Questions Flashcards
Which of the following components is NOT required to create a network?
A. Network media
B. Network interfaces
C. Computer systems
D. Wireless adapter
D. Wireless adapter
To create a network, four things are required:
The computers
Network media (transmitting data from one computer to another).The most common network media are wires and radio signals.
Network interfaces - These are devices installed on each computer that can send and receive signals through the network media.
Network protocols - Protocols are rules that computers on a network must follow to send and receive data.
Multiple computers configured to be able to communicate and share information with each other form a ____________.
A. Group
B. Family
C. Network
D. Commune
C. Network
A network is a group of computer systems that are interconnected so they can share information with each other. The computer you’re using to watch this video has a network connection to the computer the video file is stored on. In this video, we’ll look at the components of a network, then compare different kinds of networks.
Which of the following is the best definition for a LAN?
A. The interconnection of components, such as laptops, printers, keyboards, and other wireless devices within a personal range (typically 10 meters or less).
B. A network whose computers and servers are separated geographically but still connected.
C. A network in a small geographic area, like in an office.
D. An extension of a private network over a shared or public network, such as the Internet.
C. A network in a small geographic area, like in an office.
A local area network, or LAN, is a group of connected computers that are physically close together, usually in the same building. The computers in your office, school, or library are most likely connected to each other on a LAN.
A LAN is a network in a small geographic area, like in an office.
A WAN is a network whose computers and servers are geographically far apart but still connected. A PAN (personal area network) is the interconnection of components, such as laptops, mobile devices, printers, mice, keyboards, and other Bluetooth equipped devices, using some form of wireless technology within a personal range (typically 10 meters or less). A VPN is the extension of a private network over a shared or public network, such as the Internet.
You are an IT technician for your company. Your boss has asked you to set up and configure a wireless network to service all of the conference rooms.
Which of the following features lets you allow or reject client connections based on the hardware address?
A. WEP
B. SSID
C. DHCP
D. MAC address filtering
D. MAC address filtering
MAC address filtering allows or rejects client connections based on the hardware address. Wi-Fi Protected Access II (WPA2) provides encryption and user authentication for wireless networks. Wired Equivalent Privacy (WEP) also provides security, but WPA2 is considered more secure than WEP. The SSID is the network name or identifier.
Which of the following provides services to hosts on its network?
A. Email
B. Server
C. Client
D. Storage
B. Server
Servers are computers that provide network services to other hosts on a network.
Clients are computers that consume network services provided by servers. The computer you’re using right now is a client.
Storage and email are both services that can be provided to clients by servers.
You have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit encrypted information for such things as making payments at a checkout counter.
Which of the following is the technology being used in these phones?
A. Infrared transmitters
B. NFC chips
C. Bluetooth transmitters
D. VPN
B. NFC chips
Near field communications (NFC) chips are a wireless mobile technology that can be embedded in credit cards and smartphones for transmitting financial information when making payments. For example, many point of sale devices can read information from NFC chips. NFC chips can also be used in passports to contain identity information.
Which of the following is a wired networking method most commonly used today by desktop PCs and other network devices to connect to a local area network?
A. ArcNet
B. Token Ring
C. Ethernet
D. 802.11n
E. Bluetooth
C. Ethernet
Ethernet is a wired, local area network (LAN) standard. Most laptops and desktop computers have built-in Ethernet network ports.
Bluetooth is a wireless standard that allows the creation of short-range Personal Area Networks (PANs). Token Ring and ArcNet are older wired network standards that are nearly obsolete and not commonly used in a modern LAN. 802.11n is a wireless standard used in local area networks.
A technician is tasked to prepare a conference room so that at least 20 guests will be able to wirelessly connect laptop computers to the company network.
Which of the following network devices would be the BEST choice for this connectivity?
A. Router
B. Switch
C. Firewall
D. Access point
D. Access point
An access point gives WiFi access to a network.
A firewall filters network traffic based on a set of rules.
A switch maintains a table of MAC addresses by port and forwards network frames only to the port that matches the MAC address.
A router manages IP traffic between networks.
Which of the following is the best device to deploy to protect your private network from an untrusted public network?
A. Firewall
B. Gateway
C. Router
D. Hub
A. Firewall
A firewall is the best device to deploy to protect your private network from an untrusted public network. Firewalls are used to control traffic entering and leaving your trusted network environment. Firewalls can manage traffic based on source or destination IP address, port number, service protocol, application or service type, user account, and even traffic content. Routers offer some packet-based access control but not as extensive as that of a full-fledged firewall. Hubs and gateways are not sufficient for managing the interface between a trusted and an untrusted network.
Kris recently subscribed to a cable Internet provider. Which of the following devices is needed to convert the signal received on the coax cable to data that can be understood by a computer?
A. Server
B. Router
C. Modem
D. Switch
C. Modem
Cable internet providers require the client to have a modem to receive the signal from a coax cable and convert the signal for use with a data network, typically over copper Ethernet cables.
A router is a network device that moves traffic between two different IP networks.
A switch is a network device that moves traffic within an IP network.
A server is a computer that provides services to clients on a network.
Which of the following components stores values in short-term memory?
A. Hard drive
B. Flash drive
C. RAM
D. Processor
C. Ram
RAM stores values in short-term memory.
Hard drives store data in long-term memory.
Processors execute instructions stored in computer programs.
Flash drives are portable devices that store data in long-term memory.
Which hardware component processes data?
HDD
RAM
CPU
SSD
The CPU, or Central Processing Unit, processes data.
RAM stores values in short-term memory.
HDD and SDD are two types of long-term memory storage.
Which of the following components converts AC to DC?
Voltage regulator
Correct Answer:
Power supply
Surge protector
Capacitor
A computer’s power supply converts alternating current (AC) from the wall outlet to direct current (DC) used by the computer’s internal components.
A voltage regulator is an electronic device that supplies the appropriate voltage to a processor. It does not convert the power input from one form to another; it only ensures that the voltage remains at the appropriate level for the device. A surge protector protects a system from power spikes. A UPS (uninterruptable power supply) provides backup AC power using a reserve battery.
Which of the following computer components is the MOST important part of any modern computer?
RAM
NIC
CPU
BIOS
The CPU is the most important part of any modern computer system because it controls the other parts of the computer.
RAM is the main memory of a computer. It can be quickly accessed by the CPU and is where the computer stores data and instructions that it is actively using.
A network interface card (NIC) is a component (sometimes built into the CPU and sometimes plugged into the motherboard) that provides network connectivity.
The BIOS makes sure all necessary parts are plugged in and working properly on bootup.
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not important. Where should the data be stored?
In memory
In a flat file
In a database
In flash memory
Random Access Memory (RAM) is extremely fast, and the processor can read from and write to it billions of times each second. RAM is not persistent, which means if the system turns off, RAM loses everything it had stored in memory. But data persistence is not important in this scenario.
Flash memory, flat files, and databases all provide persistent storage, but much slower data access than RAM.