Network+ Ch.1 Quiz Edit

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO? Smartphone Network printer File server Router

Router

Which of the following client-server applications use Apache and Nginx? Web service DNS service FTP services Email services

Web service

Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario? A. A combo Device B. An industrial-grade router. C. A consumer-grade router D. A switch

A combo Device

Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you? A. A peer-to-peer network model allows network problems to be diagnosed and monitored from a single place. B. Peer-to-peer networks are scalable and so they are beneficial. C. Peer-to-peer networks generally have secured access points preventing unauthorized access. D. A network operating system is much more expensive than a desktop operating system.

A network operating system is much more expensive than a desktop operating system.

Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario? A star topology A mesh topology A bus topology A ring topology

A star topology

Which of the following is a centralized directory database that contains user account information and security for the entire group of computers? A. Active Directory B. Workgroups C. Clients D. RAID

Active Directory

Which of the following terms is also referred to as a "network of networks"? Hub Backbone Network interface card Spoke

Backbone

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered? CAN (Campus Area Network) MAN WAN (Wireless Area Network) PAN (Private Area Network)

CAN

Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered? CAN (Campus Area Network) MAN PAN (Private Area Network) WAN (Wireless Area Network)

CAN

PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional. Which of the following statements should Suleiman consider while considering a change in a network? A. Changes to a network should be done when there are maximum users on the network. B. Change management procedures do not evaluate the cost of change of a plan. C. Change management procedures should consist of preparing a backup plan as well. D. Changes to a network can be done without keeping in view the effect of the change on its users and applications.

Change management procedures should consist of preparing a backup plan as well.

A network consists of five computers, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade? Peer-to-peer Client-server Hub-and-spoke Hybrid

Client-server

A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers? MySQL Nginx CuteFTP Filezilla

CuteFTP

What is the logical group of Windows Servers controlling the network access to a group of computers also known by? Domain RAID Client Router

Domain

In the event of a fire, the most appropriate failure policy is a ____ policy. Power-off Shutdown Fail-close Fail-open

Fail-open

In the client-server model, what is the primary secure protocol used for communication between a browser and web server? HTTPS HTTP SSL TLS

HTTPS

Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation? A. He should use the RDP protocol to deliver the message. B. He should use POP3 to deliver the message. C. He should use IMAP4 to deliver the message. D. He should use the SSH protocol to deliver the message.

He should use POP3 to deliver the message

Which of the following statements is true? A. In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. B. Physical topologies mostly refer to how software controls access to network resources. C. In a peer-to-peer network model, each computer controls its own administration, resources, and security. D. Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network.

In a peer-to-peer network model, each computer controls its own administration, resources, and security.

What is a collection of accumulated insights and solutions to problems encountered in a particular network known as? SDS Tracking system Change management Knowledge base

Knowledge base

What other technical name or PDU can be used to represent the session presentation and application layer? L3PDU L4PDU L7PDU L2PDU

L7PDU

A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation? Mac Red Hat Enterprise Windows Server 2019 Ubuntu Server

MAC

A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation? A. Ubuntu Server B. Windows Server 2019 C. Mac D. Red Hat Enterprise

Mac

Which of the following DBMS applications would you use if you were to organize data into tables and records? MS Outlook FileZilla Apache Microsoft SQL Server

Microsoft SQL Server

White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error. A. Network Layer B. Transport Layer C. Presentation Layer D. Data Link Layer

Network Layer

Which of the following applications could be used to run a website from a server? Microsoft Exchange Server Ngnix FileZilla Hypertext Transfer Protocol

Ngnix

What is the data passed between utility programs or applications and the operating system known as? Payload Ethernet Firmware Host

Payload

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use? Hybrid Ring Peer-to-peer Hub-and-spoke

Peer-to-peer

You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply? Presentation layer Transport layer Physical layer Data link layer

Presentation layer

You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand? RAID Workgroup Hypervisor AD

RAID

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? A. Pop3 B. RDP C. The SSH Protocol D. The Telnet Protocol

RDP

Which of the following is an application layer protocol? RDP IP TCP Apache

RDP

JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade. A. Verify functionality and implement preventive measures. B. Roll out changes in stages. C. Document findings, actions, and outcomes. D. Establish a plan for resolving the problem.

Roll out changes in stages.

Which of the following network devices does not fall under the category of "end devices" as certified by CISCO? Router Smartphone File server Network printer

Router

Which of the following consists of high capacity data storage devices in a distinctly defined network segment? WLAN PAN SAN MAN

SAN

Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them? OSHA PPE Fire suppression system SDS

SDS

Which of the following protocols is used to send an email message to the first server? FTP IMAP4 POP3 SMTP

SMTP

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign? TLS FTP SQL SMTP

SQL

Which two encryption protocols might be used to provide secure transmissions for email services? SSH and RDP FTP and SFTP SSL and TLS HTTP and HTTPS

SSL and TLS

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? Mesh Hub-and-spoke Star Client-server

Star

Which of the following is the third step in a network troubleshooting methodology? A. Identify the problem and its symptoms. B. Establish a theory of probable cause. C. Establish a plan for solving the problem. D. Test your theory to determine the cause.

Test your theory to determine the cause.

James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router? The network layer The session layer The physical layer The transport layer

The network layer

You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books? A. The contact name of the person reporting the issue B. The name of the technician who handled the problem C. The symptoms of the problem D. The total number of computers functioning in the organization

The total number of computers functioning in the organization

Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? A. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. B. Access to multiple shared resources can be centrally granted to a single user or a group of users. C. User accounts and passwords to the networks are all assigned in one place. D. Problems on the network can be monitored, diagnosed, and fixed from one location.

They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication? Document findings, actions, outcomes, and lessons learned. Establish a plan of action to resolve the problem and -identify potential effects. identify the problem. Test the theory to determine the cause.

identify the problem.

Which of the following statements stands true? A. HTTP is a secured protocol that provides secure transmission. B. An email can be downloaded to the client computer using POP3. C. The DBMS does not support a multiuser environment. D. FTP servers provide secure encryption for file transfer.

An email can be downloaded to the client computer using POP3

Which of the following statements stands true? A. HTTP is a secured protocol that provides secure transmission. B. FTP servers provide secure encryption for file transfer. C. An email can be downloaded to the client computer using POP3. D. The DBMS does not support a multiuser environment.

An email can be downloaded to the client computer using POP3

What is help desk software used for? A. To accumulate insights and solutions to problems encountered on a particular network B. To properly handle substances such as chemical solvents C. To document problems and their resolutions D. To protect the computer from an ESD charge

To document problems and their resolutions

You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario? A. Use a bottom-to-top OSI layers approach B. Use a top-to-bottom OSI layers approach C. Check the change management policies of the organization D. Escalate the problem

Use a top-to-bottom OSI layers approach

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose. A ring topology A mesh topology A bus topology A star topology

A star topology

Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario? User Datagram Protocol Simple Network Management Protocol Transmission Control Protocol Internet Message Access Protocol

Transmission Control Protocol

Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for? IMAP4 TCP UDP SNMP

UDP


Ensembles d'études connexes

GROWTH AND DEVELOPMENT : SCHOOL AGED CHILD (6-12 years)

View Set