IST 166- Module 1 Review Questions
FTP client application
FileZilla
a popular email server application
Microsoft Exchange Server
would lock people inside the burning building
fail-close policy
In which topology are all devices connect to one central device such as a switch
star
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
HTTPS (Hypertext Transfer Protocol)
protocol used to communicate between web servers and web clients
Hypertext Transfer Protocol
What is the fundamental distinction between a MAN and a WAN?
A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.
What is the fundamental distinction between a node and a host?
A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network.
What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
Active Directory
A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?
Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer.
While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won't even solve the problem. What should you do next in the troubleshooting process?
Escalate the problem
Which protocol service is a client-server application that transfers files between two computers
FTP (File Transfer Protocol)
In the event of a fire, the most appropriate failure policy is a _______ policy.
Fail-open
At the network layer, what type of address is used to identify the receiving host?
IP Address
Which of the following applications could be used to run a website from a server?
Ngnix
The operating system of each computer on the network is responsible for controlling access to its resources without centralized control
P2P (peer-to-peer) network model
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Physical Layer Data link layer
At the data link layer, which type of network address is used to identify the receiving node?
Physical address, MAC address, hardware address, or data link layer address
Which of the following is an application layer protocol?
RDP
What does the 's' in HTTPS stand for?
Secure
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) The port addresses the receiving application
In which model can resources be managed by Windows Server 2019 via a centralized directory database called AD (Active Directory).
client-server network model
quickly shuts down a data center's computers, though hard on computers and their data
emergency power-off switch
all exit doors stay unlocked so that people can safely leave the building and firefighters can enter the building, even though this might present a security risk for thieves entering the building
fail-open policy
In which topography is a central switch connects to multiple peripheral switches that each connect to computers in their areas
hub and spoke
In which topology does each device connects to multiple other devices
mesh
The computers form a logical group of computers and users that share resources
nodes or hosts
What is the fundamental distinction between a layer 2 switch and a router?
A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.
Suppose one of six computers on a peer-to-peer network model is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
Client Server
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Identify the problem
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Peer-to-Peer
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
SQL (Structured Query Language)
Which two encryption protocols might be used to provide secure transmissions for email services?
SSL and TLS
True or False: The peer-to-peer network model is possible without Windows Server 2019 or any other NOS
True