Module 1 - Networking Today Flashcards
Every computer on a network is called a _________?
a. Host or end device
b. Server
c. Client
d. User
a. Host or end device
Which of these servers are NOT computers that provide information to end devices
a. Email Servers
b. Web Servers
c. File Servers
d. Gaming Servers
d. Gaming Servers
Clients are computers that send requests to the servers to retrieve information, name two examples of this.
a. games from a gaming server
b. web page from a web server
c. streams from a streaming server
d. email from an email server
b. web page from a web server
d. email from an email server
Select the correct description for a Email server.
a. Runs server software, clients use client software to access email.
b. Runs server software, clients use browser software to access web pages.
c. Stores corporate and user files, the client devices access these files
d. Runs server software, clients use streaming software to access media
a. Runs server software, clients use client software to access email.
Select the correct description for a Web server.
a. Runs server software, clients use client software to access email.
b. Runs server software, clients use browser software to access web pages.
c. Stores corporate and user files, the client devices access these files
d. Runs server software, clients use streaming software to access media
b. Runs server software, clients use browser software to access web pages.
Select the correct description for a File server.
a. Runs server software, clients use client software to access email.
b. Runs server software, clients use browser software to access web pages.
c. Stores corporate and user files, the client devices access these files
d. Runs server software, clients use streaming software to access media
c. Stores corporate and user files, the client devices access these files
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for ___________?
a. Large Networks
b. Public Networks
c. Very small networks
d. Private networks
c. Very small networks
Which of these is NOT an advantage of peer to peer networks?
a. Easy to set up
b. Less complex
c. Lower cost
d. Centralised administration
e. Used for simple tasks (file transfer / printer share)
d. Centralised administration
Which of these is NOT a disadvantage of peer to peer networks?
a. No centralised administration
b. Very complex
c. Not as secure
d. Not scalable
e. Slower Performance
b. Very complex
An _________ is where a message originates from or where it is received.
a. End device
b. Client
c. Server
d. Start-up device
a. End device
An ____________ interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.
a. Internetwork
b. Intermediary device
c. End device
d. Start-up device
b. Intermediary device
Which of these is NOT an example of the role of an intermediary device?
a. Regenerate and retransmit data signals.
b. Maintain information about what pathways exist in the network.
c. Originates data to flow through a network.
d. Notify other devices of errors and communication failures.
c. Originates data to flow through a network.
Communication across a network is carried through a medium which allows a message to travel from source to destination. Which one of these media types is NOT a standard use medium for a network?
a. Metal wires within cables (uses electrical impulses)
b. Glass of plastic fibres within cables - fibre optic cable (uses pulses of light)
c. Wireless transmission (uses modulation of specific frequencies of electromagnetic waves)
d. Power cables (uses current to carry electrical impulses)
d. Power cables (uses current to carry electrical impulses)
Network diagrams, often called _________ diagrams, use symbols to represent devices within the network.
a. Topology
b. Telemetry
c. Topography
d. Telnet
a. Topology
Select the two most common types of networks?
a. VLAN
b. WLAN
c. WAN
d. LAN
c. WAN
d. LAN
Which of these factors does NOT affect network infrastructure?
a. Size of the area covered
b. Number of users connected
c. Number and types of services available
d. Area of responsibility
e. Number of active users
e. Number of active users
A LAN is a network infrastructure that spans a _____ geographical area.
a. Small
b. Wide
c. Medium
d. Tiny
a. Small
A WAN is a network infrastructure that spans a _____ geographical area.
a. Small
b. Wide
c. Medium
d. Tiny
b. Wide
What is the correct description of an Intranet?
a. A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
b. provide secure access to networks for individuals who work for a different organization that need access to their data on their network.
c. A public collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
d. provide unsecure access to networks for individuals who work for a different organization that need access to their data on their network.
a. A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
What is the correct description of an extranet?
a. A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
b. provide secure access to networks for individuals who work for a different organization that need access to their data on their network.
c. A public collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
d. provide unsecure access to networks for individuals who work for a different organization that need access to their data on their network.
b. provide secure access to networks for individuals who work for a different organization that need access to their data on their network.
Popular internet services for home users and small offices include:
a. Business DSL, leased lines, and Metro Ethernet.
b. Business DSL, leased lines, wireless WANs, and mobile services.
c. Metro Ethernet, Broadband cable, broadband digital subscriber line (DSL).
d. Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.
d. Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.
Popular internet services for Business-class interconnections include:
a. Business DSL, leased lines, and Metro Ethernet.
b. Business DSL, leased lines, wireless WANs, and mobile services.
c. Metro Ethernet, Broadband cable, broadband digital subscriber line (DSL).
d. Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.
a. Business DSL, leased lines, and Metro Ethernet.
Identify the correct description for a cable connection.
a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. High bandwidth, always on, internet offered by cable television service providers
d. High bandwidth, always on, internet connection that runs over a telephone line
c. High bandwidth, always on, internet offered by cable television service providers
Identify the correct description for a DSL connection.
a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. High bandwidth, always on, internet offered by cable television service providers
d. High bandwidth, always on, internet connection that runs over a telephone line
d. High bandwidth, always on, internet connection that runs over a telephone line
Identify the correct description for a Cellular connection.
a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. Uses a cell phone network to connect to the internet
d. High bandwidth, always on, internet connection that runs over a telephone line
c. Uses a cell phone network to connect to the internet
Identify the correct description for a Satellite connection.
a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. Uses a cell phone network to connect to the internet
d. High bandwidth, always on, internet connection that runs over a telephone line
a. Major benefit to rural areas without internet service providers.
