Quiz_ Module 01 - Introduction to Networking.pdf
Document Details
Uploaded by Deleted User
Full Transcript
NV280.ITN.101.001L.FA24 Quizzes Module 01 - Introduc on to Networking...
NV280.ITN.101.001L.FA24 Quizzes Module 01 - Introduc on to Networking Search this course NVCC Fall 2024 Ques ons Account Home Module 01 - Introduc on to Networking Ques on 1 Announcements Started: Aug 27 at 8:47pm Ques on 2 Ques on 3 Dashboard Modules Quiz Instruc ons Ques on 4 Ques on 5 Syllabus Courses Ques on 6 Grades 1 Ques on 1 1 pts Ques on 7 Ques on 8 Groups People Q 9 What is the logical group of Windows Servers controlling the network access to a group of computers also known by? Course Evalua ons Time Elapsed: Hide Time Calendar A empt due: Sep 2 at 11:59pm NOVA Policies 14 Minutes, 56 Seconds 24/7 Tutoring Client Inbox Library Resources RAID History Career Connec on Router Zoom Domain Studio Search Course Materials Search Bookstore Ques on 2 1 pts Help Which of the following statements is true? Physical topologies mostly refer to how software controls access to network resources. In a peer-to-peer network model, each computer controls its own administration, resources, and security. In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network. Ques on 3 1 pts Which of the following is a centralized directory database that contains user account information and security for the entire group of computers? Active Directory Clients Workgroups RAID Ques on 4 1 pts Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? User accounts and passwords to the networks are all assigned in one place. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. Problems on the network can be monitored, diagnosed, and fixed from one location. Access to multiple shared resources can be centrally granted to a single user or a group of users. Ques on 5 1 pts Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you? Peer-to-peer networks are scalable and so they are beneficial. Peer-to-peer networks generally have secured access points preventing unauthorized access. A network operating system is much more expensive than a desktop operating system. A peer-to-peer network model allows network problems to be diagnosed and monitored from a single place. Ques on 6 1 pts 6. You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand? AD Hypervisor RAID Workgroup Ques on 7 1 pts A client wants you to install a network model for his server so that each computer on the network is responsible for controlling access to its resources. Which of the following operating systems will you install in such a situation? Mac Ubuntu Server Red Hat Enterprise Windows Server 2019 Ques on 8 1 pts Which of the following client-server applications use Apache and Nginx? Email services FTP services Web service DNS service Ques on 9 1 pts Which of the following statements stands true? FTP servers provide secure encryption for file transfer. HTTP is a secured protocol that provides secure transmission. The DBMS does not support a multiuser environment. An email can be downloaded to the client computer using POP3. Ques on 10 1 pts Which of the following protocols is used to send an email message to the first server? SMTP POP3 IMAP4 FTP Ques on 11 1 pts Which of the following DBMS applications would you use if you were to organize data into tables and records? Apache MS Outlook FileZilla Microsoft SQL Server Ques on 12 1 pts HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server? The Telnet protocol RDP The SSH protocol POP3 Ques on 13 1 pts A client has hired you to help him with a client-server application for Windows so that he is able to transfer files. Which of the following applications will you suggest so that the client can transfer such files between two computers? CuteFTP MySQL Oracle Database Nginx Ques on 14 1 pts Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation? He should use POP3 to deliver the message. He should use IMAP4 to deliver the message. He should use the SSH protocol to deliver the message. He should use the RDP protocol to deliver the message. Ques on 15 1 pts The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution? WAN BAN CAN PAN Ques on 16 1 pts Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario? A star topology A mesh topology A ring topology A bus topology Ques on 17 1 pts Which of the following terms is also referred to as a "network of networks"? Hub Backbone Spoke Network interface card Ques on 18 1 pts Which of the following network devices does not fall under the category of "end devices" as certified by CISCO? Smartphone Network printer Router File server Ques on 19 1 pts Which of the following consists of high capacity data storage devices in a distinctly defined network segment? MAN PAN SAN WLAN Ques on 20 1 pts A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose. A star topology A mesh topology A ring topology A bus topology Ques on 21 1 pts Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered? WAN MAN PAN CAN Ques on 22 1 pts Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario? An industrial-grade router A consumer-grade router A switch A combo device