Chapter 1
Which two statements correctly define types of network infrastructure?
-A WLAN is designed to wirelessly interconnect users and end points in a small geographical area -A SAN is designed to support data storage, retrieval, and replication
For which three reasons was a packet-switched connectionless data communications technology used when developing the Internet?
-It can rapidly adapt to the failure of network devices and communication links. -Data packets can travel through the network using multiple different paths. -Network devices dynamically decide on the best available path to forward each packet.
What are two benefits of collaboration and video-on-demand applications?
-providing a richer e-learning environment -providing better social media opportunities
Which statement describes a network that supports QoS?
The network provides predictable levels of service to different types of traffic.
Which type of network design combines voice, video, and data on the same communication channel?
a converged network
In which scenario would the use of a WISP be recommended?
a farm in a rural area without wired broadband access
What is a wiki?
a web page that groups of people can edit and review
BYOD
allows the end user to use personal tools to communicate across business or campus networks
cloud computing
allows the use of applications through a web browser via web-based computing
Switches in the middle connected to PCs. Which term correctly identifies the device type that is included in this area?
intermediary
INTRANET
is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization.
Scalable
networks are able to expand to accept new devices and applications without affecting performance.
online collaboration
provides the end users with tools to work together regardless of physical location
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
spyware
A data center has recently updated a physical server to host multiple operating systems on a single CPU. The data center can now provide each customer with a separate web server without having to allocate an actual discrete server for each customer. What is the networking trend that is being implemented by the data center in this situation?
virtualization