Identify the correct description for a Dial-up telephone connection.
a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. Uses a cell phone network to connect to the internet
d. High bandwidth, always on, internet connection that runs over a telephone line
b. An inexpensive, low bandwidth option using a modem.
Identify the correct description for a Dedicated Leased Line Business connection.
a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
Identify the correct description for a Ethernet WAN Business connection.
a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)
c. This extends LAN access technology into the WAN
Identify the correct description for a Ethernet WAN Business connection.
a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)
c. This extends LAN access technology into the WAN
Identify the correct description for a DSL Business connection.
a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)
d. Available in various formats including symmetric digital subscriber lines (SDSL)
Identify the correct description for a Satellite Business connection.
a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)
a. This can provide a connection when a wired solution is not available.
Converged data networks carry multiple services on one link including:
a. Data, Voice, Streaming
b. Packets, Voice, Video
c. Data, Voice, Video
d. Data, Sound, Video
c. Data, Voice, Video
There are four basic characteristics that the underlying architectures need to address to meet user expectations:
a. Fault Tolerance, Secure systems, Quality of Service (QoS), Scalability
b. Failure Tolerance, Security, Quality of Service (QoS), Scalability
c. Fault Tolerance, Security, Quality of Service (QoS), Scalability
d. Fault Tolerance, Security, Quality of Service (QoS), Scalable software
c. Fault Tolerance, Security, Quality of Service (QoS), Scalability
A fault tolerant network limits the impact of a failure by limiting the number of ___________. Multiple paths are required for fault tolerance.
a. Affected networks
b. Affected devices
c. Impacted switches
d. Affected routers
b. Affected devices
A scalable network can expand quickly and easily to support new users and applications without impacting the performance of services to _____________.
a. Dedicated users
b. User IPs
c. User PCs
d. Existing users
d. Existing users
______________ is the primary mechanism used to ensure reliable delivery of content for all users.
a. Quality of Service (QoS)
b. Scalability
c. Network security
d. Fault tolerance
a. Quality of Service (QoS)
There are two main types of network security that must be addressed:
a. Network infrastructure security, Physical Security
b. Network Transmission security, Information Security
c. Network infrastructure security, Information Security
d. Physical infrastructure security, Telecoms Security
c. Network infrastructure security, Information Security
What are the Three goals of network security:
a. Confidentiality, Scalability, availability
b. Confidentiality, Integrity, availability
c. Confidentiality, Integrity, Tolerance
d. Confidentiality, Quality of Service, availability
b. Confidentiality, Integrity, availability
________ allows users to use their own devices giving them more opportunities and greater flexibility.
a. Bring Your Own Laptop (BYOL)
b. Bring Your Own Smartphone (BYOS)
c. Bring Your Own Iphone (BYOI)
d. Bring Your Own Device (BYOD)
d. Bring Your Own Device (BYOD)
_____________ allows us to store personal files or backup our data on servers over the internet.
a. Cloud computing
b. VLAN computing
c. Virtual computing
d. LAN computing
a. Cloud computing
There are four types of clouds:
a. Domain, Private, Hybrid, Custom
b. Public, Private, Hybrid, Custom
c. Public, Secret, Hybrid, Custom
d. Public, Private, Hybrid, Multi
b. Public, Private, Hybrid, Custom
Which cloud is available to the general public through a pay-per-use model or for free.
a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud
c. Public Cloud
Which cloud is intended for a specific organization or entity such as the government.
a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud
d. Private Cloud
Which cloud is made up of two or more Cloud types – for example, part custom and part public.
Each part remains a distinctive object but both are connected using the same architecture.
a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud
a. Hybrid Cloud
Which cloud is built to meet the needs of a specific industry, such as healthcare or media.
Can be private or public.
a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud
b. Custom Cloud
_______________ can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.
a. Powerline networking
b. Ethernet networking
c. Power over ethernet
d. LAN networking
a. Powerline networking
In addition to DSL and cable, ___________ is another option used to connect homes and small businesses to the internet.
a. Wireless (WISP)
b. Cellular
c. Satellite
d. Dial up
a. Wireless (Wireless Internet Service Provider)
Which of these is NOT a type of EXTERNAL security threat?
a. Viruses, worms, and Trojan horses
b. Spyware and adware
c. Zero-day attacks
d. Threat Actor attacks
e. Denial of service attacks
f. Data interception and theft
g .Identity theft
h. malicious employees
h. malicious employees
Which of these is NOT a type of INTERNAL security threat?
a. identity theft
b. lost or stolen devices
c. accidental misuse by employees
d. malicious employees
a. identity theft
Which network security components should be used within the home or small office network?
a. Dedicated firewall system
b. Antivirus/Antispyware, Firewall
c. Access control lists (ACL)
d. Virtual Private Networks (VPN)
b. Antivirus/Antispyware, Firewall
Which of these network security components are not typically used within larger networks?
a. Dedicated firewall system
b. Standard Firewall
c. Access control lists (ACL)
d. Virtual Private Networks (VPN)
e. Intrusion prevention systems (IPS)
b. Standard Firewall