, TESTBANK FOR Guide to Networking Essentials 9th Edition Tomsho
Important Notes
The file includes the complete test bank, organized chapter by chapter.
A sample of selected pages has been provided for preview.
All available appendices and Excel files (if included in the original resources) are
provided.
We continuously update our files to ensure you receive the latest and most accurate
editions.
New editions are added regularly – stay connected for updates!
✅ Why Buy From Us?
📚 Complete & organized chapter-by-chapter – no missing content, no guessing.
⚡ Instant digital delivery – get your file the moment you pay, no waiting.
📅 Always up to date – we track new editions so you always get the latest version.
💬 Friendly support – real humans ready to help, anytime you need us.
🔒 Safe & secure – thousands of satisfied students trust us every semester.
🛡️Our Guarantees
💰 Money-Back Guarantee: Not satisfied? We offer a full refund – no questions asked.
🔄 Wrong File? No Problem: Contact us and we will replace it immediately with the
correct version, free of charge.
⏰ 24/7 Support: We are always here – reach out anytime and expect a fast response.
Contact Email:
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Guide to Network Essentials
9th Edition
Question Bank – All Chapters
Cognero XML Export — Version 7
14 Chapters · 490 Questions · Multiple Choice & Multiple Response
Contents
• Chapter 1: Introduction to Computer Networks
• Chapter 2: Network Hardware Essentials
• Chapter 3: Network Topologies and Technologies
• Chapter 4: Network Media
• Chapter 5: Network Protocols
• Chapter 6: IP Addressing
• Chapter 7: Network Reference Models and Standards
• Chapter 8: Network Hardware in Depth
• Chapter 9: Introduction to Network Security
• Chapter 10: Wide Area Networking and Cloud Computing
• Chapter 11: Network Operating System Fundamentals
• Chapter 12: Network Management and Administration
• Chapter 13: The Internet of Things (IoT)
• Chapter 14: Troubleshooting and Support
Page 1 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Page 2 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Chapter 10: Wide Area Networking and Cloud
Computing
Multiple Choice
Q1. What are the requirements for a network to qualify as a wide area network (WAN)?
■ A. two or more connected LANs in the same building
■ B. a single office with one router connected to the Internet
✓ C. carriers or service providers must be used for connections across office locations
■ D. connections between offices that are in close proximity, but not in the same building
Rationale:
The company must use carriers or service providers for connections across office locations.
Multiple Response (select all that apply)
Q2. What protocol layers are unaware if data is traveling over a WAN connection across thousands of
miles or a 1 GB Ethernet connection across the room? Choose all that apply.
■ A. Transport
✓ B. Network
✓ C. Application
■ D. Session
Rationale:
Network and Application layers are unaware if data is traveling over a WAN connection across thousands of miles
or over a 1 GB Ethernet connection across the room.
Multiple Response (select all that apply)
Q3. What type of devices are likely to be used in WANs for media access, signal transmissions and
reception, and connections, and connecting a WAN to a LAN? Choose all that apply.
✓ A. modems
✓ B. channel service units/data service units
■ C. switches
✓ D. routers
■ E. hubs
Rationale:
Several types of devices are commonly used in WANs for media access, signal transmission and reception, and for
connecting a WAN to a LAN and include modems, channel service units/data service units, and routers.
Multiple Choice
Q4. How are cable Internet and DSL signals transmitted?
■ A. digital carrier waves
✓ B. analog carrier waves
■ C. modulating carrier waves
■ D. demodulating carrier waves
Rationale:
Even though cable Internet and DSL signals provide digital data, the digital signals are still transmitted by using
analog carrier waves.
Multiple Choice
Q5. What is the function of a CSU/DSU?
Page 3 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
■ A. It creates an analog connection between a LAN device, such as a router, and the WAN link from
the service provider.
✓ B. It creates a digital connection between a LAN device, such as a router, and the WAN link
from the service provider.
■ C. It converts analog signals into digital signals.
■ D. It connects routers to switches.
Rationale:
A channel service unit/data service unit (CSU/DSU) is a device (actually two devices that are usually combined)
that creates a digital connection between a LAN device, such as a router, and the WAN link from the service
provider. The WAN link is usually a T-carrier technology, such as T1 or T3.
Multiple Response (select all that apply)
Q6. What is the difference between an analog signal and a digital signal? Choose all that apply.
