Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

1 3 A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe? a) BYOD b) online collaboration c) cloud computing d) video conferencing

a

1 5 In which scenario would the use of a WISP be recommended? a) a farm in a rural area without wired broadband access b) any home with multiple wireless devices c) an internet cafe in a city

a

1.3.3 4 Which type of network topology lets you see the actual location of intermediary devices and cable installation? a) physical topology b) logical topology

a

1 1 During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? a) identify theft b) spyware c) zero-day attack d) DoS attack

b

1.2.6 2 When data is encoded as pulses of light, which media is being used to transmit the data? a) wireless b) Fiber-optic cable c) copper cable

b

1.3.3 1 Which connection physically connects the end device to the network? a) port b) NIC c) interface

b

1.3.3 3 Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? a) physical topology b) logical topology

b

1.2.6 3 Which two devices are intermediary devices? (2) a) hosts b) routers c) servers d) switches

b, d

1.8.3 4 Which option describes a network attack that occurs on the first day that a vulnerability becomes known? a) firewall b) virus, worm, or Trojan horse c) zero-day or zero-hour d) virtual private network (VPN) e) denial of service (DoS)

c

1 2 Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators? a) extendednet b) intranet c) internet d) extranet

d

1.4.5 3 Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? a) extranet b) intranet c) LAN d) WAN

d

1.6.6 2 Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? a) fault tolerance b) scalability c) QoS d) security

d

1.8.3 2 Which attack slows down or crashes equipment and programs? a) firewall b) virus, worm, or Trojan horse c) zero-day or zero-hour d) virtual private network (VPN) e) denial of service (DoS)

e

1.4.5 2 Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? a) extranet b) intranet c) LAN d) WAN

a

1.6.6 4 Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? a) fault tolerance b) scalability c) QoS d) security

a

1 4 What is an ISP? a) it is a standards body that develops cabling and wiring standards for networking b) it is a protocol that establishes how computers within a local network communicate c) it is an organization that enables individuals and businesses to connect to the internet d) it is a networking device that combines the functionality of several different networking devices in one

c

1.2.6 1 Which of the following is the name for all computers connected to a network that participate directly in network communication? a) servers b) intermediary devices c) hosts d) media

c

1.6.6 1 When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? a) fault tolerance b) scalability c) QoS d) security

b

1.7.10 1 Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? a) BYOD b) video communications c) cloud computing

b

1.7.10 2 Which feature describes using personal tools to access information and communicate across a business or campus network? a) BYOD b) video communications c) cloud computing

a

1.8.3 3 Which option blocks unauthorized access to your network? a) firewall b) virus, worm, or Trojan horse c) zero-day or zero-hour d) virtual private network (VPN) e) denial of service (DoS)

a

1.7.10 4 Which feature is being used when connecting a device to the network using an electrical outlet? a) smart home technology b) powerline c) wireless broadband

b

1.8.3 5 Which option describes malicious code running on user devices? a) firewall b) virus, worm, or Trojan horse c) zero-day or zero-hour d) virtual private network (VPN) e) denial of service (DoS)

b

1.3.3 2 Which connections are specialized ports on a networking device that connect to individual networks? a) port b) NIC c) interface

c

1.4.5 1 Check your understanding of common types of networks by choosing the BEST answer to the following questions. Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? a) extranet b) intranet c) LAN d) WAN

c

1.6.6 3 With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? a) fault tolerance b) scalability c) QoS d) security

c

1.7.10 3 Which feature contains options such as Public, Private, Custom and Hybrid? a) BYOD b) video communications c) cloud computing

c

1.7.10 5 Which feature uses the same cellular technology as a smartphone? a) smart home technology b) powerline c) wireless broadband

c

1.8.3 1 Which option creates a secure connection for remote workers? a) firewall b) virus, worm, or Trojan horse c) zero-day or zero-hour d) virtual private network (VPN) e) denial of service (DoS)

d


Set pelajaran terkait

Parasitology, Surgical Nursing, Anesthesia

View Set

Chapter 9 Medical Expense plans and concepts

View Set

PME: The Neurological System Pt 1

View Set

Driver Education: Vehicle Balance

View Set

Introduction to Web Development with HTML, CSS, JavaScript

View Set