Exam Prep-Network+ Flashcards
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
a. HTTPS
b. TLS
c. HTTP
d. SSL
a. HTTPS
Which two encryption protocols might be used to provide secure transmissions for email services?
a. HTTP and HTTPS
b. SSL and TLS
c. FTP and SFTP
d. SSH and RDP
b. SSL and TLS
Which of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix
d. Ngnix
As you’re working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you’re having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
a. Identify the problem.
b. Test the theory to determine the cause.
c. Establish a plan of action to resolve the problem and identify potential effects.
d. Document findings, actions, outcomes, and lessons learned.
a. Identify the problem
In the event of a fire, the most appropriate failure policy is a _______ policy.
a. Power-off
b. Fail-close
c. Fail-open
d. Shutdown
c. Fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
a. Hub-and-spoke
b. Ring
c. Hybrid
d. Peer-to-peer
d. Peer-to-peer
In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?
a. Hybrid
b. Client-server
c. Hub-and-spoke
d. Peer-to-peer
b. Client-server
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
a. Client-server
b. Mesh
c. Hub-and-spoke
d. Star
d. Star
You need to access customer records in a database as you’re planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
a. FTP
b. SQL
c. SMTP
d. TLS
b. SQL
Which of the following is an application layer protocol?
a. IP
b. RDP
c. TCP
d. Apache
b. RDP
What is the name of the domain controller database that Windows Server 2019 uses to store data about user access and resources on the network?
Active Directory
What is the fundamental distinction between a layer 2 switch and a router?
A layer 2 switch belongs only to its local network, and a router belongs to two or more networks.
What is the fundamental distinction between a node and a host?
A host is an endpoint device that hosts or accesses a resource on the network, and a node is any computer or device that can be addressed on the network.
What is the fundamental distinction between a MAN and a WAN?
A WAN covers a large geographical area, and a MAN covers a smaller, more defined geographical area.
List two protocols that function at the transport layer of the OSI model. What type of address do these protocols add to their headers, and what element does that address identify?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
and the port addresses the receiving application
At the network layer, what type of address is used to identify the receiving host?
IP address
At the data link layer, which type of network address is used to identify the receiving node?
Physical address, MAC address, hardware address, or data link layer address
A computer is unable to access the network. When you check the LED lights near the computer’s network port, you discover the lights are not lit. Which layer of the OSI model are you using to troubleshoot this problem? At which two layers does the network adapter work?
Part 1: Physical Layer
Part 2: Data link layer and physical layer
A user complains that their computer cannot access email, although the computer can access websites. At which layer of the OSI model should you begin troubleshooting this problem and why?
Application layer—Email protocols such as SMTP, POP3, and IMAP4 all function at the application layer.
While troubleshooting a problem, you realize the problem is caused by a complex series of issues that will affect a large number of users even to test your theory as to the cause, and that process won’t even solve the problem. What should you do next in the troubleshooting process?
Escalate the problem
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
a. IDF
b. Work area
c. CEO’s office
d. EF
EF
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
a. Look at whether the device is located on the ISP’s side of the demarc.
b. Look at the manufacturer information on the device’s label.
c. Look at purchase records for the device to determine when it was acquired.
d. Look at what kinds of cables are connected to this device.
a. Look at whether the device is located on the ISP’s side of the demarc.
Which of the following devices are you likely to find in the MDF? Choose all that apply.
a. Routers
b. Switches
c. Network printer
d. KVM switch
a. Routers, b. Switches, and d. KVM switch
Which device converts signals from a campus’s analog phone equipment into IP data that can travel over
the Internet?
a. Legacy PBX
b. VoIP phone
c. Voice gateway
d. Dedicated telephone switch
c. Voice gateway