Network + Chapt 1 Quiz Flashcards
Intro to Networking
What should you look for if you want to know if your Web browser session is secure?
a. IMAP4
b. HTTPS c. SMTP d. SHTTP
b. HTTPS
What protocol does an email client use to send an email to the first server?
a. IMAP4
b. POP3 c. FTP d. SMTP
d. SMTP
Which protocol creates a secure channel between two computers and is a client–server command–line application?
a. SFTP
b. Telnet c. SSH d. RDP
c. SSH
What is the term for the use of the same network to deliver multiple types of communication services such as video, voice, and fax?
a. RDP services
b. Multicast c. Real–time d. Convergence
d. Convergence
Which of the following is required by the client–server model?
a. Network operating system
b. Peer–to–peer c. Local account d. Physical topology
a. Network operating system
In which type of network does each computer control its own resources and communicate directly with other computers?
a. Client–server
b. Active Directory c. Peer–to–peer d. Domain
c. Peer–to–peer
If you want users to sign on to the network from any computer to get access to network resources controlled by Active Directory, what type of network do you need?
a. Global account
b. P2P network c. Windows domain d. Windows workgroup
c. Windows domain
Which of the following is the NOS typically NOT responsible for?
a. Managing data and other resources
b. Controlling the files a user can open
c. Ensuring only authorized users have
network access
d. Controlling the speed of the CPU
d. Controlling the speed of the CPU
Which of the following is an advantage of client–server networks over peer–to–peer networks?
a. Permission to resources are distributed
b. They are less complex c. User accounts are assigned in one place d. They are less scalable
c. User accounts are assigned in one place
Five computers are connected to a switch in a star topology. What type of network is this?
a. LAN
b. SAN c. PAN d. MAN
a. LAN
With which topology are all the devices connected to a central switch?
a. Star
b. Ring c. Bus d. Mesh
a. Star
Which topology is most likely to use a token?
a. Star–bus
b. Ring c. Bus d. Hybrid
b. Ring
What device do you need if your network has multiple LANs that need to communicate with each other?
a. Hub
b. Switch c. Router d. NIC
c. Router
Which type of network is the smallest geographically?
a. MAN
b. PAN c. WAN d. LAN
b. PAN
Which OSI Model layer relies on routing protocols to find the best route for a packet?
a. Network
b. Transport c. Physical d. Data Link
a. Network
Which OSI Model layer sends bits over wired or wireless media?
a. Data Link
b. Application c. Physical d. Presentation
c. Physical
On which layer of the OSI Model do you find both a connection–oriented and a connectionless protocol that is responsible for transporting data from one application to another?
a. Transport
b. Application c. Session d. Presentation
a. Transport
Which of the following explains how to properly handle substances such as chemical solvents and how to dispose of them?
a. ESD
b. MSDS c. HVAC d. OSHA
b. MSDS
Which step in the troubleshooting process should you take after you have established a theory of probable cause?
a. Test your theory to determine the cause
b. Verify functionality and implement preventive
measures
c. Establish a plan for resolving the problem
d. Implement the solution or escalate the problem
a. Test your theory to determine the cause
While troubleshooting a problem, you believe the problem is with a router configuration but you don’t have security privileges to change the router configuration? What should you do?
a. Identify the problem
b. Test your theory c. Escalate the problem d. Implement preventive measures
c. Escalate the problem