Module 1 - Networking Today Flashcards
Which of the following is the name for all computers connected to a network that participate directly in network communication?
- servers
- intermediary devices
- hosts
- media
hosts
When data is encoded as pulses of light, which media is being used to transmit the data?
- wireless
- Fiber-optic cable
- copper cable
Fiber-optic cable
Which connections are specialized ports on a networking device that connect to individual networks?
- Port
- NIC
- Interface
Interface
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?
- Extranet
- Intranet
- LAN
- WAN
LAN
Which two devices are intermediary devices? (Choose two)
- hosts
- routers
- servers
- switches
- routers
- switches
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?
- Physical topology
- Logical topology
Logical topology
Which connection physically connects the end device to the network?
- Port
- NIC
- Interface
NIC
Which type of network topology lets you see the actual location of intermediary devices and cable installation?
- Physical topology
- Logical topology
Physical topology
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data?
- Extranet
- Intranet
- LAN
- WAN
Extranet
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?
- Extranet
- Intranet
- LAN
- WAN
WAN
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?
- fault tolerance
- Scalability
- QoS
- Security
Scalability
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?
- fault tolerance
- Scalability
- QoS
- Security
Security
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
- fault tolerance
- Scalability
- QoS
- Security
QoS
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
- fault tolerance
- Scalability
- QoS
- Security
fault tolerance
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?
- BYOD
- Video communications
- Cloud computing
Video communications
Which feature describes using personal tools to access information and communicate across a business or campus network?
- BYOD
- Video communications
- Cloud computing
BYOD
Which feature contains options such as Public, Private, Custom and Hybrid?
- BYOD
- Video communications
- Cloud computing
Cloud computing
Which feature is being used when connecting a device to the network using an electrical outlet?
- Smart home technology
- Powerline
- Wireless broadband
Powerline
Which feature uses the same cellular technology as a smart phone?
- Smart home technology
- Powerline
- Wireless broadband
Wireless broadband
Which attack slows down or crashes equipment and programs?
- Firewall
- Virus, worm, or Trojan horse
- Zero-day or Zero-hour
- Virtual Private Network (VPN)
- Denial of Service (DoS)
Denial of Service (DoS)
Which option describes a network attack that occurs on the first day that a vulnerability becomes known?
- Firewall
- Virus, worm, or Trojan horse
- Zero-day or Zero-hour
- Virtual Private Network (VPN)
- Denial of Service (DoS)
Zero-day or Zero-hour
Which option creates a secure connection for remote workers?
- Firewall
- Virus, worm, or Trojan horse
- Zero-day or Zero-hour
- Virtual Private Network (VPN)
- Denial of Service (DoS)
Virtual Private Network (VPN)
Which option blocks unauthorized access to your network?
- Firewall
- Virus, worm, or Trojan horse
- Zero-day or Zero-hour
- Virtual Private Network (VPN)
- Denial of Service (DoS)
Firewall
Which option describes malicious code running on user devices?
- Firewall
- Virus, worm, or Trojan horse
- Zero-day or Zero-hour
- Virtual Private Network (VPN)
- Denial of Service (DoS)
Virus, worm, or Trojan horse