Networking Exam 1

Ace your homework & exams now with Quizwiz!

In the DNS hierarchy, where is information about how to find the top-level domain servers held? a. On the DNS root servers. b. On DNS caching-only servers. c. In the organization's forward lookup zone. d. In the hosts file on the local machine.

A) On the DNS root servers.

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established. True False

True

The industry standard height for a rack in rack units is 42U. True False

True

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model? a. Layer 6 b. Layer 7 c. Layer 4 d. Layer 5

B) Layer 7

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Application c. Physical d. Data Link

C) Physical

What is by far the most popular DNS server software available? a. Oracle Resolver b. Microsoft DNS c. Dnsmasq d. BIND

D) BIND

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. True False

False

What command can you utilize to display TCP/IP configuration information for each network adapter installed? a. ipconfig /show b. ipconfig /full c. ipconfig /list d. ipconfig /all

D) ipconfig /all

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? a. ifconfig b. route c. traceroute d. ping

D) ping

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on? a. port 546 b. port 67 c. port 68 d. port 547

D) port 547

DNS follows a centralized database model, allowing for easier management of DNS records. True False

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. True False

False

The 1024 - 65535 range of ports is also known as the "well-known" range. True False

False

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session? a. SIP b. LDAP c. TFTP d. NTP

A) SIP

What mail protocol is used to send mail messages to a server? a. SMTP b. POP3 c. IMAP4 d. HTTPS

A) SMTP

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? a. PTR record b. A record c. AAAA record d. TXT record

C) AAAA record

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers. True False

True

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. True False

True

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS. True False

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. True False

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle. True False

True

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. True False

True

UDP port 123 is utilized by the Network Time Protocol service. True False

True

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. True False

False

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? a. master license agreement b. master service agreement c. memorandum of understanding d. service-level agreement

A) master license agreement

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used? a. star topology b. star bus topology c. mesh topology d. bus topology

A) star topology

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling? a. intermediate distribution frame b. entrance facility c. network interface device d. main distribution frame

B) entrance facility

What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block? a. wire cinching tool b. punchdown tool c. block trimmer tool d. wire crimper tool

B) punchdown tool

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer? a. memorandum of understanding b. service-level agreement c. statement of work d. master service agreement

B) service-level agreement

When creating network diagrams, what icon description typically represents a network router? a. An icon that resembles a brick wall. b. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. c. An icon that is rectangular in shape, with squiggly lines on the front. d. An icon that is rectangular, which contains four arrows pointing in opposite directions.

B) An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

Encrypted control of remote computers using the RDP protocol is accomplished using what port number? a. UDP 10000 b. TCP 3389 c. TCP 22 d. UDP 161

B) TCP 3389

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application? a. Transport Layer b. Application Layer c. Session Layer d. Presentation Layer

C) Session Layer

Where is a demarc located in relation to the structured cabling of an enterprise environment? a. in the work area b. between the MDF and the IDF c. in the Main Distribution Frame (MDF) d. at the Intermediate Distribution Frame (IDF)

C) in the Main Distribution Frame (MDF)

What is the minimal amount of voltage required to damage an electrical component? a. 100 volts b. 5 volts c. 1500 volts d. 10 volts

D) 10 volts

Which of the following is an example of encapsulation? a. The subtraction of a header from data inherited from the layer below in the OSI model. b. The modification of headers from a higher layer in the OSI model. c. The addition of a trailer to data inherited from the layer above in the OSI model. d. The addition of a header to data inherited from the layer above in the OSI model.

D) The addition of a header to data inherited from the layer above in the OSI model.

Which of the following is NOT a range of IP addresses recommended for use in private networks? a. 127.0.0.0 through 127.255.255.255 b. 10.0.0.0 through 10.255.255.255 c. 172.16.0.0 through 172.31.255.255 d. 192.168.0.0 through 192.168.255.255

A) 127.0.0.0 through 127.255.255.255

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? a. Active Directory Domain Services (AD DS) b. Windows Named Resource Services (WN RS) c. Automated Directory Network Services (AD NS) d. Active Directory Federated Users (AD FU)

A) Active Directory Domain Services (AD DS)

What is the most popular web server application? a. Apache b. Microsoft Internet Information Services c. NGINX d. Lighttpd

A) Apache

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? a. Both IPv4 and IPv6 protocols will be used on the network. b. The router serving the network will have a redundant spare. c. Two different IPv4 address spaces will exist on the same network segment. d. The network will exist on two separate segments, separated by a proxy.