✓ A. An analog signal is a signal that varies over time continually and smoothly.
■ B. A digital signal is a signal that varies over time continually and smoothly.
■ C. An analog signal is 0v or 5v (with no value used between the two).
✓ D. A digital signal is 0v or 5v (with no value used between the two).
Rationale:
A digital signal works like a light bulb with a standard switch: it can be off, giving no light, or fully on, shining at
maximum brightness. An analog signal, on the other hand, is like a light bulb with a dimmer switch. It provides a
smooth range of brightness from off to fully on, with varying levels in between. Another example is the difference
between listening to a vinyl record and a digital download. Vinyl records are analog and capture all sound
frequencies. By contrast, digital recordings cut off some high and low frequencies. This is why music aficionados
favor listening to music on vinyl.
Multiple Response (select all that apply)
Q7. In what critical areas do WANs differ from internetworks? Choose all that apply.
✓ A. WANs use the services of carriers or service providers, such as phone companies and
ISPs for network connections.
■ B. WANs use communication technologies that can span distances measured in hundreds of
meters.
✓ C. Internetworks are confined to a building or campus where the internetworks owner owns
and operates all the technology.
■ D. LANs use serial communication technologies that can span distances measured in miles.
Rationale:
WANs use the services of carriers or service providers, such as phone companies and ISPs, for network
connections, whereas internetworks are confined to a building or campus where the internetworks owner owns and
operates all the technology.
Multiple Choice
Q8. What is the function of a circuit-switched WAN?
■ A. It creates a permanently dedicated connection between the sender and receiver.
✓ B. It creates a temporary dedicated connection on demand between the sender and receiver.
■ C. It creates a semi-permanent dedicated connection between the sender and receiver.
■ D. It creates a connection between the sender and the Plain Old Telephone Service side of the
connection.
Rationale:
A circuit-switched WAN establishes a temporary dedicated connection on demand between the sender and
receiver.
Multiple Choice
Page 4 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Q9. What is the purpose of a leased line?
■ A. A leased line provides a temporary point-to-point connection from the customer's LAN through
the provider's network and to the destination network. It provides temporary, secure, and dedicated
bandwidth.
■ B. A leased line provides a dedicated point-to-multipoint connection from the customer's LAN
through the provider's network and to the destination network. It provides secure and dedicated
bandwidth.
✓ C. A leased line provides a dedicated point-to-point connection from the customer's LAN
through the provider's network and to the destination network. It provides permanent, secure,
and dedicated bandwidth.
■ D. A leased line provides a temporary point-to-multipoint connection from the customer's LAN
through the provider's network and to the destination network. It provides secure and dedicated
bandwidth.
Rationale:
A leased line offers a dedicated point-to-point connection that links the customer's local area network (LAN) to the
destination network via the provider's infrastructure. This connection provides permanent, secure, and exclusive
bandwidth, which is constrained only by the provider's technology and the amount that the customer is willing to
invest. Essentially, customers rent this network connection.
Multiple Choice
Q10. What led to the development of T-Carriers?
■ A. The government decided it was important for multiple phone conversations to be sent over the
same pair of wires over long distances so it would be simpler for wiretapping purposes.
■ B. Pacific Bell wanted to be able to carry multiple phone conversations over the same pair of wires
and over longer distances.
■ C. Verizon wanted to be able to carry multiple phone conversations over the same pair of wires and
over longer distances.
✓ D. AT&T; wanted to be able to carry multiple phone conversations over the same pair of
wires and over longer distances.
Rationale:
T-carriers originated when the dominant phone company at the time, AT&T;, wanted to be able to carry multiple
phone conversations over the same pair of wires and over longer distances. By digitizing voice data and organizing
phone conversations into time slots on the media, AT&T; accomplished its goal, and the T-carrier technology was
born.
Multiple Choice
Q11. How does the signaling method time division multiplexing (TDM) work?
■ A. All channels work on the same time slot regardless of the number of channels for a particular
purpose.
✓ B. It allocates a time slot for each channel, making it possible to extract any number of
channels for a particular purpose.
■ C. There is a maximum number of channels that can be used at any one time.
■ D. All channels can only be used for a single purpose.
Rationale:
Time division multiplexing (TDM) allocates a time slot for each channel, which makes it possible to extract any
number of channels for a particular purpose.
Multiple Choice
Q12. What does the term fractionalized mean?
