Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
39 views8 pages

Chapter 1

The document consists of a series of multiple-choice questions related to networking concepts, including types of networks, characteristics of network topologies, and features of network architecture. Key topics include intranet, peer-to-peer networks, fault tolerance, cloud computing, and remote access via VPN. The questions assess knowledge on network infrastructure, intermediary devices, and security principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views8 pages

Chapter 1

The document consists of a series of multiple-choice questions related to networking concepts, including types of networks, characteristics of network topologies, and features of network architecture. Key topics include intranet, peer-to-peer networks, fault tolerance, cloud computing, and remote access via VPN. The questions assess knowledge on network infrastructure, intermediary devices, and security principles.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

::Question1::An employee at a branch office is creating a quote for a customer.

In order to do this, the


employee needs to access confidential pricing information from internal servers at the Head Office. What
type of network would the employee access?
{
=an intranet
~the Internet
~an extranet
~a local area network
}

::Question2::A company is contemplating whether to use a client/server or a peer-to-peer network. What


are three characteristics of a peer-to-peer network? (Choose three.)
{
~better security
=easy to create
=lacks centralized administration
=less cost to implement
}

::Question3::Which area of the network would a college IT staff most likely have to redesign as a direct
result of many students bringing their own tablets and smartphones to school to access school resources?
{
~extranet
~wired LAN
=wireless LAN
~wireless WAN
}

::Question4::Which term describes the state of a network when the demand on the network resources
exceeds the available capacity?
{
~convergence
=congestion
~optimization
~synchronization
}

::Question5::Which networking trend involves the use of personal tools and devices for accessing
resources on a business or campus network?
{
~video conferencing
~cloud computing
=BYOD
~powerline networking
}

::Question6::What is a characteristic of a converged network?


{
~it provides only one path between the source and destination of a message
~it limits the impact of a failure by minimizing the number of devices affected
=it delivers data, voice, and video over the same network infrastructure
~A converged network requires a separate network infrastructure for each type of communication
technology
}

::Question7::What type of network must a home user access in order to do online shopping?
{
~an intranet
=the Internet
~an extranet
~a local area network
}
::Question8::A college is building a new dormitory on its campus. Workers are digging in the ground to
install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects
two of the existing dormitories to the campus data center. Although the cable has been cut, students in the
dormitories only experience a very short interruption of network services. What characteristic of the
network is shown here?
{
~scalability
~security
=fault tolerance
~integrity
}

::Question9::Which statement describes a characteristic of cloud computing?


{
~A business can connect directly to the Internet without the use of an ISP.
=Applications can be accessed over the Internet by individual users or businesses using any device,
anywhere in the world.
~Devices can connect to the Internet through existing electrical wiring.
~Investment in new infrastructure is required in order to access the cloud.
}

::Question10::Which two statements describe intermediary devices? (Choose two.)


{
~Intermediary devices alter data content.
=Intermediary devices direct the path of the data.
=Intermediary devices connect individual hosts to the network.
~Intermediary devices initiate the encapsulation process.
}

::Question11::What are two functions of end devices on a network? (Choose two.)


{
=They originate the data that flows through the network.
~They filter the flow of data to enhance security.
=They are the interface between humans and the communication network.
~They provide the channel over which the network message travels.
}

::Question12::Which two devices are intermediary devices? (Choose two)


{
~hosts
=routers
~servers
=switches
}

::Question13::Which of the following is the name for all computers connected to a network that
participate directly in network communication?
{
~servers
~intermediary devices
=hosts
~media
}

::Question14::Which type of network topology lets you see which end devices are connected to which
intermediary devices and what media is being used?
{
~Physical topology
=Logical topology
~Binary topology
~Network topology
}
::Question15::Which type of network topology lets you see the actual location of intermediary devices
and cable installation?
{
=Physical topology
~Logical topology
~Binary topology
~Network topology
}

::Question16::Which connections are specialized ports on a networking device that connect to individual
networks?
{
~Port
~NIC
=Interface
~Router
}

::Question17::Which network infrastructure provides access to users and end devices in a small
geographical area, which is typically a network in a department in an enterprise, a home, or small
business?
{
~Extranet
~Intranet
=LAN
~WAN
}

::Question18::Which network infrastructure provides access to other networks over a large geographical
area, which is often owned and managed by a telecommunications service provider?
{
~Extranet
~Intranet
~LAN
=WAN
}

::Question19::Confidentiality, integrity, and availability are requirements of which of the four basic
characteristics of network architecture?
{
~fault tolerance
~Scalability
~QoS
=Security
}

::Question20::With which type of policy, a router can manage the flow of data and voice traffic, giving
priority to voice communications if the network experiences congestion?
{
~fault tolerance
~Scalability
=QoS
~Security
}

::Question21::Having multiple paths to a destination is known as redundancy. This is an example of


which characteristic of network architecture?
{
=fault tolerance
~Scalability
~QoS
~Security
}
::Question22::Which feature contains options such as Public, Private, Custom and Hybrid?
{
~BYOD
~Video communications
=Cloud computing
~Powerline
}

::Question23::Which feature is being used when connecting a device to the network using an electrical
outlet?
{
~Smart home technology
=Powerline
~Wireless broadband
~Cloud computing
}

::Question24::What is an ISP?
{
~It is a standards body that develops cabling and wiring standards for networking.
~It is a networking device that combines the functionality of several different networking devices in one.
~It is a protocol that establishes how computers within a local network communicate.
=It is an organization that enables individuals and businesses to connect to the Internet.
}

::Question25::An employee wants to access the network of the organization remotely, in the safest
possible way. What network feature would allow an employee to gain secure remote access to a company
network?
{
~ACL
~IPS
~BYOD
=VPN
}

You might also like