Networking Devices Exam 1 Flashcards

1
Q

Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?

A

quality of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An administrator is adding voice and video service capabilities to an existing network. What design requirement is being satisfied by this situation?

A

scalability - Scalability refers to the ability of a network to expand to support new users, services, and applications. In this example, scalability allows the administrator to expand the ability of the network to support voice and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

A

fault tolerance - Fault tolerance is the characteristic of a network which allows it to quickly respond to failures of network devices, media, or services. Quality of service refers to the measures taken to ensure that network traffic requiring higher throughput receives the required network resources. Scalability refers to the ability of the network to grow to accommodate new requirements. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is generally not used as a characteristic of networks in the same way as the other terms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

A

security - Network security includes protecting the confidentiality of data that is on the network. In this case, because confidential data has been made available to unauthorized users, the security characteristic of the network has failed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is a characteristic of a Type 2 hypervisor?​

A

does not require management console software - Type 2 hypervisors are hosted on an underlaying operating system and are best suited for consumer applications and those experimenting with virtualization. Unlike Type 1 hypervisors, Type 2 hypervisors do not require a management console and do not have direct access to hardware.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?

A

congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A company is considering implementing virtualization solutions in a data center. What are three advantages of virtualization the company can expect to benefit from?

A

faster server provisioning, improved disaster recovery, & reduced physical space requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement accurately describes a Type 2 hypervisor?

A

It runs as a software layer on top of a host operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company leases a cloud-based payroll system. Which cloud computing technology is this company using?

A

software as a service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?

A

Infrastructure as a service (IaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?

A

Platform as a service (PaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?

A

dotted decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are two differences between binary and decimal numbers?

A

Decimal numbers include 0 through 9. Binary numbers are based on powers of 2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many bits make up the single IPv6 hextet :10CD:?

A

16 - A hextet consists of 4 hexadecimal characters. Each hexadecimal character is represented by four bits, giving a total of 16 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

access layer, core layer, & distribution layer

A

access layer = provides host connectivity to the network
core layer = provides a high-speed connection for the backbone network
distribution layer = provides interconnections for smaller local access networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly