Network + Chapt 1 Quiz Flashcards

Intro to Networking

1
Q

What should you look for if you want to know if your Web browser session is secure?

a. IMAP4

b. HTTPS	
c. SMTP	
d. SHTTP
A

b. HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol does an email client use to send an email to the first server?

a. IMAP4

b. POP3	
c. FTP	
d. SMTP
A

d. SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol creates a secure channel between two computers and is a client–server command–line application?

a. SFTP

b. Telnet	
c. SSH	
d. RDP
A

c. SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for the use of the same network to deliver multiple types of communication services such as video, voice, and fax?

a. RDP services

b. Multicast	
c. Real–time	
d. Convergence
A

d. Convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is required by the client–server model?

a. Network operating system

b. Peer–to–peer	
c. Local account	
d. Physical topology
A

a. Network operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In which type of network does each computer control its own resources and communicate directly with other computers?

a. Client–server

b. Active Directory	
c. Peer–to–peer	
d. Domain
A

c. Peer–to–peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you want users to sign on to the network from any computer to get access to network resources controlled by Active Directory, what type of network do you need?

a. Global account

b. P2P network	
c. Windows domain	
d. Windows workgroup
A

c. Windows domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the NOS typically NOT responsible for?
a. Managing data and other resources
b. Controlling the files a user can open
c. Ensuring only authorized users have
network access
d. Controlling the speed of the CPU

A

d. Controlling the speed of the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is an advantage of client–server networks over peer–to–peer networks?

a. Permission to resources are distributed

b. They are less complex	
c. User accounts are assigned in one place	
d. They are less scalable
A

c. User accounts are assigned in one place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Five computers are connected to a switch in a star topology. What type of network is this?

a. LAN

b. SAN	
c. PAN	
d. MAN
A

a. LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With which topology are all the devices connected to a central switch?

a. Star

b. Ring	
c. Bus	
d. Mesh
A

a. Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which topology is most likely to use a token?

a. Star–bus

b. Ring	
c. Bus	
d. Hybrid
A

b. Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What device do you need if your network has multiple LANs that need to communicate with each other?

a. Hub

b. Switch	
c. Router	
d. NIC
A

c. Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of network is the smallest geographically?

a. MAN

b. PAN	
c. WAN	
d. LAN
A

b. PAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which OSI Model layer relies on routing protocols to find the best route for a packet?

a. Network

b. Transport	
c. Physical	
d. Data Link
A

a. Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which OSI Model layer sends bits over wired or wireless media?

a. Data Link

b. Application	
c. Physical	
d. Presentation
A

c. Physical

17
Q

On which layer of the OSI Model do you find both a connection–oriented and a connectionless protocol that is responsible for transporting data from one application to another?

a. Transport

b. Application	
c. Session	
d. Presentation
A

a. Transport

18
Q

Which of the following explains how to properly handle substances such as chemical solvents and how to dispose of them?

a. ESD

b. MSDS	
c. HVAC	
d. OSHA
A

b. MSDS

19
Q

Which step in the troubleshooting process should you take after you have established a theory of probable cause?
a. Test your theory to determine the cause
b. Verify functionality and implement preventive
measures
c. Establish a plan for resolving the problem
d. Implement the solution or escalate the problem

A

a. Test your theory to determine the cause

20
Q

While troubleshooting a problem, you believe the problem is with a router configuration but you don’t have security privileges to change the router configuration? What should you do?

a. Identify the problem

b. Test your theory	
c. Escalate the problem	
d. Implement preventive measures
A

c. Escalate the problem