Module 1 - Networking Today Flashcards

1
Q

Every computer on a network is called a _________?

a. Host or end device
b. Server
c. Client
d. User

A

a. Host or end device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of these servers are NOT computers that provide information to end devices

a. Email Servers
b. Web Servers
c. File Servers
d. Gaming Servers

A

d. Gaming Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Clients are computers that send requests to the servers to retrieve information, name two examples of this.

a. games from a gaming server
b. web page from a web server
c. streams from a streaming server
d. email from an email server

A

b. web page from a web server

d. email from an email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Select the correct description for a Email server.

a. Runs server software, clients use client software to access email.
b. Runs server software, clients use browser software to access web pages.
c. Stores corporate and user files, the client devices access these files
d. Runs server software, clients use streaming software to access media

A

a. Runs server software, clients use client software to access email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Select the correct description for a Web server.

a. Runs server software, clients use client software to access email.
b. Runs server software, clients use browser software to access web pages.
c. Stores corporate and user files, the client devices access these files
d. Runs server software, clients use streaming software to access media

A

b. Runs server software, clients use browser software to access web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Select the correct description for a File server.

a. Runs server software, clients use client software to access email.
b. Runs server software, clients use browser software to access web pages.
c. Stores corporate and user files, the client devices access these files
d. Runs server software, clients use streaming software to access media

A

c. Stores corporate and user files, the client devices access these files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for ___________?

a. Large Networks
b. Public Networks
c. Very small networks
d. Private networks

A

c. Very small networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these is NOT an advantage of peer to peer networks?

a. Easy to set up
b. Less complex
c. Lower cost
d. Centralised administration
e. Used for simple tasks (file transfer / printer share)

A

d. Centralised administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these is NOT a disadvantage of peer to peer networks?
a. No centralised administration
b. Very complex
c. Not as secure
d. Not scalable
e. Slower Performance

A

b. Very complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An _________ is where a message originates from or where it is received.

a. End device
b. Client
c. Server
d. Start-up device

A

a. End device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An ____________ interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.

a. Internetwork
b. Intermediary device
c. End device
d. Start-up device

A

b. Intermediary device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of these is NOT an example of the role of an intermediary device?

a. Regenerate and retransmit data signals.
b. Maintain information about what pathways exist in the network.
c. Originates data to flow through a network.
d. Notify other devices of errors and communication failures.

A

c. Originates data to flow through a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Communication across a network is carried through a medium which allows a message to travel from source to destination. Which one of these media types is NOT a standard use medium for a network?

a. Metal wires within cables (uses electrical impulses)
b. Glass of plastic fibres within cables - fibre optic cable (uses pulses of light)
c. Wireless transmission (uses modulation of specific frequencies of electromagnetic waves)
d. Power cables (uses current to carry electrical impulses)

A

d. Power cables (uses current to carry electrical impulses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network diagrams, often called _________ diagrams, use symbols to represent devices within the network.

a. Topology
b. Telemetry
c. Topography
d. Telnet

A

a. Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Select the two most common types of networks?

a. VLAN
b. WLAN
c. WAN
d. LAN

A

c. WAN
d. LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these factors does NOT affect network infrastructure?

a. Size of the area covered
b. Number of users connected
c. Number and types of services available
d. Area of responsibility
e. Number of active users

A

e. Number of active users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A LAN is a network infrastructure that spans a _____ geographical area.

a. Small
b. Wide
c. Medium
d. Tiny

A

a. Small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A WAN is a network infrastructure that spans a _____ geographical area.

a. Small
b. Wide
c. Medium
d. Tiny

A

b. Wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the correct description of an Intranet?

a. A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
b. provide secure access to networks for individuals who work for a different organization that need access to their data on their network.
c. A public collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
d. provide unsecure access to networks for individuals who work for a different organization that need access to their data on their network.

A

a. A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the correct description of an extranet?

a. A private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
b. provide secure access to networks for individuals who work for a different organization that need access to their data on their network.
c. A public collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization.
d. provide unsecure access to networks for individuals who work for a different organization that need access to their data on their network.

A

b. provide secure access to networks for individuals who work for a different organization that need access to their data on their network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Popular internet services for home users and small offices include:

a. Business DSL, leased lines, and Metro Ethernet.
b. Business DSL, leased lines, wireless WANs, and mobile services.
c. Metro Ethernet, Broadband cable, broadband digital subscriber line (DSL).
d. Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

A

d. Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

22
Q

Popular internet services for Business-class interconnections include:

a. Business DSL, leased lines, and Metro Ethernet.
b. Business DSL, leased lines, wireless WANs, and mobile services.
c. Metro Ethernet, Broadband cable, broadband digital subscriber line (DSL).
d. Broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services.

A

a. Business DSL, leased lines, and Metro Ethernet.

23
Q

Identify the correct description for a cable connection.

a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. High bandwidth, always on, internet offered by cable television service providers
d. High bandwidth, always on, internet connection that runs over a telephone line

A

c. High bandwidth, always on, internet offered by cable television service providers

24
Q

Identify the correct description for a DSL connection.

a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. High bandwidth, always on, internet offered by cable television service providers
d. High bandwidth, always on, internet connection that runs over a telephone line

A

d. High bandwidth, always on, internet connection that runs over a telephone line

24
Q

Identify the correct description for a Cellular connection.

a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. Uses a cell phone network to connect to the internet
d. High bandwidth, always on, internet connection that runs over a telephone line

A

c. Uses a cell phone network to connect to the internet

25
Q

Identify the correct description for a Satellite connection.

a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. Uses a cell phone network to connect to the internet
d. High bandwidth, always on, internet connection that runs over a telephone line

A

a. Major benefit to rural areas without internet service providers.

26
Q

Identify the correct description for a Dial-up telephone connection.

a. Major benefit to rural areas without internet service providers.
b. An inexpensive, low bandwidth option using a modem.
c. Uses a cell phone network to connect to the internet
d. High bandwidth, always on, internet connection that runs over a telephone line

A

b. An inexpensive, low bandwidth option using a modem.

27
Q

Identify the correct description for a Dedicated Leased Line Business connection.

a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)

A

b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking

28
Q

Identify the correct description for a Ethernet WAN Business connection.

a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)

A

c. This extends LAN access technology into the WAN

29
Q

Identify the correct description for a Ethernet WAN Business connection.

a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)

A

c. This extends LAN access technology into the WAN

30
Q

Identify the correct description for a DSL Business connection.

a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)

A

d. Available in various formats including symmetric digital subscriber lines (SDSL)

31
Q

Identify the correct description for a Satellite Business connection.

a. This can provide a connection when a wired solution is not available.
b. These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking
c. This extends LAN access technology into the WAN
d. Available in various formats including symmetric digital subscriber lines (SDSL)

A

a. This can provide a connection when a wired solution is not available.

32
Q

Converged data networks carry multiple services on one link including:

a. Data, Voice, Streaming
b. Packets, Voice, Video
c. Data, Voice, Video
d. Data, Sound, Video

A

c. Data, Voice, Video

33
Q

There are four basic characteristics that the underlying architectures need to address to meet user expectations:

a. Fault Tolerance, Secure systems, Quality of Service (QoS), Scalability
b. Failure Tolerance, Security, Quality of Service (QoS), Scalability
c. Fault Tolerance, Security, Quality of Service (QoS), Scalability
d. Fault Tolerance, Security, Quality of Service (QoS), Scalable software

A

c. Fault Tolerance, Security, Quality of Service (QoS), Scalability

34
Q

A fault tolerant network limits the impact of a failure by limiting the number of ___________. Multiple paths are required for fault tolerance.

a. Affected networks
b. Affected devices
c. Impacted switches
d. Affected routers

