Full Transcript

Revision Questions (Chapter 1 & 2) 1. Which device performs the function of determining the path that messages should take through internetworks? a) a router b) a firewall c) a web server d) a DSL modem e) a switch 2. Which criteria is used to help select a network medium from var...

Revision Questions (Chapter 1 & 2) 1. Which device performs the function of determining the path that messages should take through internetworks? a) a router b) a firewall c) a web server d) a DSL modem e) a switch 2. Which criteria is used to help select a network medium from various network media? a) the types of data that need to be prioritized b) the cost of the end devices utilized in the network c) the environment where the selected medium is to be installed d) the number of intermediary devices installed in the network 3. Which statement describe intermediary devices? a) Intermediary devices generate data content. b) Intermediary devices alter data content. c) Intermediary devices connect individual hosts to the network. d) Intermediary devices initiate the encapsulation process. 4. What is the main function of end devices on a network? a) They originate the data that flows through the network. b) They direct data over alternate paths in the event of link failures. c) They filter the flow of data to enhance security. d) They are the interface between humans and the communication network. 5. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access? a) an intranet b) the Internet c) an extranet d) a local area network 6. Which Internet connection option do not require that physical cables be run to the building? a) DSL b) satellite c) dialup d) dedicated leased line PAGE 1 OF 4 7. Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network? a) video conferencing b) cloud computing c) BYOD d) powerline networking 8. What is a characteristic of a converged network? a) it provides only one path between the source and destination of a message b) it limits the impact of a failure by minimizing the number of devices affected c) it delivers data, voice, and video over the same network infrastructure d) A converged network requires a separate network infrastructure for each type of communication technology 9. Which statement describes a characteristic of cloud computing? a) A business can connect directly to the Internet without the use of an ISP. b) Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world. c) Devices can connect to the Internet through existing electrical wiring. d) Investment in new infrastructure is required in order to access the cloud. 10. Which statement describes the use of powerline networking technology? a) New “smart” electrical cabling is used to extend an existing home LAN. b) A home LAN is installed without the use of physical cabling. c) A device connects to an existing home LAN using an adapter and an existing electrical outlet. d) Wireless access points use powerline adapters to distribute data through the home LAN. 11. A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.) a) implementing a firewall b) installing a wireless network c) installing antivirus software d) adding a dedicated intrusion prevention device 12. What type of network traffic requires QoS? a) email b) on-line purchasing c) video conferencing d) wiki 13. A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? a) data integrity b) data quality c) data confidentiality d) data redundancy PAGE 2 OF 4 14. What is a characteristic of a scalable network? a) easily overloaded with increased traffic b) grows in size without impacting existing users c) is not as reliable as a small network d) offers limited number of applications 15. Refer to the exhibit. Which set of devices contains only intermediary devices? a) A, B, D, G b) A, B, E, F c) C, D, G, I d) G, H, I, J 16. What type of communication will send a message to all devices on a local area network? a) broadcast b) multicast c) unicast d) allcast 17. What process is used to place one message inside another message for transfer from the source to the destination? a) access control b) decoding c) encapsulation d) flow control 18. A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission? a) HTTP, IP, TCP, Ethernet b) HTTP, TCP, IP, Ethernet c) Ethernet, TCP, IP, HTTP d) Ethernet, IP, TCP, HTTP 19. Which statement is correct about network protocols? PAGE 3 OF 4 a) Network protocols define the type of hardware that is used and how it is mounted in racks. b) They define how messages are exchanged between the source and the destination. c) They all function in the network access layer of TCP/IP. d) They are only required for exchange of messages between devices on remote networks. 20. What is an advantage of using standards to develop and implement protocols? a) A particular protocol can only be implemented by one manufacturer. b) Products from different manufacturers can interoperate successfully. c) Different manufacturers are free to apply different requirements when implementing a protocol. d) Standards provide flexibility for manufacturers to create devices that comply with unique requirements. 21. Which three layers of the OSI model are comparable in function to the application layer of the TCP/IP model? (Choose three.) a) Application b) physical c) network d) presentation e) session f) transport g) data link 22. At which layer of the OSI model would an IP address be encapsulated? a) physical layer b) data link layer c) network layer d) transport layer 23. Which PDU is processed when a host computer is de-encapsulating a message at the transport layer of the TCP/IP model? a) bits b) frame c) packet d) segment 24. What is a function of Layer 4 of the OSI model? a) to specify the packet type to be used by the communications b) to apply framing information to the packet, based on the attached media c) to represent data to the user, including encoding and dialog control d) to describe the ordered and reliable delivery of data between source and destination 25. What is the general term that is used to describe a piece of data at any layer of a networking model? a) frame b) packet c) protocol data unit d) segment PAGE 4 OF 4

Use Quizgecko on...
Browser
Browser