Chapters 1-3

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of threat is affecting the computer that secretly collects data about visited websites?

  • Malware
  • Phishing
  • Spyware (correct)
  • Adware

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?

  • MAN
  • VPN (correct)
  • WAN
  • LAN

Which networking trend is described when a large corporation allows users to access network resources from personal devices?

  • Cloud Computing
  • BYOD (correct)
  • IoT
  • Virtualization

What does ISP stand for?

<p>Internet Service Provider (C)</p>
Signup and view all the answers

Which network would an employee access if they need to retrieve confidential pricing information from internal servers at the Head Office?

<p>LAN (B)</p>
Signup and view all the answers

What does powerline networking technology refer to?

<p>Using power lines for data transmission (C)</p>
Signup and view all the answers

What is the technician working on at the medical clinic?

<p>Wireless network (C)</p>
Signup and view all the answers

Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?

<p>Confidentiality (D)</p>
Signup and view all the answers

Which two criteria are used to help select a network medium from various network media?

<p>Speed and cost (B)</p>
Signup and view all the answers

What type of network traffic requires QoS?

<p>Video conferencing (C)</p>
Signup and view all the answers

Which two actions would provide the minimum security requirements for a small office network?

<p>Implementing a firewall and using strong passwords (A)</p>
Signup and view all the answers

Which modes and interfaces can be protected with passwords to restrict access to the Cisco IOS?

<p>User EXEC mode, console interface, and auxiliary interface (D)</p>
Signup and view all the answers

Which interface allows remote management of a Layer 2 switch?

<p>Console interface (C)</p>
Signup and view all the answers

What function does pressing the Tab key have when entering a command in IOS?

<p>It shows the available options (A)</p>
Signup and view all the answers

Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

<p>service password-encryption (B)</p>
Signup and view all the answers

What does the 'service password-encryption' command accomplish?

<p>It encrypts all passwords in the configuration file (D)</p>
Signup and view all the answers

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

<p>Flow control (D)</p>
Signup and view all the answers

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

<p>The data is encapsulated into segments at the transport layer (C)</p>
Signup and view all the answers

What three application layer protocols are part of the TCP/IP protocol suite?

<p>HTTP, FTP, SMTP (B)</p>
Signup and view all the answers

Which name is assigned to the transport layer PDU?

<p>Segment (D)</p>
Signup and view all the answers

When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?

<p>Subnet mask (B)</p>
Signup and view all the answers

Which term describes a network where one computer can be both client and server?

<p>Peer-to-peer (C)</p>
Signup and view all the answers

Which term describes a type of network used by people who work from home or from a small remote office?

<p>VPN (B)</p>
Signup and view all the answers

Which term describes a computing model where server software runs on dedicated computers?

<p>Client-server computing (A)</p>
Signup and view all the answers

Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?

<p>Powerline (C)</p>
Signup and view all the answers

Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

<p>Quality of Service (QoS) (C)</p>
Signup and view all the answers

Which term describes a private collection of LANs and WANs that belongs to an organization?

<p>Intranet (D)</p>
Signup and view all the answers

Which term describes the ability to use personal devices across a business or campus network?

<p>BYOD (Bring Your Own Device) (D)</p>
Signup and view all the answers

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

<p>Network layer (D)</p>
Signup and view all the answers

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

<p>Transport layer (A)</p>
Signup and view all the answers

Which command can be used to encrypt passwords in a configuration file?

<p>service password-encryption (A)</p>
Signup and view all the answers

What is the purpose of the 'service password-encryption' command?

<p>To encrypt passwords in a configuration file (C)</p>
Signup and view all the answers

Which layer of the TCP/IP model is responsible for routing messages through an internetwork?

<p>Internet layer (A)</p>
Signup and view all the answers

Which three application layer protocols are part of the TCP/IP protocol suite?

<p>HTTP, FTP, DNS (A)</p>
Signup and view all the answers

Which layer of the OSI model adds a logical address during encapsulation?

<p>Network layer (C)</p>
Signup and view all the answers

What is the advantage of network devices using open standard protocols?

<p>Interoperability with different vendors' devices (C)</p>
Signup and view all the answers

Which device determines the path that messages should take through internetworks?

<p>Router (C)</p>
Signup and view all the answers

Which network characteristic has been violated in the situation where patients can see the medical records data of other patients?

<p>Confidentiality (D)</p>
Signup and view all the answers

What two criteria are used to help select a network medium from various network media?

<p>Cost and availability (C)</p>
Signup and view all the answers

What type of network traffic requires QoS?

<p>Video conferencing traffic (A)</p>
Signup and view all the answers

Which two actions would provide the minimum security requirements for a small office network?

<p>Using strong passwords and enabling port security (B)</p>
Signup and view all the answers

Which interface allows remote management of a Layer 2 switch?

<p>Console interface (A)</p>
Signup and view all the answers

What function does pressing the Tab key have when entering a command in IOS?

<p>It displays the available command options (B)</p>
Signup and view all the answers

What action can a technician take to discard the changes made to a router configuration file in NVRAM?

<p>Reload the router (A)</p>
Signup and view all the answers

Which type of threat is affecting the computer that secretly collects data about visited websites?

<p>Malware (C)</p>
Signup and view all the answers

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?

<p>Extranet (C)</p>
Signup and view all the answers

Which networking trend does the modification of the network to allow users to access network resources from personal laptops and smart phones describe?

<p>Bring Your Own Device (BYOD) (B)</p>
Signup and view all the answers

What does ISP stand for?

<p>Internet Service Provider (C)</p>
Signup and view all the answers

Which type of network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?

<p>VPN (D)</p>
Signup and view all the answers

Which statement describes the use of powerline networking technology?

<p>It uses electrical wiring to transmit data between devices. (A)</p>
Signup and view all the answers

What is the networking technician working on at the medical clinic?

<p>Wireless network infrastructure (B)</p>
Signup and view all the answers

Which term describes a network where one computer can be both client and server?

<p>Peer-to-peer network (C)</p>
Signup and view all the answers

What term describes a type of network used by people who work from home or from a small remote office?

<p>Virtual Private Network (VPN) (D)</p>
Signup and view all the answers

What term describes a computing model where server software runs on dedicated computers?

<p>Client-server model (B)</p>
Signup and view all the answers

What term describes a technology that allows devices to connect to the LAN using an electrical outlet?

<p>Powerline networking (C)</p>
Signup and view all the answers

What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?

<p>Quality of Service (QoS) (B)</p>
Signup and view all the answers

What term describes a private collection of LANs and WANs that belongs to an organization?

<p>Intranet (D)</p>
Signup and view all the answers

What term describes the ability to use personal devices across a business or campus network?

<p>Bring Your Own Device (BYOD) (D)</p>
Signup and view all the answers

At which OSI layer is a source IP address added to a PDU during the encapsulation process?

<p>Network layer (B)</p>
Signup and view all the answers

At which OSI layer is a destination port number added to a PDU during the encapsulation process?

<p>Transport layer (D)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Hatchet Chapters 1-3 Quiz
10 questions
Frankenstein Chapters 1-3 Flashcards
15 questions
Use Quizgecko on...
Browser
Browser