ITN 101: Module 01 Skill Checks

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the minimum amount of ESD required to damage sensitive electronic equipment? a. 10 volts b. 1,500 volts c. 800 volts d. 2 volts

10 volts When your body and a component have different static charges and you touch the component, you can discharge up to 1,500 volts of static electricity without seeing a spark or feeling the discharge. However, it only takes 10 volts to damage the component. This means you could fry a motherboard and never even feel a shock.

At what OSI layer does your browser's web page request begin its journey through the OSI layers? a. Data link layer b. Physical layer c. Application layer d. Network layer

Application layer The application layer in the OSI model describes the interface between two applications, each on separate computers. It takes data from an application or utility and creates a payload for lower OSI layers to manage and transport. The lower layers, such as the network, data link, and physical layers, encapsulate the payload from higher layers to add each protocol's information before passing the message down to the next layer.

Which of the following is part of a network's physical topology? a. Password for the wireless network b. A printer plugged into a nearby desktop computer c. A network server's operating system d. File permission settings on a desktop computer

A printer plugged into a nearby desktop computer Physical topology mostly refers to a network's hardware and how computers, other devices (such as printers), and cables or radio signals work together to form the physical network. Operating systems, passwords, and file permission settings are all part of a network's logical topology.

Which OSI layer adds both a header and a trailer? a. Transport layer b. Physical layer c. Network layer d. Data link layer

Data link layer The data link layer puts its control information in a data link layer header and also attaches control information to the end of the packet in a trailer. The entire data link layer message is then called a frame. The transport and network layers both add their information in their respective headers but typically do not use trailers. While there is a preamble added in front of the data link layer header, it's not typically considered to be a physical layer header. The physical layer is responsible for sending bits via a wired or wireless transmission.

What group must clients join to access network resources in a client-server network? a. Domain b. Workgroup c. RAID d. Peer Group

Domain When Windows Server controls network access to a group of computers, this logical group is called a Windows domain. A workgroup is one option for sharing resources in a peer-to-peer network. A server might use a RAID (redundant array of independent disks) configuration of hard drives, so that if one hard drive fails, another hard drive automatically takes its place.

Which of the following is an advantage of P2P file sharing? a. Inexpensive b. Centrally controlled c. Scalable d. Secure

Inexpensive Peer-to-peer networks are often less expensive to set up and maintain than other types of networks. A network operating system, such as Windows Server 2019, is much more expensive than a desktop operating system, such as Windows 10. P2P networks are not scalable and are not necessarily secure. Client-server networks store user accounts and passwords in one place, and access permissions are centrally granted.

While exploring the problem and developing a theory about the cause, where can you go to get information on similar problems your coworkers have faced in the past? a. Troubleshooting ticket in the call tracking system b. Safety data sheet c. Knowledge base d. Instruction manual

Knowledge base A knowledge base is a collection of accumulated insights and solutions to the problems encountered on a particular network. A SDS (safety data sheet) explains how to properly handle substances such as chemical solvents and how to dispose of them. The current troubleshooting ticket in the call tracking system will contain information about the current problem but not accumulated insights from previous problems. An instruction manual can provide insights on how a device or application works and possibly troubleshooting help for common problems, but it will not include information on previous problems experienced by your coworkers.

What is an example of an open source DBMS? a. TCP/IP suite b. Oracle Database c. Microsoft SQL Server d. MySQL

MySQL Popular examples of SQL database software include Microsoft SQL Server, Oracle Database, and the open-source MySQL. Open source is the term for software whose code is publicly available for use and modification, which is often considered more secure because users can evaluate the source code of the software to ensure there are no loopholes left open for attackers to exploit. Note that "open source" is not synonymous with "free."

Which fire suppression level provides the most targeted protection? a. Rack level b. Building level c. Desk level d. Room level

Rack level Rack level fire suppression offers targeted fire detection and suppression inside each cabinet that holds network devices to reduce the impact on surrounding equipment. Room level fire suppression incorporates a sprinkler or gas system that provides fire suppression in parts of a room or throughout the entire room. A building level system protects the entire building and employees throughout that space.

