Networking Devices Exam 1 Flashcards
Which feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?
quality of service
An administrator is adding voice and video service capabilities to an existing network. What design requirement is being satisfied by this situation?
scalability - Scalability refers to the ability of a network to expand to support new users, services, and applications. In this example, scalability allows the administrator to expand the ability of the network to support voice and video.
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
fault tolerance - Fault tolerance is the characteristic of a network which allows it to quickly respond to failures of network devices, media, or services. Quality of service refers to the measures taken to ensure that network traffic requiring higher throughput receives the required network resources. Scalability refers to the ability of the network to grow to accommodate new requirements. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is generally not used as a characteristic of networks in the same way as the other terms.
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
security - Network security includes protecting the confidentiality of data that is on the network. In this case, because confidential data has been made available to unauthorized users, the security characteristic of the network has failed.
Which is a characteristic of a Type 2 hypervisor?
does not require management console software - Type 2 hypervisors are hosted on an underlaying operating system and are best suited for consumer applications and those experimenting with virtualization. Unlike Type 1 hypervisors, Type 2 hypervisors do not require a management console and do not have direct access to hardware.
Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
congestion
A company is considering implementing virtualization solutions in a data center. What are three advantages of virtualization the company can expect to benefit from?
faster server provisioning, improved disaster recovery, & reduced physical space requirements
Which statement accurately describes a Type 2 hypervisor?
It runs as a software layer on top of a host operating system.
A company leases a cloud-based payroll system. Which cloud computing technology is this company using?
software as a service (SaaS)
Which Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?
Infrastructure as a service (IaaS)
Which Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?
Platform as a service (PaaS)
Which IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?
dotted decimal
What are two differences between binary and decimal numbers?
Decimal numbers include 0 through 9. Binary numbers are based on powers of 2.
How many bits make up the single IPv6 hextet :10CD:?
16 - A hextet consists of 4 hexadecimal characters. Each hexadecimal character is represented by four bits, giving a total of 16 bits.
access layer, core layer, & distribution layer
access layer = provides host connectivity to the network
core layer = provides a high-speed connection for the backbone network
distribution layer = provides interconnections for smaller local access networks