Page 5 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
✓ A. Fractionalization means that a portion of a T-carrier line is used for one purpose and a
different portion for another purpose.
■ B. Fractionalization means that each T-carrier line is used to send data and a different DSL line is
used to receive data.
■ C. Fractionalization means that you can rent one channel and sublet another channel to another
company.
■ D. Fractionalization means that 24 64-Kbps channels can be turned into 64 24-Kbps channels.
Rationale:
Fractionalization means that a portion of a T-carrier line is used for one purpose and a different portion for another
purpose. For example, a T1 line can be fractionalized to use half the channels for a teleconferencing application
and the other half for other network traffic traveling the WAN.
Multiple Response (select all that apply)
Q13. Dagwood is interested in using Synchronous Optical Network (SONET). There are many
reasons for this, including that it is extremely flexible. What makes SONET so flexible? Choose all
that apply.
■ A. It's low cost.
✓ B. It can work with ATM.
✓ C. It can work with T-carrier.
✓ D. It can be arranged in a variety of physical topologies.
Rationale:
SONET is very flexible, which is one of its biggest advantages. It can carry different types of traffic, such as
T-carrier and ATM, by using multiplexing techniques. SONET can also be set up in various physical layouts,
including point-to-point, point-to-multipoint, star, and ring.
Multiple Choice
Q14. Which protocol is most effective for WAN connections that require authentication and IP
address assignments?
✓ A. Point-to-Point Protocol (PPP)
■ B. Asynchronous Transfer Mode (ATM)
■ C. Point-to-Point Tunneling Protocol (PPTP)
■ D. Sequential Point Exchange Protocol (SPEP)
Rationale:
Point-to-Point Protocol (PPP) connects computers over networks such as leased lines and ISDN. It operates at the
Data Link and Network layers. PPP offers features such as authentication and IP address assignment while
supporting protocols such as TCP/IPv4 and TCP/IPv6.
Multiple Response (select all that apply)
Q15. What are some of the protocols that can be used when creating a VPN in Windows? Choose all
that apply.
■ A. ATM
✓ B. PPTP
✓ C. L2TP
✓ D. SSTP
Rationale:
When a VPN is set up in Windows, there is the option of using PPTP, L2TP, or SSTP protocols.
Multiple Response (select all that apply)
Q16. What is required to use a VPN through a web browser on the desktop? Choose all that apply.
■ A. installation of the Edge APIs
Page 6 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
✓ B. installation of a client component
✓ C. installation of an online service, such as LogMeIn or GoToMyPC
■ D. installation of the Safari APIs
Rationale:
Many online services, such as LogMeIn and GoToMyPC, allow users to connect a web browser to their desktop.
After installing a client component, users can log in to access their computer's desktop through the web browser.
Multiple Choice
Q17. What Microsoft solution allows remote access via Secure Sockets Layer (SSL)?
■ A. Virtual Desktop Infrastructure
■ B. Remote Desktop Protocol
✓ C. Remote Desktop Gateway
■ D. Virtual Network Computing
Rationale:
Microsoft has a solution called Remote Desktop Gateway that allows remote desktop connections via Secure
Sockets Layer (SSL), the protocol that secures communication between Web browsers and Web servers.
Multiple Choice
Q18. What is considered a standard method for remote access connections because it creates a
reliable secure connection?
■ A. ATM
■ B. PPPT
■ C. LAN
✓ D. VPN
Rationale:
VPNs are the standard method for remote access connections because they create a reliable secure connection
between a client device, such as a laptop, and a remote company network using an available Internet connection.
Multiple Choice
Q19. Why would a company add a remote access server configuration to the company's LAN?
✓ A. The company network can be accessed via VPN with any type of Internet connection.
■ B. The company can keep a handle on employees who should or should not have access to the
internal network.
■ C. It could save the company money on phone charges.
■ D. It protects the company from liability when an employee is offboarded.
Rationale:
With a remote access server configured on the LAN, users can connect to the company network via a VPN with any
type of Internet connection. After the remote access connection is established, the remotely connected computer
acts as if it were connected directly to the network.
Multiple Response (select all that apply)
Q20. What other authentication options might be necessary to connect to third party VPN server?
Choose all that apply.
✓ A. smart card
✓ B. one-time password
✓ C. certificates
■ D. biometrics
Rationale:
Page 7 of 127
, Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Connecting to third-party VPN servers may require additional authentication methods, such as smart cards,
one-time passwords, or certificates.
