Domain 1 Flashcards

1
Q

Internet

A

The global system of interconnected computer networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intranet

A

A private network accessible only to an organization’s users. This type of network is used to deliver tools such as collaborations, corporate directories, sales and customer relationship management tools, product management, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IoT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Peer-to-peer

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Client-server

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unicast

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multicast

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Broadcast

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hyper-V Manager is an example of a Type____________hypervisor hosted on a Windows 10 Pro operating system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List two examples of bare-metal hypervisors.

A

A.
B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide two reasons why a user might run a virtual machine on their device.

A

A.
B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual machines on a(n)___________switch only have access to each other and the host machine.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virtual machines on a(n)__________switch only have access to each other.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Of the three types of virtual switches, which is considered the most secure and why?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Every device on a__________network is responsible for managing access to its own resources.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active Directory acts as the server piece in a Windows-based___________network.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A thermostat programmed remotely using an app is an example of an____________device.

A

Internet of things (IoT)

18
Q

A____________hypervisor is installed on a host OS, while a bare-metal hypervisor runs on its own operating system.

A
19
Q

Users can test apps and features on virtual machines to avoid harming their device’s_______________.

A
20
Q

A(n)_____________switch provides virtual machines access to the same resources as the host PC. For example, if a PC has internet access, so does its virtual machines.

A
21
Q

In a site-to-site connection, two businesses or two locations within a__________are connected to each other.

A
22
Q

The____________tool allows users to see what someone is doing when connected to a machine.

A
23
Q

A device controlled remotely through a smartphone app or similar medium

A
24
Q

A network that lacks a central device for managing and storing users, files, and folders

A
25
Q

A transmission type in which a device transmits data to every other device on its network

A
26
Q

The world’s largest public network; contains a vast amount of information

A
27
Q

A network in which a central server hosts all the accounts, devices, and permissions for devices

A
28
Q

A transmission type in which data is transmitted from one device to another

A
29
Q

A website internal to a business and not seen by the public

A
30
Q

A transmission type in which one device transmits data to a selected group of devices

A
31
Q

True or False: A site-to-site VPN connection connects a desktop to a business network.

A
32
Q

True or False: The Remote Desktop Connection tool allows users to control a device, so long as they know its IP address and credentials.

A
33
Q

True or False: Remote Transfer allows the passing of control of a device between the person on a device and the person remoted into it.

A
34
Q

True or False: Once a user is connected to a device using the Remote Desktop Connection tool, they are the only one that can perform actions on the device.

A
35
Q

When creating a VPN connection, a user can choose the type of encrypted connection to use by configuring which option?

A.Connection name
B.Server name or address
C.VPN type
D.Type of sign-in info

A
36
Q

Important network concepts covered in the Networking exam can be divided
into four basic groups of terms and definitions. The first group involves two
different types of networks: the internet and intranets. The former is publicly
accessible, while the latter tends to be privately used.

A
37
Q

The second group also involves two network types: peer-to-peer and clientserver.
Peer-to-peer networks are often utilized by home and small office
networks for their operations, while client-server networks are preferred by
medium to large-sized businesses.

A
38
Q

The third group involves data transmission types: unicast, multicast, and
broadcast. Each term describes different ways that devices transmit data within
a network.

A
39
Q

The fourth group involves devices, such as switches, routers, and cables, that are
used within a network. Internet of Things (IoT) devices, such as smart
thermostats or smart watches, also belong in this group.

A
40
Q

The relationship between hypervisors, virtual machines, and virtual switches are
an important part of virtualization and cloud computing.

A

A hypervisor is a tool that manages physical system resources for virtual machines. There are two main categories of hypervisors: Type I and Type II.

A virtual machine is a software-based, fully functional instance of an operating system. Devices can contain more than one virtual machine.

A virtual switch allows communication between virtual machines, including the sharing of resources. Three types of switches can be applied to VMs: external,
internal, and private.

41
Q

Users can utilize two main methods for remotely accessing a device or resource: virtual private networks (VPNs) and Remote Desktop Connection.

A

A VPN is a private network that uses a public network to transmit data from a source to a destination. It enables users to connect to business networks or other locations through encrypted connections.

Remote Desktop Connection is a tool that allows users to remotely connect to and take over a device