Module 1 Practice Flashcards

1
Q

Which of the following is the name for all computers connected to a network that participate directly in network communication?

A

hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When data is encoded as pulses of light, which media is being used to transmit the data?

A

Fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which connection physically connects the end device to the network?

A

NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two devices are intermediary devices? (Choose two)

A
  • routers
  • switches
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which connections are specialized ports on a networking device that connect to individual networks?

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These illustrate devices, ports, and the addressing scheme of the network.

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of network topology lets you see the actual location of intermediary devices and cable installation?

A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

A

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?

A

Scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?

A

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

A

fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?

A

Video communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which feature describes using personal tools to access information and communicate across a business or campus network?

A

BYOD

9
Q

Which feature contains options such as Public, Private, Custom and Hybrid?

A

Cloud computing

9
Q

Which feature is being used when connecting a device to the network using an electrical outlet?

A

Powerline

10
Q

Which feature uses the same cellular technology as a smart phone?

A

Wireless broadband

11
Q

Which attack slows down or crashes equipment and programs?

A

Denial of Service (DoS)

12
Q

Which option creates a secure connection for remote workers?

A

Virtual Private Network (VPN)

13
Q

Which option blocks unauthorized access to your network?

A

Firewall

14
Q

Which option describes a network attack that occurs on the first day that a vulnerability becomes known?

A

Zero-day or Zero-hour

15
Q

How does BYOD change the way in which businesses implement networks?

A

BYOD provides flexibility in where and how users can access network resources.

16
Q

Which option describes malicious code running on user devices?

A

Virus, worm, or Trojan horse

17
Q

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

A

VPN

17
Q

What is the Internet?

A

It provides connections through interconnected global networks.

18
Q

What are two functions of end devices on a network? (Choose two.)

A

“-They originate the data that flows through the network.
-They are the interface between humans and the communication network.”

19
Q

In which scenario would the use of a WISP be recommended?

A

a farm in a rural area without wired broadband access

20
Q

What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?

A

scalability

21
Q

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

A

fault tolerance

22
Q

What are two characteristics of a scalable network? (Choose two.)

A

“-grows in size without impacting existing users
-suitable for modular devices that allow for expansion”

23
Q

Which device performs the function of determining the path that messages should take through internetworks?

A

a router

24
Q

Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)

A

“-cellular
-satellite”

24
Q

What type of network must a home user access in order to do online shopping?

A

the internet

24
Q

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

A

spyware

25
Q

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

A

extranet

26
Q

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

A

bring your own device

26
Q

What is an ISP?

A

It is an organization that enables individuals and businesses to connect to the Internet.