ITN 101: Module 01 Quiz Introduction to Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade? a. Hybrid b. Hub-and-spoke c. Client-server d. Peer-to-peer

Client-server In the client-server network model, resources can be managed by Windows Server 2019 via a centralized directory database called AD (Active Directory). The peer-to-peer network model is possible without Windows Server 2019 or any other NOS. Hybrid and hub-and-spoke models are physical topologies, not logical topologies.

In the event of a fire, the most appropriate failure policy is a _______ policy. a. Fail-close b. Power-off c. Fail-open d. Shutdown

Fail-open During a fire alert using a fail-open policy, all exit doors stay unlocked so that people can safely leave the building and firefighters can enter the building, even though this might present a security risk for thieves entering the building. A fail-close policy would lock people inside the burning building. An emergency power-off switch can quickly shut down a data center's computers, although improper shutdowns are hard on computers and their data.

In the client-server model, what is the primary secure protocol used for communication between a browser and web server? a. HTTPS b. HTTP c. TLS d. SSL

HTTPS The primary protocol used by web servers and browsers (clients) is HTTP (Hypertext Transfer Protocol). When HTTP is layered on top of an encryption protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is HTTPS (HTTP Secure), which gives a secure transmission.

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication? a. Test the theory to determine the cause. b. Establish a plan of action to resolve the problem and identify potential effects. c. Identify the problem. d. Document findings, actions, outcomes, and lessons learned.

Identify the problem. While identifying the problem, approach each problem individually and solve it before moving on to the next. By the time you reach the steps of testing the theory, establishing a plan of action, and documenting results, solving multiple problems at once is likely already causing more problems.

Which of the following applications could be used to run a website from a server? a. FileZilla b. Microsoft Exchange Server c. Ngnix d. Hypertext Transfer Protocol

Nginx Ngnix is one of the most popular web server applications in the world. Hypertext Transfer Protocol is a protocol used to communicate between web servers and web clients. FileZilla is an FTP client application. Microsoft Exchange Server is a popular email server application.

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use? a. Ring b. Hybrid c. Hub-and-spoke d. Peer-to-peer

Peer-to-peer Using a P2P (peer-to-peer) network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control. The computers, called nodes or hosts on the network, form a logical group of computers and users that share resources. The hub-and-spoke, ring, and hybrid models are all physical topologies, not logical topologies.

Which of the following is an application layer protocol? a. Apache b. TCP c. IP d. RDP

RDP Several protocols are used at the application layer, including HTTP (Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol, version 3), IMAP4 (Internet Message Access Protocol, version 4), FTP (File Transfer Protocol), Telnet, and RDP (Remote Desktop Protocol). Application layer protocols are used by applications and system utilities. IP (Internet Protocol) is a network layer protocol. TCP (Transmission Control Protocol) is a transport layer protocol. Apache is a web server application.

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign? a. SQL b. FTP c. TLS d. SMTP

SQL Many DBMSs use the programming language SQL (Structured Query Language) to configure and interact with the database's objects and data. FTP (File Transfer Protocol) service is a client-server application that transfers files between two computers. Email clients use SMTP (Simple Mail Transfer Protocol) to send email message to an email server, which then uses SMTP again to transfer email to the recipient's email server. TLS (Transport Layer Security) is an encryption protocol used to secure other protocols.

Which two encryption protocols might be used to provide secure transmissions for email services? a. FTP and SFTP b. SSH and RDP c. HTTP and HTTPS d. SSL and TLS

SSL and TLS The email protocols SMTP, POP3, and IMAP4 are all available over SSL or TLS for security. HTTP and HTTPS provide communication between web servers and browsers. FTP and SFTP support the transfer of files between two computers. SSH and RDP provide secure, encrypted remote access from one computer to another.

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a. Mesh b. Hub-and-spoke c. Client-server d. Star

Star In a star topology, all devices connect to one central device such as a switch. In a mesh topology, each device connects to multiple other devices. In a hub-and-spoke topology, a central switch connects to multiple peripheral switches that each connect to computers in their areas. A client-server network model is a logical topology, not a physical topology.


Set pelajaran terkait

Management of Patients With Neoplasms

View Set

Abnormal psychology chapter 13 quiz 1

View Set

Copyright, patents, and trademarks

View Set

Chapter 49: Neuromuscular or Muscular Dysfunction

View Set