30 Questions
Which network characteristic has been violated in the situation where the technician accidentally sets up the wireless network so that patients can see the medical records data of other patients?
Confidentiality
What two criteria are used to help select a network medium from various network media?
Cost and speed
What type of network traffic requires QoS?
Video conferencing traffic
Which two actions would provide the minimum security requirements for a small office network?
Changing default passwords and enabling port security
Which modes and interfaces can be protected with passwords in Cisco IOS?
User EXEC mode, console interface, and auxiliary interface
Which interface allows remote management of a Layer 2 switch?
Console interface
What function does pressing the Tab key have when entering a command in IOS?
It shows the available command options
Which command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
service password-encryption
What does the 'service password-encryption' command accomplish?
It prevents all passwords from being displayed in plain text.
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
Flow control
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
Data is encapsulated into segments at the network layer.
What three application layer protocols are part of the TCP/IP protocol suite?
HTTP, FTP, SMTP
Which name is assigned to the transport layer PDU?
Segment
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address?
Subnet mask
Which type of threat is affecting the computer that secretly collects data about visited websites?
Malware
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers, and collaborators?
Extranet
Which networking trend does a large corporation modifying its network to allow users to access network resources from personal laptops and smartphones describe?
BYOD (Bring Your Own Device)
What does ISP stand for?
Internet Service Provider
Which network would an employee access to retrieve confidential pricing information from internal servers at the Head Office?
VPN
What does powerline networking technology involve?
Using power cables to transmit network data
What is a networking technician working on when they are working on the wireless network at a medical clinic?
Optimizing network performance
Which term describes a network where one computer can be both client and server?
Peer-to-peer network
Which term describes a type of network used by people who work from home or from a small remote office?
VPN
Which term describes a computing model where server software runs on dedicated computers?
Client-server computing
Which term describes a technology that allows devices to connect to the LAN using an electrical outlet?
Powerline
Which term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
Quality of Service (QoS)
Which term describes a private collection of LANs and WANs that belongs to an organization?
Intranet
Which term describes the ability to use personal devices across a business or campus network?
Bring Your Own Device (BYOD)
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
Network layer
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Transport layer
Quiz: Network Security and Data Transmission 1. "Preventing Password Exposure: Test Your Network Security Knowledge!" - Challenge your network security knowledge with this quiz! Explore commands to prevent unencrypted passwords from displaying in plain text and understand the benefits of encrypting passwords in configuration files.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free