Module 1: Introduction to Networking
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication? a. Identify the problem. b. Test the theory to determine the cause. c. Establish a plan of action to resolve the problem and identify potential effects. d. Document findings, actions, outcomes, and lessons learned.
a. Identify the problem.
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use? a. Client-server b. Mesh c. Hub-and-spoke d. Star
a. Star
Which of the following is an application layer protocol? a. IP b. RDP c. TCP d. Apache
b. RDP
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign? a. FTP b. SQL c. SMTP d. TLS
b. SQL
Which two encryption protocols might be used to provide secure transmissions for email services? a. HTTP and HTTPS b. SSL and TLS c. FTP and SFTP d. SSH and RDP
b. SSL and TLS
In the client-server model, what is the primary secure protocol used for communication between a browser and a web server? a. HTTPS b. TLS c. HTTP d. SSL
c. HTTP
In the event of a fire, the most appropriate failure policy is a __________ policy. a. power-off b. fail-close c. fail-open d. shutdown
c. fail-open
In Question 6, suppose Windows Server 2019 is installed on one computer. Which networking model can the network now support that it could not support without the upgrade? a. Hybrid b. Client-server c. Hub-and-spoke d. Peer-to-peer
d. Client-server
Which of the following applications could be used to run a website from a server? a. Hypertext Transfer Protocol b. FileZilla c. Microsoft Exchange Server d. Ngnix
d. Ngnix
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use? a. Hub-and-spoke b. Ring c. Hybrid d. Peer-to-peer
d. Peer-to-peer