Chapters 1-3
60 Questions
0 Views

Chapters 1-3

Created by
@ProminentTiger

Podcast Beta

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of threat is affecting the computer that secretly collects data about visited websites?

  • Malware
  • Phishing
  • Spyware (correct)
  • Adware
  • Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?

  • MAN
  • VPN (correct)
  • WAN
  • LAN
  • Which networking trend is described when a large corporation allows users to access network resources from personal devices?

  • Cloud Computing
  • BYOD (correct)
  • IoT
  • Virtualization
  • What does ISP stand for?

    <p>Internet Service Provider</p> Signup and view all the answers

    Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?

    <p>LAN</p> Signup and view all the answers

    What does powerline networking technology refer to?

    <p>Using power lines for data transmission</p> Signup and view all the answers

    What is the technician working on at the medical clinic?

    <p>Wireless network</p> Signup and view all the answers

    Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?

    <p>Confidentiality</p> Signup and view all the answers

    Which two criteria are used to help select a network medium from various network media?

    <p>Speed and cost</p> Signup and view all the answers

    What type of network traffic requires QoS?

    <p>Video conferencing</p> Signup and view all the answers

    Which two actions would provide the minimum security requirements for a small office network?

    <p>Implementing a firewall and using strong passwords</p> Signup and view all the answers

    Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?

    <p>User EXEC mode, console interface, and auxiliary interface</p> Signup and view all the answers

    Which interface allows remote management of a Layer 2 switch?

    <p>Console interface</p> Signup and view all the answers

    What function does pressing the Tab key have when entering a command in IOS?

    <p>It shows the available options</p> Signup and view all the answers

    Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

    <p>service password-encryption</p> Signup and view all the answers

    What does the 'service password-encryption' command accomplish?

    <p>It encrypts all passwords in the configuration file</p> Signup and view all the answers

    What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

    <p>Flow control</p> Signup and view all the answers

    Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

    <p>The data is encapsulated into segments at the transport layer</p> Signup and view all the answers

    What three application layer protocols are part of the TCP/IP protocol suite?

    <p>HTTP, FTP, SMTP</p> Signup and view all the answers

    Which name is assigned to the transport layer PDU?

    <p>Segment</p> Signup and view all the answers

    When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

    <p>Subnet mask</p> Signup and view all the answers

    Which term describes a network where one computer can be both client and server?

    <p>Peer-to-peer</p> Signup and view all the answers

    Which term describes a type of network used by people who work from home or from a small remote office?

    <p>VPN</p> Signup and view all the answers

    Which term describes a computing model where server software runs on dedicated computers?

    <p>Client-server computing</p> Signup and view all the answers

    Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?

    <p>Powerline</p> Signup and view all the answers

    Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

    <p>Quality of Service (QoS)</p> Signup and view all the answers

    Which term describes a private collection of LANs and WANs that belongs to an organization?

    <p>Intranet</p> Signup and view all the answers

    Which term describes the ability to use personal devices across a business or campus network?

    <p>BYOD (Bring Your Own Device)</p> Signup and view all the answers

    At which OSI layer is a source IP address added to a PDU during the encapsulation process?

    <p>Network layer</p> Signup and view all the answers

    At which OSI layer is a destination port number added to a PDU during the encapsulation process?

    <p>Transport layer</p> Signup and view all the answers

    Which command can be used to encrypt passwords in a configuration file?

    <p>service password-encryption</p> Signup and view all the answers

    What is the purpose of the 'service password-encryption' command?

    <p>To encrypt passwords in a configuration file</p> Signup and view all the answers

    Which layer of the TCP/IP model is responsible for routing messages through an internetwork?

    <p>Internet layer</p> Signup and view all the answers

    Which three application layer protocols are part of the TCP/IP protocol suite?

    <p>HTTP, FTP, DNS</p> Signup and view all the answers

    Which layer of the OSI model adds a logical address during encapsulation?

    <p>Network layer</p> Signup and view all the answers

    What is the advantage of network devices using open standard protocols?

    <p>Interoperability with different vendors' devices</p> Signup and view all the answers

    Which device determines the path that messages should take through internetworks?

    <p>Router</p> Signup and view all the answers

    Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?

    <p>Confidentiality</p> Signup and view all the answers

    What two criteria are used to help select a network medium from various network media?

    <p>Cost and availability</p> Signup and view all the answers

    What type of network traffic requires QoS?

    <p>Video conferencing traffic</p> Signup and view all the answers

    Which two actions would provide the minimum security requirements for a small office network?

    <p>Using strong passwords and enabling port security</p> Signup and view all the answers

    Which interface allows remote management of a Layer 2 switch?

    <p>Console interface</p> Signup and view all the answers

    What function does pressing the Tab key have when entering a command in IOS?

    <p>It displays the available command options</p> Signup and view all the answers

    What action can a technician take to discard the changes made to a router configuration file in NVRAM?

    <p>Reload the router</p> Signup and view all the answers

    Which type of threat is affecting the computer that secretly collects data about visited websites?

    <p>Malware</p> Signup and view all the answers

    Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?

    <p>Extranet</p> Signup and view all the answers

    Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?

    <p>Bring Your Own Device (BYOD)</p> Signup and view all the answers

    What does ISP stand for?

    <p>Internet Service Provider</p> Signup and view all the answers

    Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?

    <p>VPN</p> Signup and view all the answers

    Which statement describes the use of powerline networking technology?

    <p>It uses electrical wiring to transmit data between devices.</p> Signup and view all the answers

    What is the networking technician working on at the medical clinic?

    <p>Wireless network infrastructure</p> Signup and view all the answers

    Which term describes a network where one computer can be both client and server?

    <p>Peer-to-peer network</p> Signup and view all the answers

    What term describes a type of network used by people who work from home or from a small remote office?

    <p>Virtual Private Network (VPN)</p> Signup and view all the answers

    What term describes a computing model where server software runs on dedicated computers?

    <p>Client-server model</p> Signup and view all the answers

    What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

    <p>Powerline networking</p> Signup and view all the answers

    What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

    <p>Quality of Service (QoS)</p> Signup and view all the answers

    What term describes a private collection of LANs and WANs that belongs to an organization?

    <p>Intranet</p> Signup and view all the answers

    What term describes the ability to use personal devices across a business or campus network?

    <p>Bring Your Own Device (BYOD)</p> Signup and view all the answers

    At which OSI layer is a source IP address added to a PDU during the encapsulation process?

    <p>Network layer</p> Signup and view all the answers

    At which OSI layer is a destination port number added to a PDU during the encapsulation process?

    <p>Transport layer</p> Signup and view all the answers

    More Like This

    Frindle Chapters 1-3 Quiz
    22 questions

    Frindle Chapters 1-3 Quiz

    ExceedingSodalite avatar
    ExceedingSodalite
    Sociology Chapters 1 & 3 Flashcards
    35 questions
    Hatchet Chapters 1-3 Quiz
    10 questions
    Use Quizgecko on...
    Browser
    Browser