::Question1::An employee at a branch office is creating a quote for a customer.
In order to do this, the
employee needs to access confidential pricing information from internal servers at the Head Office. What
type of network would the employee access?
{
=an intranet
~the Internet
~an extranet
~a local area network
}
::Question2::A company is contemplating whether to use a client/server or a peer-to-peer network. What
are three characteristics of a peer-to-peer network? (Choose three.)
{
~better security
=easy to create
=lacks centralized administration
=less cost to implement
}
::Question3::Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smartphones to school to access school resources?
{
~extranet
~wired LAN
=wireless LAN
~wireless WAN
}
::Question4::Which term describes the state of a network when the demand on the network resources
exceeds the available capacity?
{
~convergence
=congestion
~optimization
~synchronization
}
::Question5::Which networking trend involves the use of personal tools and devices for accessing
resources on a business or campus network?
{
~video conferencing
~cloud computing
=BYOD
~powerline networking
}
::Question6::What is a characteristic of a converged network?
{
~it provides only one path between the source and destination of a message
~it limits the impact of a failure by minimizing the number of devices affected
=it delivers data, voice, and video over the same network infrastructure
~A converged network requires a separate network infrastructure for each type of communication
technology
}
::Question7::What type of network must a home user access in order to do online shopping?
{
~an intranet
=the Internet
~an extranet
~a local area network
}
::Question8::A college is building a new dormitory on its campus. Workers are digging in the ground to
install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects
two of the existing dormitories to the campus data center. Although the cable has been cut, students in the
dormitories only experience a very short interruption of network services. What characteristic of the
network is shown here?
{
~scalability
~security
=fault tolerance
~integrity
}
::Question9::Which statement describes a characteristic of cloud computing?
{
~A business can connect directly to the Internet without the use of an ISP.
=Applications can be accessed over the Internet by individual users or businesses using any device,
anywhere in the world.
~Devices can connect to the Internet through existing electrical wiring.
~Investment in new infrastructure is required in order to access the cloud.
}
::Question10::Which two statements describe intermediary devices? (Choose two.)
{
~Intermediary devices alter data content.
=Intermediary devices direct the path of the data.
=Intermediary devices connect individual hosts to the network.
~Intermediary devices initiate the encapsulation process.
}
::Question11::What are two functions of end devices on a network? (Choose two.)
{
=They originate the data that flows through the network.
~They filter the flow of data to enhance security.
=They are the interface between humans and the communication network.
~They provide the channel over which the network message travels.
}
::Question12::Which two devices are intermediary devices? (Choose two)
{
~hosts
=routers
~servers
=switches
}
::Question13::Which of the following is the name for all computers connected to a network that
participate directly in network communication?
{
~servers
~intermediary devices
=hosts
~media
}
::Question14::Which type of network topology lets you see which end devices are connected to which
intermediary devices and what media is being used?
{
~Physical topology
=Logical topology
~Binary topology
~Network topology
}
::Question15::Which type of network topology lets you see the actual location of intermediary devices
and cable installation?
{
=Physical topology
~Logical topology
~Binary topology
~Network topology
}
::Question16::Which connections are specialized ports on a networking device that connect to individual
networks?
{
~Port
~NIC
=Interface
~Router
}
::Question17::Which network infrastructure provides access to users and end devices in a small
geographical area, which is typically a network in a department in an enterprise, a home, or small
business?
{
~Extranet
~Intranet
=LAN
~WAN
}
::Question18::Which network infrastructure provides access to other networks over a large geographical
area, which is often owned and managed by a telecommunications service provider?
{
~Extranet
~Intranet
~LAN
=WAN
}
::Question19::Confidentiality, integrity, and availability are requirements of which of the four basic
characteristics of network architecture?
{
~fault tolerance
~Scalability
~QoS
=Security
}
::Question20::With which type of policy, a router can manage the flow of data and voice traffic, giving
priority to voice communications if the network experiences congestion?
{
~fault tolerance
~Scalability
=QoS
~Security
}
::Question21::Having multiple paths to a destination is known as redundancy. This is an example of
which characteristic of network architecture?
{
=fault tolerance
~Scalability
~QoS
~Security
}
::Question22::Which feature contains options such as Public, Private, Custom and Hybrid?
{
~BYOD
~Video communications
=Cloud computing
~Powerline
}
::Question23::Which feature is being used when connecting a device to the network using an electrical
outlet?
{
~Smart home technology
=Powerline
~Wireless broadband
~Cloud computing
}
::Question24::What is an ISP?
{
~It is a standards body that develops cabling and wiring standards for networking.
~It is a networking device that combines the functionality of several different networking devices in one.
~It is a protocol that establishes how computers within a local network communicate.
=It is an organization that enables individuals and businesses to connect to the Internet.
}
::Question25::An employee wants to access the network of the organization remotely, in the safest
possible way. What network feature would allow an employee to gain secure remote access to a company
network?
{
~ACL
~IPS
~BYOD
=VPN
}