check-your-understanding / module quizzes Flashcards

1
Q

Which of the following is the name for all computers connected to a network that participate directly in network communication?

A

Hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When data is encoded as pulses of light, which media is being used to transmit the data?

A

Fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two devices are intermediary devices? (Choose two)

A

Routers, switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which connection physically connects the end device to the network?

A

NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which connections are specialized ports on a networking device that connect to individual networks?

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

A

logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

A

physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? (fault tolerance, scalability, QoS, security)

A

scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? (fault tolerance, scalability, QoS, security)

A

security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? (fault tolerance, scalability, QoS, security)

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? (fault tolerance, scalability, QoS, security)

A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

A

video communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which feature describes using personal tools to access information and communicate across a business or campus network?

A

BYOD
Bring Your Own Device

17
Q

Which feature contains options such as Public, Private, Custom and Hybrid?

A

cloud computing

18
Q

Which feature is being used when connecting a device to the network using an electrical outlet?

A

powerline

19
Q

Which feature uses the same cellular technology as a smartphone?

A

wireless broadband

20
Q

Which attack slows down or crashes equipment and programs?

A

Denial of Service (DoS)

21
Q

Which option creates a secure connection for remote workers?

A

Virtual Private Network (VPN)

22
Q

Which option blocks unauthorized access to your network?

A

Firewall

23
Q

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

A

Zero-day or Zero-hour

24
Q

Which option describes malicious code running on user devices?

A

Virus, worm, or Trojan horse

25
Q

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

A

spyware

26
Q

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

A

extranet

27
Q

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

A

BYOD

28
Q

What is an ISP?

A

It is an organization that enables individuals and businesses to connect to the Internet.

29
Q
A