Podcast
Questions and Answers
Powerline networking is useful when wireless access points can reach all the devices in the home.
Powerline networking is useful when wireless access points can reach all the devices in the home.
True (A)
Wireless Internet Service Providers (WISPs) are more commonly found in urban environments.
Wireless Internet Service Providers (WISPs) are more commonly found in urban environments.
False (B)
Wireless broadband is not a suitable solution for home and small businesses.
Wireless broadband is not a suitable solution for home and small businesses.
False (B)
A smart phone uses different cellular technology than what is used for wireless broadband.
A smart phone uses different cellular technology than what is used for wireless broadband.
An antenna installed outside the house provides only wired connectivity for devices in the home.
An antenna installed outside the house provides only wired connectivity for devices in the home.
Network security is not important regardless of the network's size.
Network security is not important regardless of the network's size.
Quality of Service (QoS) does not need to consider the expected service level of the network.
Quality of Service (QoS) does not need to consider the expected service level of the network.
Securing a network involves only protocols, without the need for any devices or tools.
Securing a network involves only protocols, without the need for any devices or tools.
Information security is not a concern when it comes to network infrastructure security.
Information security is not a concern when it comes to network infrastructure security.
Network trends do not impact the deployment of network security measures.
Network trends do not impact the deployment of network security measures.
A server is a computer that sends requests to end devices to retrieve information.
A server is a computer that sends requests to end devices to retrieve information.
In a Peer-to-Peer network, a device can only be either a client or a server, not both.
In a Peer-to-Peer network, a device can only be either a client or a server, not both.
End devices are where messages originate from or where they are received.
End devices are where messages originate from or where they are received.
Intermediary devices connect end devices in a network.
Intermediary devices connect end devices in a network.
A Peer-to-Peer network design is suitable for large enterprise networks.
A Peer-to-Peer network design is suitable for large enterprise networks.
External threats to network security can include viruses, worms, and Trojan horses.
External threats to network security can include viruses, worms, and Trojan horses.
Internal threats to network security only involve accidental misuse by employees.
Internal threats to network security only involve accidental misuse by employees.
Network security solutions should be implemented using multiple layers.
Network security solutions should be implemented using multiple layers.
Firewall filtering is used to allow unauthorized access to the network.
Firewall filtering is used to allow unauthorized access to the network.
Larger networks may require additional security components like intrusion prevention systems (IPS).
Larger networks may require additional security components like intrusion prevention systems (IPS).
Cisco Webex is a collaboration tool that allows users to instantly connect and interact over the network.
Cisco Webex is a collaboration tool that allows users to instantly connect and interact over the network.
Video calls can only be made to people located in the same geographical area.
Video calls can only be made to people located in the same geographical area.
Cloud computing enables businesses to deliver applications to any device anywhere in the world.
Cloud computing enables businesses to deliver applications to any device anywhere in the world.
Data centers are not required for cloud computing to function.
Data centers are not required for cloud computing to function.
Cisco TelePresence is not a tool used for video communication and collaboration.
Cisco TelePresence is not a tool used for video communication and collaboration.
Dedicated Leased Line connections are shared circuits within the service provider's network.
Dedicated Leased Line connections are shared circuits within the service provider's network.
DSL Business is available in various formats, including Asymmetric Digital Subscriber Lines (ADSL).
DSL Business is available in various formats, including Asymmetric Digital Subscriber Lines (ADSL).
Satellite connections are used when a wired solution is available.
Satellite connections are used when a wired solution is available.
Converged data networks can deliver only one service over one link.
Converged data networks can deliver only one service over one link.
Network Architecture refers to the technologies that support the infrastructure moving data within a single office only.
Network Architecture refers to the technologies that support the infrastructure moving data within a single office only.
An intranet is accessible to anyone outside the organization.
An intranet is accessible to anyone outside the organization.
Extranets are used to provide secure access to network data for employees of a different organization.
Extranets are used to provide secure access to network data for employees of a different organization.
DSL and cable are examples of home and small office internet connection types.
DSL and cable are examples of home and small office internet connection types.
Satellite internet connections are particularly beneficial for urban areas.
Satellite internet connections are particularly beneficial for urban areas.
Dial-up connections are known for their high bandwidth capabilities.
Dial-up connections are known for their high bandwidth capabilities.
Flashcards are hidden until you start studying