Module 1 Review Questions

Ace your homework & exams now with Quizwiz!

What is the fundamental distinction between a node and a host?

A host is a computer that hosts a resource on the network, and a node is any computer or device that can be addressed on the network.

What is the fundamental distinction between a layer 2 switch and a router?

A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.

What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

Active Directory (AD)

Which of the following is an application layer protocol?

Apache

In Question 6, suppose Windows Server 2019 is installed on one computer. Which networking model can the network now support that it could not support without the upgrade?

Client-server

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

At the network layer, what type of address is used to identify the receiving host?

IPV4

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem.

A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?

Layer 7 (Application Layer)

What is the fundamental distinction between a MAN and a WAN?

MAN is a group of connected LANs in the same geographical area. WAN is a group of connected LANs spread over a wide geographical area.

Which of the following applications could be used to run a website from a server?

Ngnix

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-peer

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL

Which two encryption protocols might be used to provide secure transmissions for email services?

SSL and TLS

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?

The layer of the OSI model that will be used in troubleshooting this problem will be the physical layer. The two layers where the network adapter work will be the physical layer and the data link layer.

While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won't even solve the problem. What should you do next in the troubleshooting process?

The things that you should do next in the troubleshooting process are: Set up a plan of action to handle or resolve the problem and then you need to implement the solution. Lastly you have to verify full system functionality and, if applicable, do implement any kind of preventive measures.

List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?

The two most common protocols used by the transport layer are the transmission control protocol (TCP) and the user datagram protocol (UDP).

At the data link layer, which type of network address is used to identify the receiving node?

The type of network address used for identifying the receiving node is MAC address, Physical address and data link address.

In the event of a fire, the most appropriate failure policy is a _________________ policy.

fail-close


Related study sets

Chapter 22 - The Industrial Revolution

View Set

Database Design Chapter 2 Data Models

View Set

Ch. 14 Head, Face, Neck, and Regional Lymphatics

View Set

Small Ruminants: Ovine, Caprine and Camelids

View Set

Healthcare foundations prepU ch. 40 Oxygenation and Perfusion

View Set

APHuG Unit 1: Thinking Geographically

View Set