Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

networking f1

QuestionAnswer
Which feature describes using personal tools to access information and communicate across a business or campus network? Group of answer choices Cloud Computing Smart Home Technology Video Communications BYOD BYOD
This attack steals the login credentials of a user in order to access private data. Group of answer choices Identity Theft Virus Denial of Service Data interception and theft Identity Theft
Identify the Intermediary device. Group of answer choices Hub telephone printer PC Hub
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Group of answer choices Security Fault Tolerance Quality of Service (QoS) Scalability Security
These attacks slow or crash applications and processes on a network device. Group of answer choices Identity Theft Spyware Virus Denial of Service denial of service
What is the advantage of peer-to-peer networking? Group of answer choices Centralized administration Centralized Server More Secure Easy to set up easy to setup
Which option blocks unauthorized access to your network? Group of answer choices Virus, worm or Trojan Horse Zero day or Zero hour Virtual Private Network Firewall firewall
The source or destination of a message transmitted over the network. Group of answer choices Intermediary device End Device Router Switch End Device
Identify the end device. Group of answer choices switch hub router printer Printer
Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. Group of answer choices Cellular Satellite DSL Cable DSL
An inexpensive option that uses any phone line and a modem and has low bandwidth Group of answer choices DSL Cable Satellite Dial Up Dial up
A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. Group of answer choices Security Fault Tolerance Scalability Quality of Service (QoS) Fault tolerance
This type topology diagrams illustrate devices, ports, and the addressing scheme of the network. Group of answer choices Transport topology Application Topology Physical Topology Logical Topology Logical topology
Which feature is being used when connecting a device to the network using an electrical outlet? Group of answer choices Smart Home Technology Powerline Video Communications BYOD Powerline
A worldwide collection of interconnected networks Group of answer choices Extranet Intranet Internet Ultranet internet
Identify the end device. Group of answer choices switch smart phone router hub Smart Phone
When data is encoded as pulses of light, which media is being used to transmit the data? Group of answer choices fiber-optic cable UTP cable wireless coaxial cable Fiber-optic cable
The acronym UTP stands for? Group of answer choices Untwisted Transmission Pair Universal Transmission Protocol United Transport Protocol Unshielded Twisted Pair Unshielded Twisted Pair
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? Group of answer choices Security Quality of Service (QoS) Fault Tolerance Scalability Quality of Service (QoS)
Which feature uses the same cellular technology as a smart phone? Wireless Broadband
20/20
This type of topology diagrams illustrate the physical location of intermediary devices and cable installation. Group of answer choices Transport topology Application Topology Physical Topology Logical Topology physical
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Group of answer choices BYOD Video Communications Cloud Computing Smart Home Technology Video Communications
Assures users that the information has not been altered in transmission, from origin to destination. Group of answer choices Confidentiality Availability Integrity Authentication integrity
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Group of answer choices Security Scalability Fault Tolerance Quality of Service (QoS) fault tolerance
Which of the following is the name for all computers connected to a network that participate directly in network communication? Group of answer choices hosts servers intermediary devices media hosts
Extend LAN access technology into the WAN. Group of answer choices Metro Ethernet Business DSL Dedicated Leased Line Satellite metro ethernet
Assures users of timely and reliable access to data services for authorized users. Group of answer choices Confidentiality Availability Integrity Authentication availability
Coaxial cable encodes data into? Group of answer choices Sound waves Light signal Radio frequencies Electrical impulses electrical impulses
These applications help to protect end devices from becoming infected with malicious software. Group of answer choices Virtual private networks Intrusion prevention systems Access control lists Antivirus and antispyware anti virus and spyware
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Group of answer choices WAN Extranet LAN Intranet extranet
This attack captures private information from an organization's network. Group of answer choices Data interception and theft Virus Denial of Service Identity Theft data interception and theft
Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate dedicated lease line
A characteristics of a network that can expands quickly to support new users and applications. Group of answer choices Fault Tolerance Quality of Service (QoS) Security Scalability scalability
Identify the end device. Group of answer choices hub switch router laptop laptop
20/20
Identify the Intermediary device. Group of answer choices router TV printer telephone router
Devices that connect individual end devices to the network. Group of answer choices Intermediary device End Device Router Switch intermediary device
Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. DSL Satellite Cable Cellular cellular
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? Group of answer choices Extranet LAN WAN Intranet wan
20/20
Created by: f3xo
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards