click below
click below
Normal Size Small Size show me how
networking f1
| Question | Answer |
|---|---|
| Which feature describes using personal tools to access information and communicate across a business or campus network? Group of answer choices Cloud Computing Smart Home Technology Video Communications BYOD | BYOD |
| This attack steals the login credentials of a user in order to access private data. Group of answer choices Identity Theft Virus Denial of Service Data interception and theft | Identity Theft |
| Identify the Intermediary device. Group of answer choices Hub telephone printer PC | Hub |
| Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? Group of answer choices Security Fault Tolerance Quality of Service (QoS) Scalability | Security |
| These attacks slow or crash applications and processes on a network device. Group of answer choices Identity Theft Spyware Virus Denial of Service | denial of service |
| What is the advantage of peer-to-peer networking? Group of answer choices Centralized administration Centralized Server More Secure Easy to set up | easy to setup |
| Which option blocks unauthorized access to your network? Group of answer choices Virus, worm or Trojan Horse Zero day or Zero hour Virtual Private Network Firewall | firewall |
| The source or destination of a message transmitted over the network. Group of answer choices Intermediary device End Device Router Switch | End Device |
| Identify the end device. Group of answer choices switch hub router printer | Printer |
| Provide high bandwidth, high availability, and an always-on connection to the internet and runs over a telephone line. Group of answer choices Cellular Satellite DSL Cable | DSL |
| An inexpensive option that uses any phone line and a modem and has low bandwidth Group of answer choices DSL Cable Satellite Dial Up | Dial up |
| A characteristics of a network that limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs. Group of answer choices Security Fault Tolerance Scalability Quality of Service (QoS) | Fault tolerance |
| This type topology diagrams illustrate devices, ports, and the addressing scheme of the network. Group of answer choices Transport topology Application Topology Physical Topology Logical Topology | Logical topology |
| Which feature is being used when connecting a device to the network using an electrical outlet? Group of answer choices Smart Home Technology Powerline Video Communications BYOD | Powerline |
| A worldwide collection of interconnected networks Group of answer choices Extranet Intranet Internet Ultranet | internet |
| Identify the end device. Group of answer choices switch smart phone router hub | Smart Phone |
| When data is encoded as pulses of light, which media is being used to transmit the data? Group of answer choices fiber-optic cable UTP cable wireless coaxial cable | Fiber-optic cable |
| The acronym UTP stands for? Group of answer choices Untwisted Transmission Pair Universal Transmission Protocol United Transport Protocol Unshielded Twisted Pair | Unshielded Twisted Pair |
| With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? Group of answer choices Security Quality of Service (QoS) Fault Tolerance Scalability | Quality of Service (QoS) |
| Which feature uses the same cellular technology as a smart phone? | Wireless Broadband |
| 20/20 | |
| This type of topology diagrams illustrate the physical location of intermediary devices and cable installation. Group of answer choices Transport topology Application Topology Physical Topology Logical Topology | physical |
| Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? Group of answer choices BYOD Video Communications Cloud Computing Smart Home Technology | Video Communications |
| Assures users that the information has not been altered in transmission, from origin to destination. Group of answer choices Confidentiality Availability Integrity Authentication | integrity |
| Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? Group of answer choices Security Scalability Fault Tolerance Quality of Service (QoS) | fault tolerance |
| Which of the following is the name for all computers connected to a network that participate directly in network communication? Group of answer choices hosts servers intermediary devices media | hosts |
| Extend LAN access technology into the WAN. Group of answer choices Metro Ethernet Business DSL Dedicated Leased Line Satellite | metro ethernet |
| Assures users of timely and reliable access to data services for authorized users. Group of answer choices Confidentiality Availability Integrity Authentication | availability |
| Coaxial cable encodes data into? Group of answer choices Sound waves Light signal Radio frequencies Electrical impulses | electrical impulses |
| These applications help to protect end devices from becoming infected with malicious software. Group of answer choices Virtual private networks Intrusion prevention systems Access control lists Antivirus and antispyware | anti virus and spyware |
| Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data? Group of answer choices WAN Extranet LAN Intranet | extranet |
| This attack captures private information from an organization's network. Group of answer choices Data interception and theft Virus Denial of Service Identity Theft | data interception and theft |
| Reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate | dedicated lease line |
| A characteristics of a network that can expands quickly to support new users and applications. Group of answer choices Fault Tolerance Quality of Service (QoS) Security Scalability | scalability |
| Identify the end device. Group of answer choices hub switch router laptop | laptop |
| 20/20 | |
| Identify the Intermediary device. Group of answer choices router TV printer telephone | router |
| Devices that connect individual end devices to the network. Group of answer choices Intermediary device End Device Router Switch | intermediary device |
| Uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected. DSL Satellite Cable Cellular | cellular |
| Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? Group of answer choices Extranet LAN WAN Intranet | wan |
| 20/20 |