Which of the following is a secure protocol? a. SSH b. TELNET c. HTTP d. FTP

SSH The SSH (Secure Shell) protocol creates an encrypted channel or tunnel between two computers, which provides security that Telnet lacks. HTTP (Hypertext Transfer Protocol) requires another protocol, such as TLS (Transport Layer Security), for security. FTP (File Transfer Protocol) does not provide encryption and is, therefore, not secure. However, an encrypted and secure file transfer protocol is SFTP (Secure File Transfer Protocol), which is based on the SSH protocol.

When you connect your keyboard, mouse, and monitor to your computer, what kind of network topology are you using? a. Bus topology b. Ring topology c. Star topology d. Mesh topology

Star topology In a star topology, all devices connect to one central device. In this case, the keyboard, mouse, and monitor are connecting to the central device, the computer. In a bus topology, the devices would be connected in a line with no device connected to more than two other devices. In a mesh topology, all devices would be connected to each other. In a ring topology, each device would be connected to exactly two other devices.

Which networking device is best for connecting your network printer to three computers? a. File server b. Switch c. Router d. Hub

Switch A switch receives incoming data from one of its ports and redirects (or switches) it to another port or multiple ports that will send the data to its intended destination(s). The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more networks. In this case, all the devices belong to the same network. While a hub would work, it's inefficient and outdated so is not the best choice. A file server stores files for other computers to access.

Which of these protocols could not be used to access a server in a nearby building? a. Telnet b. TLS c. SSH d. RDP

TLS TLS (Transport Layer Security) adds encryption to other protocols, such as HTTP, but does not provide remote access to a computer. The Telnet protocol is a command-line application included in many operating systems that allows a user to remote into a computer, although its transmissions are not encrypted. The SSH (Secure Shell) protocol creates an encrypted channel or tunnel between two computers, which provides security that Telnet lacks. In Windows operating systems, RDP (Remote Desktop Protocol) also provides secure, encrypted transmissions.

Which layer holds the address of the target application running on the destination computer? a. Application layer b. Transport layer c. Network layer d. Data link layer

Transport layer The transport layer header addresses the receiving application by a number called a port, which identifies a specific application on a computer. The application layer does not include addressing information. The network layer header identifies the sending and receiving host computers on a network by their IP addresses. The data link frame's header contains the hardware addresses of the source and destination NICs. This address is called a MAC (Media Access Control) address.

What should you do after making a plan to solve a problem and carrying out your plan? a. Verify functionality. b. Find out what has recently changed. c. Document your work. d. Test your theory.

Verify functionality After implementing your solution, you'll test the system to verify full system functionality. It's also a good idea to return a few days later and make sure all is working as you expected. Also consider what you can do to make sure the problem doesn't reappear. You find out what has recently changed at the beginning of the process. You test your theory of what's causing the problem before developing a plan to solve the problem. You document your work at the end after verifying the solution worked.

Which network types can your smartphone use? a. WAN and LAN b. WAN c. LAN d. WAN, LAN, and PAN e. PAN

WAN, LAN, and PAN When a smartphone communicates over the cellular network for phone calls, it is using a WAN across a wide geographical area. When a smartphone connects with your home network, it is using a LAN in your home. When a smartphone connects with Bluetooth ear buds, a fitness tracker, or a Bluetooth weight scale, it is using a PAN to connect devices intended for use by one person at a time.


Set pelajaran terkait

PSY 2012 - Chapter 5 Quiz, Psych exam 4, PSYCH Final, Psychology Chapter 7 Quiz, exam 1

View Set

Social Media Marketing Midterms Chapter 5 out of 5

View Set

SOCIOLOGY FINAL EXAM: The American Dream and the Power of Wealth

View Set

Chapter 13 Anatomy Book Questions

View Set

Commercial Bank Management, Exam 1

View Set

Salesforce Sharing and Visability

View Set