Multiple Response (select all that apply)
Q21. Which cloud providers provide virtual desktop interfacing? Choose all that apply.
■ A. Nimbus Cloud
✓ B. Google Cloud
✓ C. Microsoft Azure
✓ D. Amazon Web Services
Rationale:
Leading cloud providers like Microsoft Azure, Google Cloud, and Amazon Web Services offer services that allow
access to remote network resources. A common method for accessing these resources involves connecting to a
virtual machine located either in the company's data center or in the data center of a cloud provider, which has a
secure connection to your company network.
Multiple Choice
Q22. Dabney lives 100 miles away from his in-laws, who often encounter problems with their
computers. To assist them more easily, he has decided to set up a VPN. This will enable him to log
into their computers and fix any issues they might encounter. What type of VPN service would best
suit this situation?
■ A. RDP
■ B. Remote Desktop Gateway
✓ C. GoToMyPC
■ D. VNC
Rationale:
GoToMyPC, like LogMeIn, is one of the best VPNs for this scenario because it offers several authentication
methods for both the host and client that other types of VPNs do not provide, and no VPN server is required to use
them.
Multiple Choice
Q23. What is cloud computing?
■ A. Cloud computing is used for making backups on individual computers.
■ B. Cloud computing is how the Internet creates data.
✓ C. Cloud computing is a way to access data, applications, and processing power over the
Internet. Instead of buying hardware and software, users pay for what they use.
■ D. Cloud computing is network storage.
Rationale:
Cloud computing is a networking model in which data, applications, and processing power are managed by servers
on the Internet, and users of these resources pay for what they use rather than for the equipment and software
needed to provide resources.
Multiple Response (select all that apply)
Q24. What are some benefits of cloud computing? Choose all that apply.
✓ A. reduced physical plant costs
■ B. better data privacy
✓ C. reduced upfront costs
✓ D. reduced personnel costs
Rationale:
Some of the benefits of cloud computing include reduced physical plant costs, reduced upfront costs, and reduced
personnel costs. However, data privacy can be a big concern.
Page 8 of 127
Important Notes
The file includes the complete test bank, organized chapter by chapter.
A sample of selected pages has been provided for preview.
All available appendices and Excel files (if included in the original resources) are
provided.
We continuously update our files to ensure you receive the latest and most accurate
editions.
New editions are added regularly – stay connected for updates!
✅ Why Buy From Us?
📚 Complete & organized chapter-by-chapter – no missing content, no guessing.
⚡ Instant digital delivery – get your file the moment you pay, no waiting.
📅 Always up to date – we track new editions so you always get the latest version.
💬 Friendly support – real humans ready to help, anytime you need us.
🔒 Safe & secure – thousands of satisfied students trust us every semester.
🛡️Our Guarantees
💰 Money-Back Guarantee: Not satisfied? We offer a full refund – no questions asked.
🔄 Wrong File? No Problem: Contact us and we will replace it immediately with the
correct version, free of charge.
⏰ 24/7 Support: We are always here – reach out anytime and expect a fast response.
Contact Email:
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Guide to Network Essentials
9th Edition
Question Bank – All Chapters
Cognero XML Export — Version 7
14 Chapters · 490 Questions · Multiple Choice & Multiple Response
Contents
• Chapter 1: Introduction to Computer Networks
• Chapter 2: Network Hardware Essentials
• Chapter 3: Network Topologies and Technologies
• Chapter 4: Network Media
• Chapter 5: Network Protocols
• Chapter 6: IP Addressing
• Chapter 7: Network Reference Models and Standards
• Chapter 8: Network Hardware in Depth
• Chapter 9: Introduction to Network Security
• Chapter 10: Wide Area Networking and Cloud Computing
• Chapter 11: Network Operating System Fundamentals
• Chapter 12: Network Management and Administration
• Chapter 13: The Internet of Things (IoT)
• Chapter 14: Troubleshooting and Support
Page 1 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Page 2 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Chapter 10: Wide Area Networking and Cloud
Computing
Multiple Choice
Q1. What are the requirements for a network to qualify as a wide area network (WAN)?
■ A. two or more connected LANs in the same building
■ B. a single office with one router connected to the Internet
✓ C. carriers or service providers must be used for connections across office locations
■ D. connections between offices that are in close proximity, but not in the same building
Rationale:
The company must use carriers or service providers for connections across office locations.
