SFTP (Secure File Transfer Protocol), which is based on the SSH protocol.
List 2 advantages of peer-to-peer networks.
Simple to configure. Less expensive to set up and maintain.
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using? Bus topology Mesh topology Star topology Ring topology
Star Topology Explanation: In a star topology, all devices connect to one central device. In this case, the keyboard, mouse, and monitor are connecting to the central device, the computer. In a bus topology, the devices would be connected in a line with no device connected to more than two other devices. In a mesh topology, all devices would be connected to each other. In a ring topology, each device would be connected to exactly two other devices.
Which networking device is best for connecting your network printer to three computers? Switch Hub Router File server
Switch Explanation: A switch receives incoming data from one of its ports and redirects (or switches) it to another port or multiple ports that will send the data to its intended destination(s). The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more networks. In this case, all the devices belong to the same network. While a hub would work, it's inefficient and outdated so is not the best choice. A file server stores files for other computers to access.
Which of these protocols could not be used to access a server in a nearby building? Telnet RDP TLS SSH
TLS Explanation: TLS (Transport Layer Security) adds encryption to other protocols, such as HTTP, but does not provide remote access to a computer. The Telnet protocol is a command-line application included in many operating systems that allows a user to remote into a computer, although its transmissions are not encrypted. The SSH (Secure Shell) protocol creates an encrypted channel or tunnel between two computers, which provides security that Telnet lacks. In Windows operating systems, RDP (Remote Desktop Protocol) also provides secure, encrypted transmissions.
Which network types can your smartphone use? WAN LAN PAN WAN and LAN WAN, LAN, and PAN
WAN, LAN, PAN Explanation: When a smartphone communicates over the cellular network for phone calls, it is using a WAN across a wide geographical area. When a smartphone connects with your home network, it is using a LAN in your home. When a smartphone connects with Bluetooth ear buds, a fitness tracker, or a Bluetooth weight scale, it is using a PAN to connect devices intended for use by one person at a time.
List 6 of the most popular client-server applications.
Web service Email services DNS (Domain Name System) service FTP (File Transfer Protocol) service Database services Remote access service
List 4 examples of operating systems installed on desktop and laptop computers in a Peer-to-Peer network.
Windows Linux macOS Chrome OS
List 4 examples of a specific kind of NOS called a Server Operating Systems?
Windows Server 2019 Ubuntu Server Red Hat Enterprises Linux
Which of the following is part of a network's physical topology? a. A network server's operating system b. A printer plugged into a nearby desktop computer c. Password for the wireless network d. File permission settings on a desktop computer
b. A printer plugged into a nearby desktop computer Explanation: Physical topology mostly refers to a network's hardware and how computers, other devices (such as printers), and cables or radio signals work together to form the physical network. Operating systems, passwords, and file permission settings are all part of a network's logical topology.
What group must clients join to access network resources in a client-server network? a. Workgroup b. Domain c. Peer group d. RAID
b. Domain Explanation: When Windows Server controls network access to a group of computers, this logical group is called a Windows domain. A workgroup is one option for sharing resources in a peer-to-peer network. A server might use a RAID (redundant array of independent disks) configuration of hard drives, so that if one hard drive fails, another hard drive automatically takes its place.
Which of the following is an advantage of P2P file sharing? a. Scalable b. Centrally controlled c. Secure d. Inexpensive
d. Inexpensive Explanation: Peer-to-peer networks are often less expensive to set up and maintain than other types of networks. A network operating system, such as Windows Server 2019, is much more expensive than a desktop operating system, such as Windows 10. P2P networks are not scalable and are not necessarily secure. Client-server networks store user accounts and passwords in one place, and access permissions are centrally granted.
List 3 examples of operating systems installed on mobile devices in a Peer-to-Peer network.
iOS Android Chrome OS