Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? (Choose three.)
- easy to create
- lacks centralized administration
- less cost to implement
- 2. Which two statements describe intermediary devices? (Choose two.)
- Intermediary devices direct the path of the data.
- Intermediary devices connect individual hosts to the network.
- 3. What is the Internet?
- It provides connections through interconnected global networks.
- 4. Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?
- BYOD
- 5. Which statement describes the use of powerline networking technology?
- A device connects to an existing home LAN using an adapter and an existing electrical outlet.
- 6. Which statement describes a characteristic of cloud computing?
- Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world
- 7. An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
- an intranet
- 8. What two criteria are used to help select a network medium from various network media? (Choose two.)
- the distance the selected medium can successfully carry a signal
- the environment where the selected medium is to be installed
- 9. Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
- congestion
- 10. Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
- wireless LAN
- 11. A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two.)
- implementing a firewall
- installing antivirus software
- 12. Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
- DSL
- Cable
- 13. What are two functions of end devices on a network? (Choose two.)
- They originate the data that flows through the network.
- They are the interface between humans and the communication network.
- 14. What is a characteristic of a converged network?
- it delivers data, voice, and video over the same network infrastructure.
- 15. What are two functions of end devices on a network? (Choose two.)
- They originate the data that flows through the network.
- They are the interface between humans and the communication network.
- 16. What type of network traffic requires QoS?
- video conferencing
- 17. A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
- data confidentiality
- 18. What type of network must a home user access in order to do online shopping?
- The Internet
- 19. Which device performs the function of determining the path that messages should take through internetworks?
- a router
- 20. Match the description to the form of network communication. (Not all options are used.)
- podcast - an audio-based medium that allows people to deliver their recordings to a wide audience
- social media - interactive websites where people create and share user-generated content with friends and family
- wiki - web pages that groups of people can edit and view together
- instant messaging - real-time communication between two or more people
- 21. Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
- cellular
- satellite
- 22. What security violation would cause the most amount of damage to the life of a home user?
- capturing of personal data that leads to identity theft
- 23. Match the definition to the security goal. (Not all options are used
- ensuring confidentiality - only the intended recipients can access and read the data
- maintaining integrity - the assurance that the information has not been altered during transmission
- ensuring availability - the assurance of timely and reliable access to data
- 24. Match each characteristic to its corresponding Internet connectivity type
- DSL - high bandwidth connection that runs over telephone line
- Dialup Telephone - typically has very low bandwidth
- Satelite - not suited for heavily wooded areas
- Cable - uses coaxial cable as a medium
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement