Chapters 1-3

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of threat is affecting the computer that secretly collects data about visited websites?

  • Malware
  • Phishing
  • Spyware (correct)
  • Adware

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?

  • MAN
  • VPN (correct)
  • WAN
  • LAN

Which networking trend is described when a large corporation allows users to access network resources from personal devices?

  • Cloud Computing
  • BYOD (correct)
  • IoT
  • Virtualization

What does ISP stand for?

<p>Internet Service Provider (C)</p> Signup and view all the answers

Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?

<p>LAN (B)</p> Signup and view all the answers

What does powerline networking technology refer to?

<p>Using power lines for data transmission (C)</p> Signup and view all the answers

What is the technician working on at the medical clinic?

<p>Wireless network (C)</p> Signup and view all the answers

Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?

<p>Confidentiality (D)</p> Signup and view all the answers

Which two criteria are used to help select a network medium from various network media?

<p>Speed and cost (B)</p> Signup and view all the answers

What type of network traffic requires QoS?

<p>Video conferencing (C)</p> Signup and view all the answers

Which two actions would provide the minimum security requirements for a small office network?

<p>Implementing a firewall and using strong passwords (A)</p> Signup and view all the answers

Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?

<p>User EXEC mode, console interface, and auxiliary interface (D)</p> Signup and view all the answers

Which interface allows remote management of a Layer 2 switch?

<p>Console interface (C)</p> Signup and view all the answers

What function does pressing the Tab key have when entering a command in IOS?

<p>It shows the available options (A)</p> Signup and view all the answers

Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

<p>service password-encryption (B)</p> Signup and view all the answers

What does the 'service password-encryption' command accomplish?

<p>It encrypts all passwords in the configuration file (D)</p> Signup and view all the answers

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

<p>Flow control (D)</p> Signup and view all the answers

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

<p>The data is encapsulated into segments at the transport layer (C)</p> Signup and view all the answers

What three application layer protocols are part of the TCP/IP protocol suite?

<p>HTTP, FTP, SMTP (B)</p> Signup and view all the answers

Which name is assigned to the transport layer PDU?

<p>Segment (D)</p> Signup and view all the answers

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

<p>Subnet mask (B)</p> Signup and view all the answers

Which term describes a network where one computer can be both client and server?

<p>Peer-to-peer (C)</p> Signup and view all the answers

Which term describes a type of network used by people who work from home or from a small remote office?

<p>VPN (B)</p> Signup and view all the answers

Which term describes a computing model where server software runs on dedicated computers?

<p>Client-server computing (A)</p> Signup and view all the answers

Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?

<p>Powerline (C)</p> Signup and view all the answers

Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

<p>Quality of Service (QoS) (C)</p> Signup and view all the answers

Which term describes a private collection of LANs and WANs that belongs to an organization?

<p>Intranet (D)</p> Signup and view all the answers

Which term describes the ability to use personal devices across a business or campus network?

<p>BYOD (Bring Your Own Device) (D)</p> Signup and view all the answers

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

<p>Network layer (D)</p> Signup and view all the answers

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

<p>Transport layer (A)</p> Signup and view all the answers

Which command can be used to encrypt passwords in a configuration file?

<p>service password-encryption (A)</p> Signup and view all the answers

What is the purpose of the 'service password-encryption' command?

<p>To encrypt passwords in a configuration file (C)</p> Signup and view all the answers

Which layer of the TCP/IP model is responsible for routing messages through an internetwork?

<p>Internet layer (A)</p> Signup and view all the answers

Which three application layer protocols are part of the TCP/IP protocol suite?

<p>HTTP, FTP, DNS (A)</p> Signup and view all the answers

Which layer of the OSI model adds a logical address during encapsulation?

<p>Network layer (C)</p> Signup and view all the answers

What is the advantage of network devices using open standard protocols?

<p>Interoperability with different vendors' devices (C)</p> Signup and view all the answers

Which device determines the path that messages should take through internetworks?

<p>Router (C)</p> Signup and view all the answers

Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?

<p>Confidentiality (D)</p> Signup and view all the answers

What two criteria are used to help select a network medium from various network media?

<p>Cost and availability (C)</p> Signup and view all the answers

What type of network traffic requires QoS?

<p>Video conferencing traffic (A)</p> Signup and view all the answers

Which two actions would provide the minimum security requirements for a small office network?

<p>Using strong passwords and enabling port security (B)</p> Signup and view all the answers

Which interface allows remote management of a Layer 2 switch?

<p>Console interface (A)</p> Signup and view all the answers

What function does pressing the Tab key have when entering a command in IOS?

<p>It displays the available command options (B)</p> Signup and view all the answers

What action can a technician take to discard the changes made to a router configuration file in NVRAM?

<p>Reload the router (A)</p> Signup and view all the answers

Which type of threat is affecting the computer that secretly collects data about visited websites?

<p>Malware (C)</p> Signup and view all the answers

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?

<p>Extranet (C)</p> Signup and view all the answers

Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?

<p>Bring Your Own Device (BYOD) (B)</p> Signup and view all the answers

What does ISP stand for?

<p>Internet Service Provider (C)</p> Signup and view all the answers

Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?

<p>VPN (D)</p> Signup and view all the answers

Which statement describes the use of powerline networking technology?

<p>It uses electrical wiring to transmit data between devices. (A)</p> Signup and view all the answers

What is the networking technician working on at the medical clinic?

<p>Wireless network infrastructure (B)</p> Signup and view all the answers

Which term describes a network where one computer can be both client and server?

<p>Peer-to-peer network (C)</p> Signup and view all the answers

What term describes a type of network used by people who work from home or from a small remote office?

<p>Virtual Private Network (VPN) (D)</p> Signup and view all the answers

What term describes a computing model where server software runs on dedicated computers?

<p>Client-server model (B)</p> Signup and view all the answers

What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

<p>Powerline networking (C)</p> Signup and view all the answers

What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

<p>Quality of Service (QoS) (B)</p> Signup and view all the answers

What term describes a private collection of LANs and WANs that belongs to an organization?

<p>Intranet (D)</p> Signup and view all the answers

What term describes the ability to use personal devices across a business or campus network?

<p>Bring Your Own Device (BYOD) (D)</p> Signup and view all the answers

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

<p>Network layer (B)</p> Signup and view all the answers

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

<p>Transport layer (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Frankenstein Chapters 1-3 Flashcards
15 questions
chapters 1-3
16 questions

chapters 1-3

VerifiableDaffodil avatar
VerifiableDaffodil
Use Quizgecko on...
Browser
Browser