NTA Lesson 1 Quiz

Ace your homework & exams now with Quizwiz!

d

A computing paradigm in which users are able to access software and services over the Internet instead of installing the software on their desktop PCs or mobile devices is known as: a. presencing. b. the Open Systems Interconnection (OSI) reference model. c. unified communications (UC). d. cloud computing.

c

A network can be defined as: a. established rules that enable data to flow from one network interface card (NIC) to another. b. a layered architecture model of communication developed by the International Organization for Standardization (ISO). c. two or more connected computers that share data by way of a transport medium. d. a circuit board within a computer's central processing unit.

b

A network topology that uses multiple paths to connect devices so that redundancies exist is called a: a. hybrid topology. b. mesh topology. c. bus topology. d. star topology.

c

A server is also known as: a. the client. b. the front end. c. the back end. d. the terminal.

c

All e-mail protocols are based on which of the following? a. IP b. SMTP c. TCP d. UDP

c

All networks consist of what three basic elements? a. Print servers, file servers and media servers b. Peer-to-peer, server-based and enterprise nodes c. Protocols, transmission media and network services d. Protocols, transmission media and network operating systems

a

BitTorrent is a peer-to-peer (P2P) protocol that you can use to: a. download large files quickly. b. provide applications and services over the Internet to individual or enterprise subscribers. c. manage network resources. d. connect nodes, such as PCs, laptops and tablets, to networks.

d

In a common three-tier computing model: a. database server contains the business logic, a Web server is responsible for presentation, and a Web browser contains the data. b. a Web browser contains the business logic, a Web server is responsible for presentation, and a database server contains the data. c. a database server contains the business logic, a Web browser is responsible for presentation, and a Web server contains the data. d. a Web server contains the business logic, a Web browser is responsible for presentation, and a database server contains the data.

d

Internet Protocol (IP) is found at which layer of the OSI/RM? a. The physical layer b. The data link layer c. The transport layer d. The network layer

b

Most protocols map to which layers of the OSI/RM? a. The data link and physical layers b. The application, transport and network layers c. The application, presentation and session layers d. The transport, network and data link layers

d

Networks were originally operated on a centralized model that used central servers called: a. "dumb" terminals. b. remote terminals. c. clients. d. mainframes.

d

The ability for a device to automatically track and report the user's location and availability is known as: a. unified communications (UC). b. convergence. c. communication latency. d. presencing.

a

The ability of one computer system to communicate with another is known as: a. interoperability. b. mesh topology. c. server-based networking. d. authentication.

a

The coding (usually in SQL) necessary to create relationships in the data stored in a database is known as: a. business logic. b. presencing. c. bottlenecking. d. three-tier computing.

d

The term back end refers to: a. a client that acts as an interface to a collection of servers. b. a diskless station that can only request information. c. an individual computer connected to a network. d. a series of systems that fulfill requests made by a client.

d

What are the two basic types of networks? a. Peer-to-peer and Microsoft peer-to-peer b. P2P and Microsoft peer-to-peer c. Peer-to-peer and P2P d. Peer-to-peer and server-based

a

What is a Network Operations Center (NOC)? a. A specific location from which a network is managed, monitored and maintained b. A group of computers connected within a confined geographic area c. A company that provides applications and services over the Internet to subscribers d. An operating system that manages network resources

b

What is a client? a. A series of systems that fulfill requests b. A system or application that requests a service from another computer c. A central computer connected to a remote terminal d. A computer in a network that manages the network resources

c

What is a local area network (LAN)? a. A junction between one high-speed backbone and another b. A group of computers connected over an expansive geographic area c. A group of computers connected within a confined geographic area d. A layered network architecture model of communication that allows systems from various vendors to communicate with one another

a

What is a wide area network (WAN)? a. A group of computers connected over an expansive geographic area so their users can share files and services b. A networking device that routes packets between networks based on network-layer addresses c. A networking device that connects either individual systems or multiple networks d. A group of computers connected within a confined geographic area so their users can share files and services

b

What is an Internet Exchange Point (IXP)? a. The physical hardware that allows computers to form and participate on a network b. A junction between one high-speed backbone and another c. A device used to route packets between networks based on network-layer addresses d. A device used to connect either individual systems or multiple networks