Multiple Response (select all that apply)
Q2. What protocol layers are unaware if data is traveling over a WAN connection across thousands of
miles or a 1 GB Ethernet connection across the room? Choose all that apply.
■ A. Transport
✓ B. Network
✓ C. Application
■ D. Session
Rationale:
Network and Application layers are unaware if data is traveling over a WAN connection across thousands of miles
or over a 1 GB Ethernet connection across the room.
Multiple Response (select all that apply)
Q3. What type of devices are likely to be used in WANs for media access, signal transmissions and
reception, and connections, and connecting a WAN to a LAN? Choose all that apply.
✓ A. modems
✓ B. channel service units/data service units
■ C. switches
✓ D. routers
■ E. hubs
Rationale:
Several types of devices are commonly used in WANs for media access, signal transmission and reception, and for
connecting a WAN to a LAN and include modems, channel service units/data service units, and routers.
Multiple Choice
Q4. How are cable Internet and DSL signals transmitted?
■ A. digital carrier waves
✓ B. analog carrier waves
■ C. modulating carrier waves
■ D. demodulating carrier waves
Rationale:
Even though cable Internet and DSL signals provide digital data, the digital signals are still transmitted by using
analog carrier waves.
Multiple Choice
Q5. What is the function of a CSU/DSU?
Page 3 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
■ A. It creates an analog connection between a LAN device, such as a router, and the WAN link from
the service provider.
✓ B. It creates a digital connection between a LAN device, such as a router, and the WAN link
from the service provider.
■ C. It converts analog signals into digital signals.
■ D. It connects routers to switches.
Rationale:
A channel service unit/data service unit (CSU/DSU) is a device (actually two devices that are usually combined)
that creates a digital connection between a LAN device, such as a router, and the WAN link from the service
provider. The WAN link is usually a T-carrier technology, such as T1 or T3.
Multiple Response (select all that apply)
Q6. What is the difference between an analog signal and a digital signal? Choose all that apply.
✓ A. An analog signal is a signal that varies over time continually and smoothly.
■ B. A digital signal is a signal that varies over time continually and smoothly.
■ C. An analog signal is 0v or 5v (with no value used between the two).
✓ D. A digital signal is 0v or 5v (with no value used between the two).
Rationale:
A digital signal works like a light bulb with a standard switch: it can be off, giving no light, or fully on, shining at
maximum brightness. An analog signal, on the other hand, is like a light bulb with a dimmer switch. It provides a
smooth range of brightness from off to fully on, with varying levels in between. Another example is the difference
between listening to a vinyl record and a digital download. Vinyl records are analog and capture all sound
frequencies. By contrast, digital recordings cut off some high and low frequencies. This is why music aficionados
favor listening to music on vinyl.
Multiple Response (select all that apply)
Q7. In what critical areas do WANs differ from internetworks? Choose all that apply.
✓ A. WANs use the services of carriers or service providers, such as phone companies and
ISPs for network connections.
■ B. WANs use communication technologies that can span distances measured in hundreds of
meters.
✓ C. Internetworks are confined to a building or campus where the internetworks owner owns
and operates all the technology.
■ D. LANs use serial communication technologies that can span distances measured in miles.
Rationale:
WANs use the services of carriers or service providers, such as phone companies and ISPs, for network
connections, whereas internetworks are confined to a building or campus where the internetworks owner owns and
operates all the technology.
Multiple Choice
Q8. What is the function of a circuit-switched WAN?
■ A. It creates a permanently dedicated connection between the sender and receiver.
✓ B. It creates a temporary dedicated connection on demand between the sender and receiver.
■ C. It creates a semi-permanent dedicated connection between the sender and receiver.
■ D. It creates a connection between the sender and the Plain Old Telephone Service side of the
connection.
Rationale:
A circuit-switched WAN establishes a temporary dedicated connection on demand between the sender and
receiver.
Multiple Choice
Page 4 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Q9. What is the purpose of a leased line?
■ A. A leased line provides a temporary point-to-point connection from the customer's LAN through
the provider's network and to the destination network. It provides temporary, secure, and dedicated
bandwidth.
■ B. A leased line provides a dedicated point-to-multipoint connection from the customer's LAN
through the provider's network and to the destination network. It provides secure and dedicated
bandwidth.