A) Both IPv4 and IPv6 protocols will be used on the network.

What is a defining characteristic of a bus topology based network? a. Devices are daisy-chained together in a single line. b. Devices are connected to two adjacent devices, and communication priority is granted by a token. c. Devices are connected directly to a centralized networking device, known as a network switch. d. Devices are directly attached to a network router, which forwards data to intended destinations.

A) Devices are daisy-chained together in a single line.

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used? a. EUI-64 b. UUID-128 c. MACin6 d. IEEE 802.36

A) EUI-64

What is the ARPA domain suffix utilized for? a. It is used for reverse DNS queries, and holds PTR records. b. It is used to announce records for other TLDs such as .com and .net. c. It is a specialized government restricted TLD. d. It is a private TLD used for synchronization of zones between servers.

A) It is used for reverse DNS queries, and holds PTR records.

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options? a. Material Safety Data Sheet (MSDS) b. Dangerous and Hazardous Waste Disposal Sheet (DHWDS) c. Environmental Chemical Hazard Sheet (ECHS) d. Toxic Chemical Safety Procedure (TCSP)

A) Material Safety Data Sheet (MSDS)

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate? a. Network b. Transport c. Session d. Application

A) Network

What federal agency is charged with safety and health in the workplace? a. Occupational Safety and Health Administration (OSHA) b. Hazardous Materials and Safety Management (HMSM) c. Office Safety and Standards Department (OSSD) d. Workplace Safety and Hazard Administration (WSHA)

A) Occupational Safety and Health Administration (OSHA)

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information? a. TXT record b. PTR record c. SRV record d. CNAME record

A) TXT record

What statement regarding main distribution frame or main distribution facilities is accurate? a. The MDF is the centralized point of interconnection for an organization's LAN or WAN. b. The MDF provides intermediate connection between the IDF and end-user equipment on each floor. c. The MDF refers to the racks holding network equipment in an organization. d. The MDF and entrance facility are always in separate rooms.

A) The MDF is the centralized point of interconnection for an organization's LAN or WAN.

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer? a. The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read. b. The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application. c. The Presentation layer describes the interface between two applications, each on separate computers. d. The Presentation layer is responsible for transporting Application layer payloads from one application to another.

A) The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean? a. The computer is configured to use DHCP, but was unable to lease an address. b. The computer has been assigned a routed public IP address. c. The network card is set up for multicast communication. d. The network card has been erroneously assigned a loopback address.

A) The computer is configured to use DHCP, but was unable to lease an address.

What part of a MAC address serves as the extension identifier, or device ID? a. The last 24 bits of the MAC address. b. The last 12 bits of the MAC address. c. The first 12 bits of the MAC address. d. The first 24 bits of the MAC address.

A) The last 24 bits of the MAC address.

Which of the following is not one of the disadvantages of peer-to-peer networks? a. They centralize user account logins. b. They lack scalability. c. They are not necessarily secure. d. They are impractical for connecting large numbers of computers.

A) They centralize user account logins.

In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire? a. fire suppression agent b. fire extinction agent c. extinguishing medium d. eliminating factor

A) fire suppression agent

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? a. ipconfig /flushdns b. ipconfig /refresh c. ipconfig /renew d. ipconfig /release

A) ipconfig /flushdns

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? a. vertical cross connect b. diagonal cabling c. horizontal cross connect d. patch cable

A) vertical cross connect

What command can be used to check a domain computer's time source from a Command Prompt window? a. w32tm /query /source b. time --source c. ntpd show source d. date /source

A) w32tm /query /source

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded? a. No more than two times the diameter of the cable. b. No more than four times the diameter of the cable. c. No more than ten times the diameter of the cable. d. Twisted pair cable has a near infinite bend radius.

B)

When planning horizontal cabling, what is the maximum allowable distance that can be used? a. 1,000 feet b. 100 meters c. 100 feet d. 300 meters

B) 100 meters

Which of the following IPv6 addresses represents a global unicast address? a. FD00::/8 b. 2000::/3 c. FE80::10 d. FC00::/7

B) 2000::/3

When creating network diagrams, what icon description typically represents a network firewall? a. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. b. An icon that resembles a brick wall. c. An icon that is rectangular, which contains four arrows pointing in opposite directions. d. An icon that is rectangular in shape, with squiggly lines on the front.

B) An icon that resembles a brick wall.

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? a. fail-close b. fail-open c. fail-tolerant d. fail-dynamic

B) Fail-Close

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? a. MAC address b. IP address c. autonomous system address d. port address

B) IP address

What does a statement of work document do? a. It is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP. b. It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline. c. It documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts. d. It is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

B) It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.