c

What is another name for the original data in a packet? a. Trailer b. Header c. Payload d. Datagram

d

What is data encapsulation? a. The process of enabling a computer to connect to a network b. The process of managing the resources on a network c. The process of distributing large amounts of data via a P2P protocol d. The process of passing information through the layers of the OSI/RM

c

What is required for systems developed by various vendors to communicate with one another? a. A Network Operations Center (NOC) b. A network operating system (NOS) c. Network protocols d. Graphical user interfaces (GUIs)

d

What is the function of Internet Control Message Protocol (ICMP)? a. It is often used to transfer relatively small amounts of information. b. It fragments and reassembles messages. c. It ensures reliable communication and uses ports to deliver packets. d. It is used for troubleshooting connectivity between systems.

d

What is the function of the presentation layer of the OSI/RM? a. It is the interface to the user in a networking environment. b. It describes how protocols build up and tear down connections. c. It is responsible for the logical addressing of packets. d. It provides useful transformations on data to support a standardized application interface.

b

What is the term for a client that acts as an interface to a collection of servers? a. Terminal b. Front end c. Back end d. Mainframe

b

What is the term for a command-based interface that allows a user to issue commands? a. x.org b. Shell c. Kernel d. Server

a

What is the term for a set of technologies that enable voice to be converted into text and vice versa? a. Unified communications (UC) b. Open Systems Interconnection (OSI) reference model c. Cloud computing d. Presencing

a

What is the term for an organization that maintains a gateway to the Internet and rents access to customers? a. Internet Service Provider (ISP) b. Internet Protocol (IP) telephony c. Voice over Internet Protocol (VoIP) d. Public switched telephone network (PSTN)

c

What is the term for network protocols that rely on a "best-effort" technology that sends the information, hoping that it will reach the other system? a. Connection-oriented b. Stateful c. Stateless d. Session-oriented

b

What is the term for the mathematical calculation that allows the receiving computer to verify whether a packet is valid? a. Packetization b. Cyclical redundancy check c. Encapsulation d. Hadoop

a

What is typically needed to exchange data over the public telephone network using a dial-up connection? a. A modem b. A circuit-switched connection c. An analog signal d. A digital signal

d

What should you use to connect two networks to form a wide area network (WAN)? a. The PSTN b. A router or an Internet Exchange Point (IXP) c. A switch or an Internet Exchange Point (IXP) d. A router or a switch

d

Whenever you use a protocol such as TCP/IP, you must: a. add a driver and incorporate it into the kernel. b. reconfigure the operating system's kernel. c. ensure that it is not bound to the NIC. d. attach, or bind, it to your NIC.

c

Which layer of the OSI/RM is responsible for describing how protocols build up and tear down connections? a. Application b. Data link c. Session d. Network

c

Which layer of the OSI/RM is the interface to the user in a networking environment? a. Presentation b. Network c. Application d. Session

a

Which layer of the OSI/RM organizes data into packets? a. Network b. Transport c. Session d. Data link

b

Which layer of the OSI/RM provides reliable data transfer across the transmission medium? a. Presentation b. Data link c. Network d. Transport

b

Which of the following allows users to share files and services, and is commonly used for intraoffice communication? a. Wide area network (WAN) b. Local area network (LAN) c. Open Systems Interconnection (OSI) reference model d. Internet Exchange Point (IXP)

d

Which of the following describes a network operating system (NOS)? a. It is a specific location from which a network is managed, monitored and maintained. b. It describes a network's physical layout. c. It establishes the rules that enable data to flow from one network interface card (NIC) to another. d. It manages resources on a network and offers services to one or more clients.

a

Which of the following describes a server-based network? a. A configuration of nodes, some of which are dedicated to providing resources to other hosts on the network b. A peer-to-peer file sharing protocol used for distributing large amounts of data c. Workstations that use add-on software to participate in large, decentralized networks that are usually located on the Internet d. Groups of clients that communicate with one another to create a network that has no single central database

a

Which of the following describes a server-based network? a. A configuration of nodes, some of which are dedicated to providing resources to other hosts on the network b. Groups of clients that communicate with one another to create a network that has no single central database c. Workstations that use add-on software to participate in large, decentralized networks that are usually located on the Internet d. A peer-to-peer file sharing protocol used for distributing large amounts of data

b

Which of the following describes a star topology network? a. Network nodes are connected by a cable without having a central connection point. b. Network nodes are connected through a central device. c. Network devices are connected using multiple paths so that redundancies exist. d. All nodes connect to the same cable.