✓ C. A leased line provides a dedicated point-to-point connection from the customer's LAN
through the provider's network and to the destination network. It provides permanent, secure,
and dedicated bandwidth.
■ D. A leased line provides a temporary point-to-multipoint connection from the customer's LAN
through the provider's network and to the destination network. It provides secure and dedicated
bandwidth.
Rationale:
A leased line offers a dedicated point-to-point connection that links the customer's local area network (LAN) to the
destination network via the provider's infrastructure. This connection provides permanent, secure, and exclusive
bandwidth, which is constrained only by the provider's technology and the amount that the customer is willing to
invest. Essentially, customers rent this network connection.
Multiple Choice
Q10. What led to the development of T-Carriers?
■ A. The government decided it was important for multiple phone conversations to be sent over the
same pair of wires over long distances so it would be simpler for wiretapping purposes.
■ B. Pacific Bell wanted to be able to carry multiple phone conversations over the same pair of wires
and over longer distances.
■ C. Verizon wanted to be able to carry multiple phone conversations over the same pair of wires and
over longer distances.
✓ D. AT&T; wanted to be able to carry multiple phone conversations over the same pair of
wires and over longer distances.
Rationale:
T-carriers originated when the dominant phone company at the time, AT&T;, wanted to be able to carry multiple
phone conversations over the same pair of wires and over longer distances. By digitizing voice data and organizing
phone conversations into time slots on the media, AT&T; accomplished its goal, and the T-carrier technology was
born.
Multiple Choice
Q11. How does the signaling method time division multiplexing (TDM) work?
■ A. All channels work on the same time slot regardless of the number of channels for a particular
purpose.
✓ B. It allocates a time slot for each channel, making it possible to extract any number of
channels for a particular purpose.
■ C. There is a maximum number of channels that can be used at any one time.
■ D. All channels can only be used for a single purpose.
Rationale:
Time division multiplexing (TDM) allocates a time slot for each channel, which makes it possible to extract any
number of channels for a particular purpose.
Multiple Choice
Q12. What does the term fractionalized mean?
Page 5 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
✓ A. Fractionalization means that a portion of a T-carrier line is used for one purpose and a
different portion for another purpose.
■ B. Fractionalization means that each T-carrier line is used to send data and a different DSL line is
used to receive data.
■ C. Fractionalization means that you can rent one channel and sublet another channel to another
company.
■ D. Fractionalization means that 24 64-Kbps channels can be turned into 64 24-Kbps channels.
Rationale:
Fractionalization means that a portion of a T-carrier line is used for one purpose and a different portion for another
purpose. For example, a T1 line can be fractionalized to use half the channels for a teleconferencing application
and the other half for other network traffic traveling the WAN.
Multiple Response (select all that apply)
Q13. Dagwood is interested in using Synchronous Optical Network (SONET). There are many
reasons for this, including that it is extremely flexible. What makes SONET so flexible? Choose all
that apply.
■ A. It's low cost.
✓ B. It can work with ATM.
✓ C. It can work with T-carrier.
✓ D. It can be arranged in a variety of physical topologies.
Rationale:
SONET is very flexible, which is one of its biggest advantages. It can carry different types of traffic, such as
T-carrier and ATM, by using multiplexing techniques. SONET can also be set up in various physical layouts,
including point-to-point, point-to-multipoint, star, and ring.
Multiple Choice
Q14. Which protocol is most effective for WAN connections that require authentication and IP
address assignments?
✓ A. Point-to-Point Protocol (PPP)
■ B. Asynchronous Transfer Mode (ATM)
■ C. Point-to-Point Tunneling Protocol (PPTP)
■ D. Sequential Point Exchange Protocol (SPEP)
Rationale:
Point-to-Point Protocol (PPP) connects computers over networks such as leased lines and ISDN. It operates at the
Data Link and Network layers. PPP offers features such as authentication and IP address assignment while
supporting protocols such as TCP/IPv4 and TCP/IPv6.
Multiple Response (select all that apply)
Q15. What are some of the protocols that can be used when creating a VPN in Windows? Choose all
that apply.
■ A. ATM
✓ B. PPTP
✓ C. L2TP
✓ D. SSTP
Rationale:
When a VPN is set up in Windows, there is the option of using PPTP, L2TP, or SSTP protocols.