What statement regarding the Server Message Block protocol is accurate? a. It is a protocol used for accessing network-based LDAP directories. b. It is used by Windows and UNIX-based operating systems to share files. c. It is a simple protocol used to synchronize block messages written to iSCSI drives on a network. d. It is a signaling protocol used to make a connection between hosts prior to data transfer.

B) It is used by Windows and UNIX-based operating systems to share files.

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? a. POP3 b. SNMP c. SMTP d. HTTP

B) SNMP

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system? a. ISO 9001 b. TIA/EIA-568 c. IEEE 802.3 d. ITU 922

B) TIA/EIA-568

What statement accurately reflects what occurs when a message is too large to transport on a network? a. An ICMP error is generated, and the application must reformat the data for transmission. b. The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP). c. The message is sent anyway, and is received by the destination as garbage data. d. The message is discarded and must be sent again.

B) The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting? a. at least 6 feet b. at least 3 feet c. at least 12 feet d. at least 3 inches

B) at least 3 feet

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy? a. fail-tolerant b. fail-open c. fail-close d. fail-oriented

B) fail-open

The Data Link Layer utilizes what name for its protocol data unit (PDU)? a. bit b. frame c. packet d. data

B) frame

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase? a. request for quote b. request for proposal c. memorandum of understanding d. statement of work

B) request for proposal

Which of the following IP addresses would be a loopback IP address? a. 192.168.1.1 b. 169.254.0.1 c. 127.0.0.1 d. 224.0.0.1

C) 127.0.0.1

When creating network diagrams, what icon description typically represents a network switch? a. An icon that resembles a brick wall. b. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. c. An icon that is rectangular, which contains four arrows pointing in opposite directions. d. An icon that is rectangular in shape, with squiggly lines on the front.

C) An icon that is rectangular, which contains four arrows pointing in opposite directions.

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Transport c. Application d. Link

C) Application

What does the MX record do in a forward DNS zone? a. It holds the alternative names for a host. b. It identifies the authoritative name server for a domain. c. It identifies the e-mail server to be used for e-mail traffic for the domain. d. It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.

C) It identifies the e-mail server to be used for e-mail traffic for the domain.

At what layer of the OSI model does a network switch normally operate? a. Layer 3 b. Layer 4 c. Layer 2 d. Layer 5

C) Layer 2

In the United States, who is able to activate the Emergency Alert System at the national level? a. The Federal Bureau of Investigation b. Local law enforcement c. The President d. Any U.S. state or territory

C) The President

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination? a. The cable will lose its conductive properties. b. The termination will fail over time due to oxidation. c. The exposure of the cable can cause transmission interference between wires. d. Exposing more cable than necessary can cause corrosion of the copper wire.

C) The exposure of the cable can cause transmission interference between wires.

How do routers create a broadcast domain boundary? a. They listen to and direct broadcast traffic. b. They forward broadcasts only to necessary segments. c. They do not forward broadcast traffic. d. They only forward broadcasts that are intended for multiple subnets.

C) They do not forward broadcast traffic.

The TCP and UDP protocols both exist at what layer of the OSI model? a. Presentation b. Network c. Transport d. Application

C) Transport

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system? a. if status b. ipconfig /all c. ifconfig -a d. ip show

C) ifconfig -a

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? a. global address b. anycast address c. link local address d. multicast address

C) link local address

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name? a. ftp1.dallas b. ftp1 c. mycompany.com d. ftp1.dallas.mycompany.

C) mycompany.com

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? a. domain names b. MAC addresses c. port numbers d. IP addresses

C) port numbers

In the classful addressing scheme, what range of network addresses is considered a Class B? a. 192.0.0.x to 223.255.255.x b. 1.x.y.z to 126.x.y.z c. 224.x.y.z to 255.x.y.z d. 128.0.x.y to 191.255.x.y

D) 128.0.x.y to 191.255.x.y

Equipment data racks most commonly are a standard width of what measurement? a. 20 inches b. 30 inches c. 25 inches d. 19 inches

D) 19 inches

What statement accurately describes what a cable bend radius determines? a. A cable bend radius determines the total number of bends that can exist in an overall cable before data is impaired. b. A cable bend radius is the radius of the minimum arc into which you can loop the cable without impairing data. c. A cable bend radius defines the twist rate of the cable inside of the insulation. d. A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

D) A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

Which of the following is NOT a best practice when performing cable management? a. A cable tester should be used to verify that each segment of cable is transmitting reliably. b. Cable should not be placed across a floor where they might be damaged by traffic. c. Grounding requirements should be followed when running cables. d. Cable ties should be pulled tightly to keep cables from moving around in a bundle.

