Chapter 1 Exam question and answers

Ace your homework & exams now with Quizwiz!

Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?

Byod

Which two Internet connection options do not require that physical cables be run to the building?

Cellular and sattelite

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office?

dsl and cable

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?

implementing a firewall installing antivirus software

What is a characteristic of a converged network?

it delivers data, voice, and video over the same network infrastructure

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to- peer network?

less cost to implement scalable easy to create

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

security

Which statement describes the use of powerline networking technology?

A device connects to an existing home LAN using an adapter and an existing electrical outlet.*

Which statement describes a characteristic of cloud computing?

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.*

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?

Wireless Lan

Which expression accurately defines the term bandwidth?

a measure of the data carrying capacity of the media

Which device performs the function of determining the path that messages should take through internetworks?

a router

What security violation would cause the most amount of damage to the life of a home user?

capturing of personal data that leads to identity theft

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

congestion

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?

data confidentiality

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)

implementing a firewall and installing antivirus

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

intranet

Which two statements describe intermediary devices?

Intermediary devices direct the path of the data.* Intermediary devices connect individual hosts to the network.*

What is the internet?

It provides connection with interconnected global networks.

What type of network must a home user access in order to do online shopping?

The internet

What are two functions of end devices on a network?

They originate the data that flows through the network.* They are the interface between humans and the communication network.*

What type of network traffic requires QoS?

Video Conferencing

Drag and drop Match the form of network communication with its description.

Web pages that groups of people can edit and view together -> wiki Interactive websites where people created and share user-generated content with friends and family -> Social media real-time communication of between two or more people -> instant messaging an audio-based medium that allows people to deliver their recordings to a wide audience -> podcast

only made possible by requiring validation of the receiver only the intended recipients can access and read the data only encrypted connections (VPNs) are allowed to transfer data

ensuring confidentiality maintaining integrity ensuring availability

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

extranet

Uses

satellite -> Not suited for heavily wooded areas dialup telephone -> typically has very low bandwidth DSL -> splits the access line into three signals and high bandwith connection that runs over telephone line cable -> uses coaxial cable as a medium

What two criteria are used to help select a network medium from various network media?

the distance the selected medium can successfully carry a signal* the environment where the selected medium is to be installed*


Related study sets

Chapter 28 Reflection and Refraction

View Set

ef4 pre-int 9C present perfect or past simple (TB GRAM)

View Set

Constipation, diarrhoea, rectal bleeding

View Set

8.1: Gross Domestic Product Measures Total Production

View Set