chapter1 -NWC204

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? a-extranet b-intranet c-LAN d-WAN

WAN

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? a-fault tolerance b-scalability c-QoS d-security

a

Which connections are specialized ports on a networking device that connect to individual networks? a-interface b-NIC c-port

a

Which feature describes using personal tools to access information and communicate across a business or campus network? a-BYOD b-video communication c-cloud computing

a

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? a-extranet b-intranet c-LAN d-WAN

a

Which option blocks unauthorized access to your network? a-firewall b-virus,worn,trojan-horse c-zero-day or zero hour d-virtual private network(VPN) e-denial of service(DoS)

a

Which type of network topology lets you see the actual location of intermediary devices and cable installation? a-Physical topology diagram b-Logical topology diagram

a

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? a-fault tolerance b-scalability c-QoS d-security

b

Which connection physically connects the end device to the network? a-PORT b-NIC c-interface

b

Which feature is a good conferencing (hội nghị)tool to use with others who are located elsewhere in your city, or even in another country? a-BYOD b-video communication c-cloud computing

b

Which feature is being used when connecting a device to the network using an electrical outlet? a-smart home technology b-powerline c-wireless broadband

b

Which option describes malicious code running on user devices? a-firewall b-virus,worn,trojan-horse c-zero-day or zero hour d-virtual private network(VPN) e-denial of service(DoS)

b

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? a-Physical topology diagram b-Logical topology diagram

b

Which two devices are intermediary devices? (Choose two) a-hosts b-routers c-servers d-switch

b,d

Which feature contains options such as Public, Private, Custom and Hybrid? a-BYOD b-video communication c-cloud computing

c

Which feature uses the same cellular technology as a smart phone? a-smart home technology b-powerline c-wireless broadband

c

Which of the following is the name for all computers connected to a network that participate directly in network communication? a-server b-intermediate devices c-host d-media

c

Which option describes a network attack that occurs on the first day that a vulnerability becomes known? a-firewall b-virus,worn,trojan-horse c-zero-day or zero hour d-virtual private network(VPN) e-denial of service(DoS)

c

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? a-fault tolerance b-scalability c-QoS d-security

c

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? a-fault tolerance b-scalability c-QoS d-security

d

Which option creates a secure connection for remote workers? a-firewall b-virus,worn,trojan-horse c-zero-day or zero hour d-virtual private network(VPN) e-denial of service(DoS)

d

Which attack slows down or crashes equipment and programs? a-firewall b-virus,worn,trojan-horse c-zero-day or zero hour d-virtual private network(VPN) e-denial of service(DoS)

e

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? a-extranet b-intranet c-LAN d-WAN

LAN

When data is encoded as pulses of light, which media is being used to transmit the data? a-wireless b-fiber-optic cable(sợi quang) c-copper cable(sợi đồng)

b


संबंधित स्टडी सेट्स

Anatomy and Physiology I - Chapter 10 Learnsmart

View Set