a

Which of the following describes the physical layer of the OSI/RM? a. It is associated with the transmission of unstructured bit streams over media. b. It provides reliable, transparent transport between end points. c. It defines how data is formatted for transmission and how access to the network is controlled. d. It organizes data into packets and provides reliable addressing services among hosts and networks.

d

Which of the following is a function of the transport layer of the OSI/RM? a. Formatting data for transmission b. Addressing services among hosts and networks c. Organizing data into packets d. End-to-end error recovery and flow control

b

Which of the following is required to create a network? a. Combining two non-routable protocols b. Installing a NIC c. Combining routable and non-routable protocols d. Combining two routable protocols

c

Which of the following is true about Structured Query Language (SQL)? a. It involves information storage across several computers while allowing searches to occur as if the information were stored centrally. b. It allows heterogeneous systems to work together more efficiently. c. It allows users to phrase queries on the front end that can be understood by the back end. d. It reduces network slowdown by dividing processing tasks between the client and the server.

a

Which of the following is true about packets? a. When a sending host creates a packet, the process begins with Layer 7 of the OSI/RM and continues through Layer 1. b. When a sending host creates a packet, the process begins with Layer 1 of the OSI/RM and continues through Layer 7. c. When a receiving host processes a packet, it removes each header, beginning with Layer 7 of the OSI/RM and ending with Layer 1. d. When a receiving host processes a packet, it adds each header, beginning with Layer 1 of the OSI/RM and ending with Layer 7.

a

Which of the following protocols are found at the transport layer of the OSI/RM? a. Transmission Control Protocol (TCP) b. Token Ring c. Ethernet d. Internet Protocol (IP)

c

Which of the following uses predefined, or static, routes that cannot be changed? a. Tunneling b. Routable protocols c. Non-routable protocols d. Encapsulation

b

Which operating system do the majority of Web, e-mail, FTP and database servers run? a. Windows Server b. UNIX c. Apple OS X d. DOS

a

Which packet element contains the OSI/RM layer information? a. The header b. The trailer c. The frame d. The data

d

Which packet element often contains techniques ensuring that errors do not occur during transmission? a. The data b. The frame c. The header d. The trailer

d

Which protocol does the Windows Server family use as the default network protocol? a. ICMP b. IPX/SPX c. UDP d. TCP/IP

a

Which protocol is connectionless and is often used to transfer relatively small amounts of information? a. UDP b. TCP/IP c. IP d. TCP

d

Which statement accurately describes Internet Protocol (IP)? a. It is often used to transfer relatively small amounts of information. b. It ensures reliable communication and uses ports to deliver packets. c. It fragments and reassembles messages. d. It is responsible for providing addresses of each computer.

c

Which statement accurately describes session-oriented protocols? a. They are also known as connectionless protocols. b. They are also known as stateless protocols. c. They require that a host establish a connection before they transfer information. d. They rely on a "best-effort" technology that sends the information.

c

Which statement best describes the functionality of a Voice over IP (VoIP) network? a. Voice calls are sent over dedicated circuits that use TCP/IP. b. Voice calls are sent over a standard public service telephone network. c. Voice calls are sent over a packet-switched network that uses TCP/IP. d. Voice calls are sent for free over any network.

c

Which statement is true about TCP/IP? a. The Internet fully supports TCP/IP version 6 and has deprecated TCP/IP version 4. b. The TCP/IP suite includes only Transmission Control Protocol and Internet Protocol. c. TCP/IP is the Internet's official protocol. d. TCP/IP is recommended but not required for Internet access.

d

Your company collects massive amounts of data in an unstructured format that is too difficult to store using traditional relational databases. Which of the following would be the most appropriate solution for storing, processing and analyzing this data? a. Internet Service Provider (ISP) b. Cloud service provider c. Structured Query Language (SQL) d. Hadoop


Related study sets

Psychology 101 Lena Ericksen Ch. 1

View Set

ANIMAL BEHAVIOR AND INTERDEPENDENCIES

View Set