Network + Unit 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. 1.) True 2.) False

True

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a.) Data Link b.) Physical c.) Application d.) Network

b.) Physical

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a.) Presentation Layer b.) Session Layer c.) Application Layer d.) Transport Layer

b.) Session Layer

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a.) Active Directory Domain Services (AD DS) b.) Automated Directory Network Services (AD NS) c.) Windows Named Resource Services (WN RS) d.) Active Directory Federated Users (AD FU)

a.) Active Directory Domain Services (AD DS)

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a.) Application b.) Internet c.) Link d.) Transport

a.) Application

The TCP and UDP protocols both exist at what layer of the OSI model? a.) Application b.) Transport c.) Network d.) Presentation

b.) Transport

A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. a.) False b.) True

b.) True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. a.) False b.) True

b.) True

What is the minimal amount of voltage required to damage an electrical component? a.) 1500 volts b.) 5 volts c.) 100 volts d.) 10 volts

d.) 10 volts

What statement accurately describes what a cable bend radius determines? a.) A cable bend radius determines the total number of bends that can exist in an overall cable before data is impaired. b.) A cable bend radius defines the twist rate of the cable inside of the insulation. c.) A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data. d.) A cable bend radius is the radius of the minimum arc into which you can loop the cable without impairing data.

c.) A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

The Transport layer header addresses a receiving application by a number called a MAC address. 1. True 2. False

False

When planning horizontal cabling, what is the maximum allowable distance that can be used? a.) 100 meters b.) 1,000 feet c.) 300 meters d.) 100 feet

a.) 100 meters

Which of the following is NOT a best practice when performing cable management? a.) Cable ties should be pulled tightly to keep cables from moving around in a bundle. b.) Grounding requirements should be followed when running cables. c.) Cable should not be placed across a floor where they might be damaged by traffic. d.) A cable tester should be used to verify that each segment of cable is transmitting reliably.

a.) Cable ties should be pulled tightly to keep cables from moving around in a bundle.

When creating network diagrams, what icon description typically represents a network firewall? a.) An icon that is rectangular, which contains four arrows pointing in opposite directions. b.) An icon that resembles a brick wall. c.) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. d.) An icon that is rectangular in shape, with squiggly lines on the front.

b.) An icon that resembles a brick wall.

In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack. a.) True b.) False

b.) False

What does a statement of work document do? a.) It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline. b.) It documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts. c.) It is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP. d.) It is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

a.) It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.

What statement accurately reflects what occurs when a message is too large to transport on a network? a.) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). b.) The message is sent anyway, and is received by the destination as garbage data. c.) An ICMP error is generated, and the application must reformat the data for transmission. d.) The message is discarded and must be sent again.

a.) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a.) The packet will be divided into smaller packets using fragmentation. b.) The packet will be dropped silently, requiring the communicating application try again. c.) The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. d.) The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.

a.) The packet will be divided into smaller packets using fragmentation.

Which of the following is not one of the disadvantages of peer-to-peer networks? a.) They centralize user account logins. b.) They lack scalability. c.) They are impractical for connecting large numbers of computers. d.) They are not necessarily secure.

a.) They centralize user account logins.

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines? a.) VoIP gateway b.) VoIP translator c.) VoIP PBX d.) VoIP MTA

a.) VoIP gateway

When creating network diagrams, what icon description typically represents a network router? a.) An icon that is rectangular in shape, with squiggly lines on the front. b.) An icon that resembles a brick wall. c.) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. d.) An icon that is rectangular, which contains four arrows pointing in opposite directions.

c.) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

When creating network diagrams, what icon description typically represents a network switch? a.) An icon that resembles a brick wall. b.) An icon that is rectangular in shape, with squiggly lines on the front. c.) An icon that is rectangular, which contains four arrows pointing in opposite directions. d.) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

c.) An icon that is rectangular, which contains four arrows pointing in opposite directions.

