Test 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a. Active Directory Domain Services (AD DS) b. Windows Named Resource Services (WN RS) c. Automated Directory Network Services (AD NS) d. Active Directory Federated Users (AD FU)

a. Active Directory Domain Services (AD DS)

What is a defining characteristic of a bus topology based network? a. Devices are daisy-chained together in a single line. b. Devices are directly attached to a network router, which forwards data to intended destinations. c. Devices are connected directly to a centralized networking device, known as a network switch. d. Devices are connected to two adjacent devices, and communication priority is granted by a token.

a. Devices are daisy-chained together in a single line.

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 7 b. Layer 6 c. Layer 5 d. Layer 4

a. Layer 7

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Network b. Session c. Transport d. Application

a. Network

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. Remote Desktop Protocol (RDP) b. Secure Sockets Layer (SSL) c. Secure Shell (SSH) d. File Transfer Protocol (FTP)

a. Remote Desktop Protocol (RDP)

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. b. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. c. The Presentation layer is responsible for transporting Application layer payloads from one application to another. d. The Presentation layer describes the interface between two applications, each on separate computers.

a. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system? a. ISO 9001 b. TIA/EIA-568 c. IEEE 802.3 d. ITU 922

b. TIA/EIA-568

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Transport b. Internet c. Link d. Application

d. Application

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Environmental Chemical Hazard Sheet (ECHS) b. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c. Toxic Chemical Safety Procedure (TCSP) d. Material Safety Data Sheet (MSDS)

d. Material Safety Data Sheet (MSDS)

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? a. memorandum of understanding b. service-level agreement c. master service agreement d. master license agreement

d. master license agreement

What type of diagram is a graphical representation of a network's wired infrastructure? a. system diagram b. topology map c. network diagram d. wiring schematic

d. wiring schematic

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination? a. The exposure of the cable can cause transmission interference between wires. b. The termination will fail over time due to oxidation. c. Exposing more cable than necessary can cause corrosion of the copper wire. d. The cable will lose its conductive properties.

a. The exposure of the cable can cause transmission interference between wires.

Which of the following is not one of the disadvantages of peer-to-peer networks? a. They centralize user account logins. b. They are not necessarily secure. c. They lack scalability. d. They are impractical for connecting large numbers of computers.

a. They centralize user account logins.

In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? a. fire suppression agent b. eliminating factor c. fire extinction agent d. extinguishing medium

a. fire suppression agent

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. upset failure b. interrupting failure c. temporary failure d. catastrophic failure

a. upset failure

When planning horizontal cabling, what is the maximum allowable distance that can be used? a. 1,000 feet b. 100 meters c. 300 meters d. 100 feet

b. 100 meters

What mail protocol is used to send mail messages to a server? a. IMAP4 b. SMTP c. POP3 d. HTTPS

b. SMTP

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? a. SMTP b. SNMP c. POP3 d. HTTP

b. SNMP

Which of the following is an example of encapsulation? a. The modification of headers from a higher layer in the OSI model. b. The addition of a header to data inherited from the layer above in the OSI model. c. The subtraction of a header from data inherited from the layer below in the OSI model. d. The addition of a trailer to data inherited from the layer above in the OSI model.

b. The addition of a header to data inherited from the layer above in the OSI model.

When creating network diagrams, what icon description typically represents a network switch? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular, which contains four arrows pointing in opposite directions. d. An icon that is rectangular in shape, with squiggly lines on the front.

c. An icon that is rectangular, which contains four arrows pointing in opposite directions.

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Application Layer b. Transport Layer c. Session Layer d. Presentation Layer

c. Session Layer

What statement accurately reflects what occurs when a message is too large to transport on a network? a. The message is sent anyway, and is received by the destination as garbage data. b. An ICMP error is generated, and the application must reformat the data for transmission. c. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). d. The message is discarded and must be sent again.

c. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

The TCP and UDP protocols both exist at what layer of the OSI model? a. Presentation b. Application c. Transport d. Network

c. Transport

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines? a. VoIP MTA b. VoIP translator c. VoIP gateway d. VoIP PBX

c. VoIP gateway

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-close b. fail-tolerant c. fail-open d. fail-oriented

c. fail-open

The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. packet b. bit c. frame d. data

c. frame

Where is a demarc located in relation to the structured cabling of an enterprise environment? a. between the MDF and the IDF b. at the Intermediate Distribution Frame (IDF) c. in the Main Distribution Frame (MDF) d. in the work area

c. in the Main Distribution Frame (MDF)

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. mesh topology b. bus topology c. star topology d. star bus topology

c. star topology

Equipment data racks most commonly are a standard width of what measurement? a. 30 inches b. 25 inches c. 20 inches d. 19 inches

d. 19 inches

When creating network diagrams, what icon description typically represents a network router? a. An icon that resembles a brick wall. b. An icon that is rectangular, which contains four arrows pointing in opposite directions. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

d. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.


Ensembles d'études connexes

Patient Care Chapter 17, 18, 19, Homework Questions

View Set

nclex antepartum and intrapartum practice test

View Set

Chapter 2 Review - Expanded Tax Formula, Form 1040, and Basic Concepts

View Set

Research Methods: CITI Training questions #2

View Set