D) Cable ties should be pulled tightly to keep cables from moving around in a bundle.

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address? a. DAC (Data Access Control) address b. DAC (Digital Access Control) address c. PAC (Packet Access Control) address d. MAC (Media Access Control) address

D) MAC (Media Access Control) address

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced? a. Each pair should be stripped of insulation so that it doesn't get caught in the jack. b. No less than 1 inch of the cable should be exposed. c. Each pair should be twisted around another pair to reduce cross talk. d. No more than 1 inch of the cable should be exposed.

D) No more than 1 inch of the cable should be exposed.

What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling? a. shielded twisted pair (STP) b. unshielded twisted pair (UTP) c. fiber-optic d. RG-6 Coaxial

D) RG-6 Coaxial

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? a. File Transfer Protocol (FTP) b. Secure Shell (SSH) c. Secure Sockets Layer (SSL) d. Remote Desktop Protocol (RDP)

D) Remote Desktop Protocol (RDP)

What does backbone cabling consist of? a. It is cabling that connects workstations to the closest data room and to switches housed in the room. b. Short length cables with connectors at both ends. c. The shielded cables that are used for high data transmission rates between an organization and an ISP. d. The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

D) The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

How can you determine the manufacturer of a NIC card based on the MAC address? a. The first 12 bits and last 12 bits combined are known as the Organizationally Unique Identifier. b. The last 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer. c. The middle 24 bits, known as the Organization Universal Identifier, identify the manufacturer. d. The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

D) The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? a. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. b. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. c. The packet will be dropped silently, requiring the communicating application try again. d. The packet will be divided into smaller packets using fragmentation.

D) The packet will be divided into smaller packets using fragmentation.

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term? a. VoIP router b. VoIP ATB (analog telephone branch) c. VoIP LEC (local exchange carrier) d. VoIP PBX (private branch exchange)

D) VoIP PBX (private branch exchange)

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines? a. VoIP MTA b. VoIP translator c. VoIP PBX d. VoIP gateway

D) VoIP gateway

What is the name of the GUI front end that is available for the Nmap utility? a. iMap b. VizMap c. GUINmap d. Zenmap

D) Zenmap

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? a. dig --server 8.8.8.8 --type=mx mycompany.com b. dig -s 8.8.8.8 -t mx mycompany.com c. dig query 8.8.8.8 domain mycompany.com type mx d. dig @8.8.8.8 mycompany.com MX

D) dig @8.8.8.8 mycompany.com MX

A change coordinator functions as what type of manager? a. human resources manager b. time manager c. inventory manager d. project manager

D) project manager

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors? a. catastrophic failure b. interrupting failure c. temporary failure d. upset failure

D) upset failure

What text editor can be used on Linux to view and edit the contents of a configuration file? a. Notepad b. edit c. Microsoft Word d. vim

D) vim

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages? a. spreadsheet b. workgroup c. co-op d. wiki

D) wiki

What type of diagram is a graphical representation of a network's wired infrastructure? a. topology map b. network diagram c. system diagram d. wiring schematic

D) wiring schematic

A 66 block is more suitable for data connections than the older 110 block. True False

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons. True False

False

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas. True False

False

F5 Networks set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices. True False

False

In a rack setup, a device called a KVM allows multiple consoles to connect to a single device on the rack. True False

False

Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients. True False

False

Static electricity is an electrical charge in motion. True False

False

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. True False

False

The Transport layer header addresses a receiving application by a number called a MAC address. True False

False

The protocol data unit for the Physical layer of the OSI model is payload, or data. True False

False

A hexadecimal number is a number written in the base 16 number system. True False

True

A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. True False

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission. True False

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF). True False

True

The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice. True False

True

When using IPv6, two or more nodes on the same link are said to be neighbors. True False

True

What statement correctly identifies the purpose of a software patch? a. A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities. b. A software patch involves the process of reverting to a previous version of software after attempting to upgrade it. c. A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources. d. A software patch is a correction, improvement, or enhancement to software.

d) A software patch is a correction, improvement, or enhancement to software.


Related study sets

All 23 AP Environmental Chapters

View Set

L.A. 2-3: Selecting a Surgical Suffix

View Set

TISSUE INTEGRITY: Harding Chapter 24

View Set