Podcast
Questions and Answers
Powerline networking is useful when wireless access points can reach all the devices in the home.
Powerline networking is useful when wireless access points can reach all the devices in the home.
True
Wireless Internet Service Providers (WISPs) are more commonly found in urban environments.
Wireless Internet Service Providers (WISPs) are more commonly found in urban environments.
False
Wireless broadband is not a suitable solution for home and small businesses.
Wireless broadband is not a suitable solution for home and small businesses.
False
A smart phone uses different cellular technology than what is used for wireless broadband.
A smart phone uses different cellular technology than what is used for wireless broadband.
Signup and view all the answers
An antenna installed outside the house provides only wired connectivity for devices in the home.
An antenna installed outside the house provides only wired connectivity for devices in the home.
Signup and view all the answers
Network security is not important regardless of the network's size.
Network security is not important regardless of the network's size.
Signup and view all the answers
Quality of Service (QoS) does not need to consider the expected service level of the network.
Quality of Service (QoS) does not need to consider the expected service level of the network.
Signup and view all the answers
Securing a network involves only protocols, without the need for any devices or tools.
Securing a network involves only protocols, without the need for any devices or tools.
Signup and view all the answers
Information security is not a concern when it comes to network infrastructure security.
Information security is not a concern when it comes to network infrastructure security.
Signup and view all the answers
Network trends do not impact the deployment of network security measures.
Network trends do not impact the deployment of network security measures.
Signup and view all the answers
A server is a computer that sends requests to end devices to retrieve information.
A server is a computer that sends requests to end devices to retrieve information.
Signup and view all the answers
In a Peer-to-Peer network, a device can only be either a client or a server, not both.
In a Peer-to-Peer network, a device can only be either a client or a server, not both.
Signup and view all the answers
End devices are where messages originate from or where they are received.
End devices are where messages originate from or where they are received.
Signup and view all the answers
Intermediary devices connect end devices in a network.
Intermediary devices connect end devices in a network.
Signup and view all the answers
A Peer-to-Peer network design is suitable for large enterprise networks.
A Peer-to-Peer network design is suitable for large enterprise networks.
Signup and view all the answers
External threats to network security can include viruses, worms, and Trojan horses.
External threats to network security can include viruses, worms, and Trojan horses.
Signup and view all the answers
Internal threats to network security only involve accidental misuse by employees.
Internal threats to network security only involve accidental misuse by employees.
Signup and view all the answers
Network security solutions should be implemented using multiple layers.
Network security solutions should be implemented using multiple layers.
Signup and view all the answers
Firewall filtering is used to allow unauthorized access to the network.
Firewall filtering is used to allow unauthorized access to the network.
Signup and view all the answers
Larger networks may require additional security components like intrusion prevention systems (IPS).
Larger networks may require additional security components like intrusion prevention systems (IPS).
Signup and view all the answers
Cisco Webex is a collaboration tool that allows users to instantly connect and interact over the network.
Cisco Webex is a collaboration tool that allows users to instantly connect and interact over the network.
Signup and view all the answers
Video calls can only be made to people located in the same geographical area.
Video calls can only be made to people located in the same geographical area.
Signup and view all the answers
Cloud computing enables businesses to deliver applications to any device anywhere in the world.
Cloud computing enables businesses to deliver applications to any device anywhere in the world.
Signup and view all the answers
Data centers are not required for cloud computing to function.
Data centers are not required for cloud computing to function.
Signup and view all the answers
Cisco TelePresence is not a tool used for video communication and collaboration.
Cisco TelePresence is not a tool used for video communication and collaboration.
Signup and view all the answers
Dedicated Leased Line connections are shared circuits within the service provider's network.
Dedicated Leased Line connections are shared circuits within the service provider's network.
Signup and view all the answers
DSL Business is available in various formats, including Asymmetric Digital Subscriber Lines (ADSL).
DSL Business is available in various formats, including Asymmetric Digital Subscriber Lines (ADSL).
Signup and view all the answers
Satellite connections are used when a wired solution is available.
Satellite connections are used when a wired solution is available.
Signup and view all the answers
Converged data networks can deliver only one service over one link.
Converged data networks can deliver only one service over one link.
Signup and view all the answers
Network Architecture refers to the technologies that support the infrastructure moving data within a single office only.
Network Architecture refers to the technologies that support the infrastructure moving data within a single office only.
Signup and view all the answers
An intranet is accessible to anyone outside the organization.
An intranet is accessible to anyone outside the organization.
Signup and view all the answers
Extranets are used to provide secure access to network data for employees of a different organization.
Extranets are used to provide secure access to network data for employees of a different organization.
Signup and view all the answers
DSL and cable are examples of home and small office internet connection types.
DSL and cable are examples of home and small office internet connection types.
Signup and view all the answers
Satellite internet connections are particularly beneficial for urban areas.
Satellite internet connections are particularly beneficial for urban areas.
Signup and view all the answers
Dial-up connections are known for their high bandwidth capabilities.
Dial-up connections are known for their high bandwidth capabilities.
Signup and view all the answers