Ques on 23 1 pts Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them? OSHA PPE Fire suppression system SDS Ques on 24 1 pts What should be the ideal procedure after implementing the solution to a network troubleshooting problem? Document findings, actions, and outcomes. Test the theory to determine the cause. Verify functionality and implement preventive measures. Establish a theory of probable cause. Ques on 25 1 pts What is a collection of accumulated insights and solutions to problems encountered in a particular network known as? Tracking system Knowledge base Change management SDS Ques on 26 1 pts Which of the following is the third step in a network troubleshooting methodology? Establish a plan for solving the problem. Identify the problem and its symptoms. Establish a theory of probable cause. Test your theory to determine the cause. Ques on 27 1 pts What is help desk software used for? To document problems and their resolutions To accumulate insights and solutions to problems encountered on a particular network To properly handle substances such as chemical solvents To protect the computer from an ESD charge Ques on 28 1 pts You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario? Identify why the application is behaving in this manner and the symptoms behind such behavior. Try to establish a theory by yourself regarding the cause by following the OSI model. Escalate the problem. Document the data regarding the person who initially alerted you regarding the anomaly. Ques on 29 1 pts You have successfully implemented a solution to a bug reported by one of the employees of your organization. You also want to ensure that the process has been well documented in the knowledge base of the organization. Which of the following information is not relevant in such a scenario when you put the data into the record books? The contact name of the person reporting the issue The symptoms of the problem The name of the technician who handled the problem The total number of computers functioning in the organization Ques on 30 1 pts PepsiCo Ltd. has been having a lot of bugs in their network and so they have hired Suleiman to analyze the issue at hand. On inspection, he has come up with the solution that certain changes to the network must be done in order to make it functional. Which of the following statements should Suleiman consider while considering a change in a network? Change management procedures should consist of preparing a backup plan as well. Change management procedures do not evaluate the cost of change of a plan. Changes to a network can be done without keeping in view the effect of the change on its users and applications. Changes to a network should be done when there are maximum users on the network. Ques on 31 1 pts You are a freelance software engineer who has been hired to troubleshoot an error with the antivirus software of a particular computer of an employee where he gets an invalid password message. Which of the following methods will you use in such a scenario? Use a bottom-to-top OSI layers approach Use a top-to-bottom OSI layers approach Escalate the problem Check the change management policies of the organization Ques on 32 1 pts What should you do once you have tested your theory to determine the cause of the problem at hand? Establish a plan for resolving the problem. b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes. Analysis: Correct. Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data. Incorrect. Before implementing a solution, one should establish a plan of how the implementation will affect the users. Incorrect. These preventive measures are to be followed post implementation. Incorrect. Call tracking systems to document problems and resolutions are the final stages in such a scenario. Ques on 33 1 pts JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day-to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade. Establish a plan for resolving the problem. Roll out changes in stages. Document findings, actions, and outcomes. Verify functionality and implement preventive measures. Ques on 34 1 pts What other technical name or PDU can be used to represent the session presentation and application layer? L4PDU L7PDU L3PDU L2PDU Ques on 35 1 pts What is the data passed between utility programs or applications and the operating system known as? Host Payload Firmware Ethernet Ques on 36 1 pts You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply? Presentation layer Transport layer Data link layer Physical layer Ques on 37 1 pts Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario? Internet Message Access Protocol Simple Network Management Protocol Transmission Control Protocol User Datagram Protocol Ques on 38 1 pts White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error. Presentation layer Network layer Transport layer Data link layer Ques on 39 1 pts Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for? UDP TCP SNMP IMAP4 Ques on 40 1 pts James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router? The physical layer The session layer The transport layer The network layer Saving... Submit Quiz