Multiple Response (select all that apply)
Q16. What is required to use a VPN through a web browser on the desktop? Choose all that apply.
■ A. installation of the Edge APIs
Page 6 of 127
,Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
✓ B. installation of a client component
✓ C. installation of an online service, such as LogMeIn or GoToMyPC
■ D. installation of the Safari APIs
Rationale:
Many online services, such as LogMeIn and GoToMyPC, allow users to connect a web browser to their desktop.
After installing a client component, users can log in to access their computer's desktop through the web browser.
Multiple Choice
Q17. What Microsoft solution allows remote access via Secure Sockets Layer (SSL)?
■ A. Virtual Desktop Infrastructure
■ B. Remote Desktop Protocol
✓ C. Remote Desktop Gateway
■ D. Virtual Network Computing
Rationale:
Microsoft has a solution called Remote Desktop Gateway that allows remote desktop connections via Secure
Sockets Layer (SSL), the protocol that secures communication between Web browsers and Web servers.
Multiple Choice
Q18. What is considered a standard method for remote access connections because it creates a
reliable secure connection?
■ A. ATM
■ B. PPPT
■ C. LAN
✓ D. VPN
Rationale:
VPNs are the standard method for remote access connections because they create a reliable secure connection
between a client device, such as a laptop, and a remote company network using an available Internet connection.
Multiple Choice
Q19. Why would a company add a remote access server configuration to the company's LAN?
✓ A. The company network can be accessed via VPN with any type of Internet connection.
■ B. The company can keep a handle on employees who should or should not have access to the
internal network.
■ C. It could save the company money on phone charges.
■ D. It protects the company from liability when an employee is offboarded.
Rationale:
With a remote access server configured on the LAN, users can connect to the company network via a VPN with any
type of Internet connection. After the remote access connection is established, the remotely connected computer
acts as if it were connected directly to the network.
Multiple Response (select all that apply)
Q20. What other authentication options might be necessary to connect to third party VPN server?
Choose all that apply.
✓ A. smart card
✓ B. one-time password
✓ C. certificates
■ D. biometrics
Rationale:
Page 7 of 127
, Tomsho – Guide to Network Essentials, 9e | Question Bank Cognero XML – Version 7
Connecting to third-party VPN servers may require additional authentication methods, such as smart cards,
one-time passwords, or certificates.
Multiple Response (select all that apply)
Q21. Which cloud providers provide virtual desktop interfacing? Choose all that apply.
■ A. Nimbus Cloud
✓ B. Google Cloud
✓ C. Microsoft Azure
✓ D. Amazon Web Services
Rationale:
Leading cloud providers like Microsoft Azure, Google Cloud, and Amazon Web Services offer services that allow
access to remote network resources. A common method for accessing these resources involves connecting to a
virtual machine located either in the company's data center or in the data center of a cloud provider, which has a
secure connection to your company network.
Multiple Choice
Q22. Dabney lives 100 miles away from his in-laws, who often encounter problems with their
computers. To assist them more easily, he has decided to set up a VPN. This will enable him to log
into their computers and fix any issues they might encounter. What type of VPN service would best
suit this situation?
■ A. RDP
■ B. Remote Desktop Gateway
✓ C. GoToMyPC
■ D. VNC
Rationale:
GoToMyPC, like LogMeIn, is one of the best VPNs for this scenario because it offers several authentication
methods for both the host and client that other types of VPNs do not provide, and no VPN server is required to use
them.
Multiple Choice
Q23. What is cloud computing?
■ A. Cloud computing is used for making backups on individual computers.
■ B. Cloud computing is how the Internet creates data.
✓ C. Cloud computing is a way to access data, applications, and processing power over the
Internet. Instead of buying hardware and software, users pay for what they use.
■ D. Cloud computing is network storage.
Rationale:
Cloud computing is a networking model in which data, applications, and processing power are managed by servers
on the Internet, and users of these resources pay for what they use rather than for the equipment and software
needed to provide resources.
Multiple Response (select all that apply)
Q24. What are some benefits of cloud computing? Choose all that apply.
✓ A. reduced physical plant costs
■ B. better data privacy
✓ C. reduced upfront costs
✓ D. reduced personnel costs
Rationale:
Some of the benefits of cloud computing include reduced physical plant costs, reduced upfront costs, and reduced
personnel costs. However, data privacy can be a big concern.
Page 8 of 127