21 questions
A 1.____________ and 2._______________ are similar computer network components that connect multiple devices in a computer network.
1. network interface card & 2. hub
1. network interface card & 2. gateway
1. switch & 2. gateway
1. switch & 2. hub
1. repeater & 2. bridge
Hardy doesn’t have access to a file that is on the network server. What should he do?
Hardy can ask the administrator for __________ to the file.
whaccess
access
snacks
snaccess
The managing director of a company sends a Christmas greeting to all his employees through the company email. Which type of network does he use?
He uses an _________.
internet
intranet
extranet
introvert
What function does a security certificate perform?
creates user accounts
scrambles data
identifies users
creates password policies
provides file access
What is most important for you to choose before you build a network?
private network
NOS
network media
network protocol
directory service
Which type of network is the Internet?
The Internet is an example of a ______ network.
WLAN
LAN
WAN
PAM
A corporate office has a huge number of employees. Every employee has a telephone next to their computer so that they can call other employees in the same office regarding official work. The caller has to dial a particular extension number so that the intended receiver gets the call. Which telephone network is used in this office?
In a ______________ telephone network, the caller has to dial an extension number so that the intended receiver gets the call.
public
private
corporate
personal
A group of students want to create an educational online game for a computer laboratory in their school. Which type of network will they use for this purpose?
LAN
WAN
PAN
MAN
WLAN
A university wants to install a client-server network. Which feature do you think is important for them as they set up the network? (choose more than one)
sending email
blocking multiple people to use the same file
low security
low set up cost
limited access to files
Match the feature to the network architecture.
(choose more than one)
Client-Server Network
does not have a central server
easy to track files
has a central server
useful for a large organization
expensive to set up
Match the feature to the network architecture.
(choose more than one)
Peer-to-Peer Network
useful for a small organization
inexpensive to set up
difficult to track files
does not have a central server
has a central server
David uses an online banking account to make an online payment. However, the transaction takes too long to process and, after a while, the request times out. Which OSI layer was responsible for the timeout?
_________________ was responsible for the timeout.
the session layer
the data link layer
the transport layer
the application layer
Which layer subdivides further into the MAC and LLC layers?
The __________________ further subdivides into the MAC and LLC layers.
data link layer
session layer
network layer
presentation layer
Which statements are true about the OSI reference model? (choose more than one)
The OSI model developed in the 1970s and 1980s.
OSI stands for Open Systems Interface.
OSI developed as two independent projects.
The OSI reference model consists of seven layers
A layer can communicate with the layer above and below it.
What is the benefit of the OSI model?
guarantees that every device has a unique address
allows different devices to communicate
creates region-specific devices
separates error handling from the OSI model
allows only devices of the same type to communicate
Client applications used the SDP (sockets direct protocol) to initiate and run connections. Which layer of the OSI reference model uses this protocol?
application layer
network layer
presentation layer
session layer
transport layer
Who can prevent unauthorized users from accessing data resources and how?
A 1.____________ can prevent unauthorized users from accessing data resources with the help of 2.__________ that filter traffic.
1. twisted pair cable & 2. firewalls
1. twisted pair cable & 2. IDSes
1. DNS configuration & 2. firewalls
1. DNS configuration & 2. cables
1. network administrator & 2. firewalls
In which type of network attack do you track the network traffic?
How do you protect the network from such an attack?
A hacker was unsuccessful in his 1._______________ attack, where he tried to track the traffic of a banking network. This attack was unsuccessful because the network had 2.____________________ protocols.
1. sniffing & 2. unsecured
1. sniffing & 2. secured
1. spoofing & 2. decrypted
1. hijacking & 2. secured
1. spoofing & 2. secured
Jack is an accountant. He can’t access the spreadsheet software that is installed on the server. What should Jack do?
Jack should _______ the server and check to see if it has crashed.
bounce
ping
pong
query
load
The employees of a company are facing an issue where it takes a lot of time to access the files stored on a server. What do you think is the cause of this issue?
computer memory is full
software problem
computers are not drawing power from the outlet
network security is bad
network card is locked in transmit mode
Which of these attack methods involves social engineering techniques?
hijacking
DDoS
phishing
spoofing
DoS