Module 1 - Networking Today Flashcards

1
Q

Which of the following is the name for all computers connected to a network that participate directly in network communication?

  • servers
  • intermediary devices
  • hosts
  • media
A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When data is encoded as pulses of light, which media is being used to transmit the data?

  • wireless
  • Fiber-optic cable
  • copper cable
A

Fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which connections are specialized ports on a networking device that connect to individual networks?

  • Port
  • NIC
  • Interface
A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

  • Extranet
  • Intranet
  • LAN
  • WAN
A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two devices are intermediary devices? (Choose two)

  • hosts
  • routers
  • servers
  • switches
A
  • routers
  • switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?

  • Physical topology
  • Logical topology
A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which connection physically connects the end device to the network?

  • Port
  • NIC
  • Interface
A

NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

  • Physical topology
  • Logical topology
A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?

  • Extranet
  • Intranet
  • LAN
  • WAN
A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

  • Extranet
  • Intranet
  • LAN
  • WAN
A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

  • fault tolerance
  • Scalability
  • QoS
  • Security
A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

  • fault tolerance
  • Scalability
  • QoS
  • Security
A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

  • fault tolerance
  • Scalability
  • QoS
  • Security
A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

  • fault tolerance
  • Scalability
  • QoS
  • Security
A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

  • BYOD
  • Video communications
  • Cloud computing
A

Video communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which feature describes using personal tools to access information and communicate across a business or campus network?

  • BYOD
  • Video communications
  • Cloud computing
A

BYOD

11
Q

Which feature contains options such as Public, Private, Custom and Hybrid?

  • BYOD
  • Video communications
  • Cloud computing
A

Cloud computing

12
Q

Which feature is being used when connecting a device to the network using an electrical outlet?

  • Smart home technology
  • Powerline
  • Wireless broadband
A

Powerline

13
Q

Which feature uses the same cellular technology as a smart phone?

  • Smart home technology
  • Powerline
  • Wireless broadband
A

Wireless broadband

14
Q

Which attack slows down or crashes equipment and programs?

  • Firewall
  • Virus, worm, or Trojan horse
  • Zero-day or Zero-hour
  • Virtual Private Network (VPN)
  • Denial of Service (DoS)
A

Denial of Service (DoS)

15
Q

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

  • Firewall
  • Virus, worm, or Trojan horse
  • Zero-day or Zero-hour
  • Virtual Private Network (VPN)
  • Denial of Service (DoS)
A

Zero-day or Zero-hour

15
Q

Which option creates a secure connection for remote workers?

  • Firewall
  • Virus, worm, or Trojan horse
  • Zero-day or Zero-hour
  • Virtual Private Network (VPN)
  • Denial of Service (DoS)
A

Virtual Private Network (VPN)

15
Q

Which option blocks unauthorized access to your network?

  • Firewall
  • Virus, worm, or Trojan horse
  • Zero-day or Zero-hour
  • Virtual Private Network (VPN)
  • Denial of Service (DoS)
A

Firewall

15
Q

Which option describes malicious code running on user devices?

  • Firewall
  • Virus, worm, or Trojan horse
  • Zero-day or Zero-hour
  • Virtual Private Network (VPN)
  • Denial of Service (DoS)
A

Virus, worm, or Trojan horse

16
Q

How does BYOD change the way in which businesses implement networks?​

  • BYOD requires organizations to purchase laptops rather than desktops.
  • BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
  • BYOD devices are more expensive than devices that are purchased by an organization.
  • BYOD provides flexibility in where and how users can access network resources.
A

BYOD provides flexibility in where and how users can access network resources.

16
Q

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

  • ACL
  • IPS
  • VPN
  • BYOD
A

VPN

17
Q

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

  • reliability
  • scalability
  • quality of service
  • accessibility
A

scalability

17
Q

What are two functions of end devices on a network? (Choose two.)

  • They originate the data that flows through the network.
  • They direct data over alternate paths in the event of link failures.
  • They filter the flow of data to enhance security.
  • They are the interface between humans and the communication network.
  • They provide the channel over which the network message travels.
A
  • They are the interface between humans and the communication network.
  • They originate the data that flows through the network.
17
Q

In which scenario would the use of a WISP be recommended?

  • an Internet cafe in a city
  • a farm in a rural area without wired broadband access
  • any home with multiple wireless devices
  • an apartment in a building with cable access to the Internet
A

a farm in a rural area without wired broadband access

17
Q

What is the Internet?

  • It is a network based on Ethernet technology.
  • It provides network access for mobile devices.
  • It provides connections through interconnected global
    networks.
  • It is a private network for an organization with LAN and WAN connections.
A

It provides connections through interconnected global
networks.

17
Q

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

  • quality of service (QoS)
  • scalability
  • security
  • fault tolerance
  • integrity
A

fault tolerance

18
Q

What are two characteristics of a scalable network? (Choose two.)

  • easily overloaded with increased traffic
  • grows in size without impacting existing users
  • is not as reliable as a small network
  • suitable for modular devices that allow for expansion
  • offers limited number of applications
A
  • grows in size without impacting existing users
  • suitable for modular devices that allow for expansion
19
Q

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

  • DSL
  • cellular
  • satellite
  • dialup
  • dedicated leased line
A
  • cellular
  • satellite
20
Q

Which device performs the function of determining the path that messages should take through internetworks?

  • a router
  • a firewall
  • a web server
  • a DSL modem
A

a router

21
Q

What type of network must a home user access in order to do online shopping?

  • an intranet
  • the Internet
  • an extranet
  • a local area network
A

the Internet

22
Q

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

  • DoS attack
  • identity theft
  • spyware
  • zero-day attack
A

spyware

23
Q

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

  • Internet
  • intranet
  • extranet
  • extendednet
A
  • extranet
24
Q

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

  • cloud computing
  • online collaboration
  • bring your own device
  • video conferencing
A

bring your own device

25
Q

What is an ISP?

  • It is a standards body that develops cabling and wiring standards for networking.
  • It is a protocol that establishes how computers within a local network communicate.
  • It is an organization that enables individuals and businesses to connect to the Internet.
  • It is a networking device that combines the functionality of -several different networking devices in one.
A

It is an organization that enables individuals and businesses to connect to the Internet.