Week 1: Module 1 Quiz

Ace your homework & exams now with Quizwiz!

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

At the data link layer, which type of address is used to identify the receiving node?

MAC address

Which of the following is an application layer protocol?

RDP

At which two layers does the network adapter work?

Physical and Data Link

Which is not true of MANs

A MAN is generally larger than a WAN but smaller than a LAN.

Which of these protocols could not be used to access a server in a nearby building?

TLS

Which of the following is not true of a WAN?

A WAN uses the same transmission media as do LANs

Which is true about a network host?

A host is an endpoint device that hosts or accesses a resource on the network

What is the fundamental distinction between a layer 2 switch and a router?

A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.

Which is true about a network node?

A node is any computer or device that can be addressed on the network.

What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?

Active Directory

Which OSI layer adds both a header and a trailer?

Data link layer

In the event of a fire, the most appropriate failure policy is a ___ policy.

Fail-open

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem.

Which of the following applications could be used to run a website from a server?

Ngnix

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-peer

A computer is unable to access the network. When you check the LED lights near the computer's network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem?

Physical

What type of address do the Transport Layer Protocols add to their headers?

Port addresses

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

Which networking device is best for connecting your network printer to three computers?

Switch

List two protocols that function at the transport layer of the OSI model.

TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

Client-server

At the network layer, what type of address is used to identify the receiving host?

IP address

Which two encryption protocols might be used to provide secure transmissions for email services?

SSL and TLS


Related study sets

biology 2.2: Βιογεωχημικοί κύκλοι

View Set

Examples of assets and liabilities

View Set

History of Popular Music in Britain and North America

View Set

Ch. 8 - Organizations and Organizational Change

View Set

Unit 5 (Ch. 9: Alt and Underground Hip Hop)

View Set

MUNI - Fyzika - Termodynamika, fázové změny, povrchové napětí

View Set

Energy Organelles and Cytoskeleton

View Set

Ch 10 SB Pure Competition in the Short Run

View Set