introduction to networking review questions
What is the minimum amount of ESD required to damage sensitive electronic equipment?
10 volts
What is the fundamental distinction between a MAN and a WAN?
A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.
What is the fundamental distinction between a node and a host?
A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network
What is the fundamental distinction between a layer 2 switch and a router?
A layer 2 switch belongs only to its local network, and a router belongs to two or more networks
Which of the following is part of a network's physical topology?
A printer plugged into a nearby desktop computer
A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?
Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer
Which OSI layer adds both a header and a trailer?
Data link layer
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
HTTPs
At the network layer, what type of address is used to identify the receiving host?
IP address
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Identify the problem.
While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past?
Knowledge base
What is an example of an open source DBMS?
MySQL
At the data link layer, which type of network address is used to identify the receiving node?
Physical address, MAC address, hardware address, or data link layer address
Which of the following is an application layer protocol
RDP
Which fire suppression level provides the most targeted protection?
Rack level
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
SQL
Which of the following is a secure protocol?
SSH
Which two encryption protocols might be used to provide secure transmissions for email services?
SSL and TLS
Which networking device is best for connecting your network printer to three computers?
Switch
List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
Which of these protocols could not be used to access a server in a nearby building?
TLS
Which layer holds the address of the target application running on the destination computer?
Transport layer
What should you do after making a plan to solve a problem and carrying out your plan?
Verify functionality
Which network types can your smartphone use?
WAN, LAN, PAN
What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
active directory
At what OSI layer does your browser's web page request begin its journey through the OSI layers?
application Layer
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
client-server
What group must clients join to access network resources in a client-server network?
domain
While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won't even solve the problem. What should you do next in the troubleshooting process?
escalate the problem
In the event of a fire, the most appropriate failure policy is a _______ policy
fail-open
Which of the following is an advantage of P2P file sharing?
inexpensive
Which of the following applications could be used to run a website from a server?
ngnix
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use
peer-to peer
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
star
When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using?
star topology
A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work
physical layer