all exams chapter 1
Connie is configuring the network for a new restaurant that her company is about to open. She has five desktop computers, four LaserJet printers, and three laptops. She plans on using a peer-to-peer environment. What makes peer-to-peer suitable for Connie's restaurant? Choose all that apply.
, A&B
Nan is the IT manager for a company that's expanding into new offices. She has three business units in different offices: sales, engineering, and accounting. She wants to keep the networks separate but also wants the devices on each network to communicate with each other in the same office. How should the office be set u
A router with three routing ports serving the three offices and a switch for the hosts
Emmi is her company's IT manager. Since her company is growing, she wants to switch from a peer-to-peer (P2P) networking architecture to a client-server architecture. The company has grown to 30 users, so why is it better for her to use a client-server architecture over peer-to-peer? Choose all that apply.
A&B
Isabel has been a part of her company's IT team for several years. During her tenure, she has added some unusual items to the company's knowledge base. Some of the following answers are actual data in the knowledge base. Can you guess which ones are real knowledge base material?
A&B
Melanie is currently preparing for her Network+ certification exam, and she has been presented with the following question, "What are the primary transport layer protocols, and what is their function in transporting application layer payloads from one application to another?" How does Melanie answer? Choose all that apply.
A&B
Anwar was working on his desktop computer and left it on while he worked on it. Suddenly, the screen went blank, and the computer restarted. Just before this happened, Anwar felt a slight shock. What might have caused the computer to restart? Choose all that apply.
A&C
Emei has recently been hired as a technical assistant by a major network component manufacturer. She will be part of a quality control team responsible for checking network interface cards (NICs) for any damage or defects. However, before starting her actual work, her supervisor has asked her a basic question related to NICs. The question is: "On which layer or layers does the NIC operate, and what are some examples of the protocols that a NIC uses for communication?" Choose all that apply.
All the above
Irene enjoys working with a client-server architecture. Although it is typically more complex in design and maintenance than its peer-to-peer counterpart, a client-server architecture offers many advantages. What are some of the benefits of working in a client-server environment? Choose all that apply.
All the above
Which of the following devices have NICs (network interface cards) either on board or attached to an expansion slot not including wireless adapters? Choose all that apply.
All the above
Kenneth toured the new building's telecom room and saw a dozen switches connected with a fiber connection on one port and the rest of the ports connected to Cat 8 cable. What is the fiber conduit called?
Backbone
Darwin is planning to set up five different networks for five different offices for the same company and in the same building, all of which will be connected to a single ISP. Each network will be confined to a single large office, which will have five computers and a LaserJet printer. All devices within the individual offices will be interconnected. Darwin needs to know how many NICs in the router and how many switches will be needed for his plan to work? For the time being, there will be no communication between networks.
Darwin needs six NICs for the router. One for each network and one for the ISP connection, and he needs five switches; one port on each switch will be dedicated to the NIC on the router.
Orien has recently discovered that two ports on one of his company's managed Layer 3 switches are intermittently failing. Since all ports on the switch are already in use, replacing the switch would cause significant disruption to the majority of the office staff. Orien must adhere to the change management policy in place and develop a plan that will minimize any potential disruption to the staff. What troubleshooting step is Orien on?
Establish a plan for resolving the problem.
Francisco worked in a Network Operations Center (NOC) for a medium-sized business. Everything was working fine on Friday, but on Monday, he received some technical service tickets complaining about the Internet being down. He started investigating the issue by looking through the visitor logs. He knew that a cleaning crew comes once a week to clean the floors of the NOC and make sure there is no dust around the desks. He discovered that the cleaning crew had been inside the NOC on Saturday. Francisco then checked every rack and noticed that some cables were unplugged, which were connected to a router connected to the WAN. He plugged the cable back in, and the Internet came back online. What troubleshooting step was Francisco on?
Establish a theory of probable cause.
A physical address is embedded on every network adapter on the globe. This is called a NAC (Network Access Control) address.
False
When using IMAP4, email is downloaded to the client computer and then usually deleted from the server. In contrast, with POP3, the client application manages the email while it remains on the server, making it ideal for accessing email from multiple devices.
False
Rayco just finished repairing a company laptop. There seemed to be a memory chip issue. Sometimes, while the user traveled with the laptop, the system would randomly crash and get a blue screen of death (BSOD), and occasionally the system became unstable or would sometimes lose data.--CUT--One of the chips was not all the way pressed into its slot. So, he pushed the chip back in its slot and checked the other chips; everything else was fine. Rayco then put the machine back together. What would be a good way for Rayco to test the laptop to see if he can get the same errors to happen again?
Handle it like you would if you were on a trip. Roll it over different terrain in a suitcase for a couple of days, put it in and take it out of the car, and then check it again for errors by using the onboard diagnostic utilities.
Katherine goes to her banking website to transfer money between her checking and savings accounts. Before she makes a transaction, she looks at the top left of her browser's navigation bar and sees that the website is using HTTP and not HTTPS. What should Kathrine do?
Leave the website since HTTPS is not secure.
David is new at his networking job, and his supervisor quizzes him on the differences between physical and logical network topology. What is the correct answer?
Logical network topology refers to how data is transmitted between devices in a network. Physical topology deals with the actual layout of devices and cables.