What is the most popular web server application? a.) NGINX b.) Lighttpd c.) Apache d.) Microsoft Internet Information Services

c.) Apache

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a.) Toxic Chemical Safety Procedure (TCSP) b.) Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c.) Material Safety Data Sheet (MSDS) d.) Environmental Chemical Hazard Sheet (ECHS)

c.) Material Safety Data Sheet (MSDS)

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a.) Each pair should be twisted around another pair to reduce cross talk. b.) No less than 1 inch of the cable should be exposed. c.) No more than 1 inch of the cable should be exposed. d.) Each pair should be stripped of insulation so that it doesn't get caught in the jack.

c.) No more than 1 inch of the cable should be exposed.

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded? a.) Twisted pair cable has a near infinite bend radius. b.) No more than two times the diameter of the cable. c.) No more than four times the diameter of the cable. d.) No more than ten times the diameter of the cable.

c.) No more than four times the diameter of the cable.

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a.) The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. b.) The Presentation layer is responsible for transporting Application layer payloads from one application to another. c.) The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. d.) The Presentation layer describes the interface between two applications, each on separate computers.

c.) The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? a.) main distribution frame b.) network interface device c.) entrance facility d.) intermediate distribution frame

c.) entrance facility

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a.) fail-open b.) fail-dynamic c.) fail-close d.) fail-tolerant

c.) fail-close

Where is a demarc located in relation to the structured cabling of an enterprise environment? a.) at the Intermediate Distribution Frame (IDF) b.) between the MDF and the IDF c.) in the Main Distribution Frame (MDF) d.) in the work area

c.) in the Main Distribution Frame (MDF)

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer? a.) master service agreement b.) statement of work c.) service-level agreement d.) memorandum of understanding

c.) service-level agreement

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a.) interrupting failure b.) temporary failure c.) upset failure d.) catastrophic failure

c.) upset failure

What statement correctly identifies the purpose of a software patch? a.) A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources. b.) A software patch involves the process of reverting to a previous version of software after attempting to upgrade it. c.) A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. d.) A software patch is a correction, improvement, or enhancement to software.

d.) A software patch is a correction, improvement, or enhancement to software.

What federal agency is charged with safety and health in the workplace? a.) Hazardous Materials and Safety Management (HMSM) b.) Office Safety and Standards Department (OSSD) c.) Workplace Safety and Hazard Administration (WSHA) d.) Occupational Safety and Health Administration (OSHA)

d.) Occupational Safety and Health Administration (OSHA)

What statement regarding main distribution frame or main distribution facilities is accurate? a.) The MDF refers to the racks holding network equipment in an organization. b.) The MDF and entrance facility are always in separate rooms. c.) The MDF provides intermediate connection between the IDF and end-user equipment on each floor. d.) The MDF is the centralized point of interconnection for an organization's LAN or WAN.

d.) The MDF is the centralized point of interconnection for an organization's LAN or WAN.

Which of the following is an example of encapsulation? a.) The subtraction of a header from data inherited from the layer below in the OSI model. b.) The addition of a trailer to data inherited from the layer above in the OSI model. c.) The modification of headers from a higher layer in the OSI model. d.) The addition of a header to data inherited from the layer above in the OSI model.

d.) The addition of a header to data inherited from the layer above in the OSI model.

What does backbone cabling consist of? a.) It is cabling that connects workstations to the closest data room and to switches housed in the room. b.) The shielded cables that are used for high data transmission rates between an organization and an ISP. c.) Short length cables with connectors at both ends. d.) The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

d.) The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a.) request for quote b.) memorandum of understanding c.) statement of work d.) request for proposal

d.) request for proposal


Set pelajaran terkait

PSYCH STATS CH 1-5 Homework questions

View Set

Chapter 42: Cardiovascular Dysfunction

View Set

(notes) 8.6 Solving Exponential and Logarithmic Equations

View Set

неправильные глаголы eyes open 2 2 часть

View Set

Ch. 3 Income Statement LearnSmart

View Set