A

b. Affected devices

35
Q

A scalable network can expand quickly and easily to support new users and applications without impacting the performance of services to _____________.

a. Dedicated users
b. User IPs
c. User PCs
d. Existing users

A

d. Existing users

36
Q

______________ is the primary mechanism used to ensure reliable delivery of content for all users.

a. Quality of Service (QoS)
b. Scalability
c. Network security
d. Fault tolerance

A

a. Quality of Service (QoS)

37
Q

There are two main types of network security that must be addressed:

a. Network infrastructure security, Physical Security
b. Network Transmission security, Information Security
c. Network infrastructure security, Information Security
d. Physical infrastructure security, Telecoms Security

A

c. Network infrastructure security, Information Security

38
Q

What are the Three goals of network security:

a. Confidentiality, Scalability, availability
b. Confidentiality, Integrity, availability
c. Confidentiality, Integrity, Tolerance
d. Confidentiality, Quality of Service, availability

A

b. Confidentiality, Integrity, availability

39
Q

________ allows users to use their own devices giving them more opportunities and greater flexibility.

a. Bring Your Own Laptop (BYOL)
b. Bring Your Own Smartphone (BYOS)
c. Bring Your Own Iphone (BYOI)
d. Bring Your Own Device (BYOD)

A

d. Bring Your Own Device (BYOD)

40
Q

_____________ allows us to store personal files or backup our data on servers over the internet.

a. Cloud computing
b. VLAN computing
c. Virtual computing
d. LAN computing

A

a. Cloud computing

41
Q

There are four types of clouds:

a. Domain, Private, Hybrid, Custom
b. Public, Private, Hybrid, Custom
c. Public, Secret, Hybrid, Custom
d. Public, Private, Hybrid, Multi

A

b. Public, Private, Hybrid, Custom

42
Q

Which cloud is available to the general public through a pay-per-use model or for free.

a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud

A

c. Public Cloud

43
Q

Which cloud is intended for a specific organization or entity such as the government.

a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud

A

d. Private Cloud

44
Q

Which cloud is made up of two or more Cloud types – for example, part custom and part public.
Each part remains a distinctive object but both are connected using the same architecture.

a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud

A

a. Hybrid Cloud

45
Q

Which cloud is built to meet the needs of a specific industry, such as healthcare or media.
Can be private or public.

a. Hybrid Cloud
b. Custom Cloud
c. Public Cloud
d. Private Cloud

A

b. Custom Cloud

46
Q

_______________ can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option.

a. Powerline networking
b. Ethernet networking
c. Power over ethernet
d. LAN networking

A

a. Powerline networking

47
Q

In addition to DSL and cable, ___________ is another option used to connect homes and small businesses to the internet.

a. Wireless (WISP)
b. Cellular
c. Satellite
d. Dial up

A

a. Wireless (Wireless Internet Service Provider)

48
Q

Which of these is NOT a type of EXTERNAL security threat?

a. Viruses, worms, and Trojan horses
b. Spyware and adware
c. Zero-day attacks
d. Threat Actor attacks
e. Denial of service attacks
f. Data interception and theft
g .Identity theft
h. malicious employees

A

h. malicious employees

49
Q

Which of these is NOT a type of INTERNAL security threat?

a. identity theft
b. lost or stolen devices
c. accidental misuse by employees
d. malicious employees

A

a. identity theft

50
Q

Which network security components should be used within the home or small office network?

a. Dedicated firewall system
b. Antivirus/Antispyware, Firewall
c. Access control lists (ACL)
d. Virtual Private Networks (VPN)

A

b. Antivirus/Antispyware, Firewall

51
Q

Which of these network security components are not typically used within larger networks?

a. Dedicated firewall system
b. Standard Firewall
c. Access control lists (ACL)
d. Virtual Private Networks (VPN)
e. Intrusion prevention systems (IPS)

A

b. Standard Firewall