Lani just started working at a Network Operations Center (NOC) and must follow certain guidelines whenever she uses tools in her job. Which government agency provides these guidelines?
OSHA
Tia is using a smartwatch, a Bluetooth headset, and carrying her phone. What type of network is this an example of?
PAN (personal area network)
Erin was studying for her Network+ certification exam when she encountered this question, "Which OSI model layer is responsible for reformatting, compressing and encrypting data in a way that the application on the receiving end can read?" What is Erin's answer?
Presentation Layer (Layer 6)
Diana is seeking ways to effectively manage her network. There are protocols available that allow network managers to check, monitor, and gather information about network traffic. These protocols can alert network administrators about any adverse conditions that require attention to maintain the health of their network and host devices without relying on third-party software. Which protocol offers this capability?
SNMP (Simple Network Management Protocol)
Xander is the IT manager for SimCo, which has offices located in both San Francisco and New York. Today, he is planning to test a new employee on their knowledge of how the network connects between the two offices. This is a standard connection; no encryption is involved. So, new hire, what is involved in making the connections between the San Francisco and New York offices?
San Francisco LAN-WAN/ISP/WAN-New York LAN
Which layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
Session- Layer 5
Willanda had a passion for working with computers. In fact, she loved it so much that she would occasionally build them from scratch for her friends. One of her golden rules was to never work without an ESD wrist strap, which protects the computer from static electricity. However, one day a friend called her in need of help because a memory chip had died. Willanda went to her friend's house to fix it, but she realized that she had forgotten her ESD wrist strap at home. Despite this, she was still determined to complete the task. She proceeded very carefully, taking all necessary precautions to avoid any potential damage to the computer. How was Willanda able to accomplish her task without damaging the computer or injuring herself even though she did not have the wrist strap?
She unplugged the computer and grounded herself by touching the metal chassis and sometimes the power supply.
Jackson is currently preparing for his Network+ certification exam and has encountered a question regarding the communication of computers on a network via common protocols. The question asks about the two primary network protocols that are used for communication. What are those primary protocols?
TCP/IP
Gael wants to remote into a client's computer using Telnet, but the client refuses. Why is the client refusing to allow Gael to use Telnet?
Telnet is not an encrypted application. Therefore, transmissions can be subject to spying.
Mace is in the process of setting up his email account and is being prompted for his POP3 server address. What does the POP3 server do when email is sent to it?
The POP3 server is responsible for receiving email on a mail server. When Mace logs on, the POP3 server will download the email to his email client, such as Outlook, and then typically remove it from the server
Larkyn is in the process of setting up his email account and is being prompted for his SMTP server address. What is the SMTP server address for?
The SMTP server address is used whenever Larkin's sends email.
An IP address is an address assigned to each node on a network, which the network layer uses to uniquely identify them across multiple networks.
True
DNS (Domain Name System) helps clients find web servers over a network such as the Internet. It translates domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) that computers use to communicate with each other over a network.
True
Protocols are rules used between networked devices for communication.
True
Warda just finished repairing a company desktop computer. There seemed to be a power supply issue. The user told Warda that sometimes the computer would shut down for no reason and occasionally they would hear strange noises coming from the power supply fan. Once there was a burning smell coming from the computer. So after hearing those symptoms, Warda replaced the power supply with a new, more powerful one. She then ran tests on the power supply through the CMOS utilities, and the problem disappeared. What troubleshooting step was she on?
Verify functionality and implement preventive measures.
As in life, just as a journey starts with a first step, in troubleshooting that journey starts with the very first question. To identify the problem and its symptoms, you first have to ask one simple but very important question. What is that question?
What has recently changed?
Jenney wants to connect all her devices to one another without a central device, creating a fully interconnected network. What is this physical topology called?
mesh topology
Adrian is a new employee and as per company policy, he must undergo emergency training for the building, regardless of the company he works for. During the training, he was shown around the building and saw the fire sprinklers and fire extinguishers. He was also shown the gas system suppression system and saw how it is activated. Later, when he reached his department, they discussed targeted fire suppression and detection methods. They explained how they suppress fire without damaging sensitive electronics. Adrian is then given a test about the emergency systems. The question asked was "At what level to you find gas suppression systems?" How did Adrian answer?
room level
Jacoby arranged five computers and two network-capable Laserjet printers in his office and connected them to a switch. What is this physical topology called?
star topology
Idris has recently started as an intern at a network outsourcing firm. His supervisor is conducting a quiz for all the new interns to test their understanding of networking and the OSI model. One of the questions posed to the interns is: "Which OSI layer is responsible for transmitting messages from one node to another until they reach their intended destination host?" How should Idris answer?
the network layer (Layer 3)
Hal is deciding whether to use the switch or hub in his network. So, he asks his best friend, a network technician, for advice. Hal asks his friend, "What's the main difference between a switch and a hub?" How does his friend answer?
A hub broadcasts incoming data to all ports, while a switch directs incoming data to the port(s) that will send it to its intended destination within the local network.
Hennessy is studying for the Network+ certification exam. The question asked is, "What is the definition of a network?" How does Hennessy answer?
A network is a group of computers and other devices (such as printers) that are connected by some type of transmission media.