Pre-Test Review
,IMAP can allow a user with multiple devices to - access their emails simultaneously from any devices.
Redundancy in a network is necessary - to ensure throughput and connectivity through multiple nodes and pathways.
In the SMTP server to server set up, the email clients serve to – Receive/Send and queue messages between SMTP servers and
clients.
The OSI Model is used to – describe how communications happen across a network.
Which layer is the network layer in the OSI 7 layer model – 3
In the OSI model, all of the following are protocols of the application layer except: - ICANN
Which of the following is NOT one of the seven layers of the OSI Model? – Domain Layer
Which protocol below is used to format most data packets for transmission over the Internet? – TCP/IP
In MPLS switching the routing decision is made – by the first routing device and forms the predefined path for subsequent
routers.
Ethernet usually permits each node in the network to transmit data packets at any time which can cause – Data collision
What is the backbone network – a high-capacity connectivity infrastructure that forms the main link to the different sub
networks connected to it
A Serial backbone network cannot be applied at enterprise level due to its high susceptibility to faults.
What is Simplex mode of communication? – Only one sender and receiver
Which of these is an advantage of time multiplexing with regard to resource monopolization? – Ensures fair use of the resource
What part of an optical fiber cable reflects light back into the core as the cable bends? - Cladding
If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use? - A full
mesh design
What type of bit is used with an asynchronous transmission to signal the beginning and end of a byte of data? – Control
A data measurement unit that contains 8 bits of information is known as which of the following? - Byte
-----is NOT a type of server – Redundant power supply server
A specially built server: - is built with redundant power supplies to maintain constant availability
Science and engineering orbital data are made accessible to the general public by use of the _____ - Internet-to-orbit
Which of the following is FALSE about LAN cards? – A computer can only have one LAN card.
What is required for a VPN to function correctly? – Encryption and authentication protocols
A computer can be accessed over the Internet via a host name or _____which is a unique numerical sequence assigned to a
machine on a network. – IP address
An IPv4 Address is how many bits in length? – 32 bits
What access method works best over mobile connections? – Mosh
A remote employee needs to be able to access corporate email and file sharing but doesn’t necessarily have a lot of technical
knowledge. – VPN
Why is Telnet discouraged as an access method? – Telnet is unsecure
Which internet protocol is responsible for re transmitting lost or erroneous data packets? – TCP
,In a company setup where users are required to work from home when needed, what is the best address translation? – Static
NAT
How do signals travel between a GPS satellite and on-the-ground GPS receiver? – Only from the satellite to the receiver
The 802.11n Protocol makes use of _____technology: - Multiple Input/Multiple Output (MIMO)
Relative to other technologies such as Bluetooth, WiFi and cellular, Zigbee provides wireless communication that provided
_____. – Lower cost and longer battery life.
Which of the following wireless communication technologies does not travel through walls and needs line-of-sight to
communicate? - Infrared
The latest video compression format is_____- H.264
PSTN stands for: - Public Switched Telephone Network
MPLS makes use of _____to make a faster and more efficient network. – Short path labels
Which acronym refers to the network name that your router broadcasts so you can find it? – SSID
What is the maximum number of zones that can be associated to a firewall? – Firewalls can have many zones associated to
them.
A firewall can be used to direct and control traffic _____. – both coming in and going out of your network
Which describes the best attitude about network names? – Never mention either the router name or the tech company that
built it.
The internet is an example of a _____ _____ Network. – Wide Area
A single point of failure (SPF) is _____. – a lone link in a network that can bring down the whole network if it fails
What does the acronym P2P stand for in the context of computer network architecture? – Peer-to-Peer
Computer networks allow users to share: - printers
The _____mail command starts the process of sending sequential lines of texts with the message – 354
The transport layer performs error checking, data packet creation and what other types of service? – Packet routing
SD-WAN is best used for which task? - Connecting branches to the cloud
Which of the following is/are true? - Wireless Access Points connect devices that have WI-FI or Bluetooth connectivity.
Which of the following statements is true? - Authoritative name servers respond to queries from recursive name servers
Which network topology uses concentration routers to interconnect star network WANs? - Tiered topology
A PCMCIA LAN card typically goes where? - Inside a laptop
Which of the following is NOT true with respect to a band pass filter? - The band pass filter is present at the sender's side.
POP is within what layer of the OSI Model? - layer 7
In order to check the nodes that are connected to a system, one can use the command – netstat
When Elliot plants malicious code on a corporate computer that will destroy files he is considered a _____. – cracker
What type of standards are built by the officials and network professionals in organizations? - Formal standards
Which computer network, built by a business, is used to to interconnect its various company sites in order to share computer
resources? – EPN
, What are the reasons for the degradation of a wireless signal? – Reflection, Diffraction, Scattering
Which two protocols are NOT backward compatible? - 802.11a Protocol 802.11b
What is the approximate distance between devices when establishing a connection using short-range wireless
communication? - From a few centimeters to several meters
IP Addresses operate within the _____ layer of the TCP/IP protocol. - Network Layer
Four types of WAN topologies are _____ - Mesh, star, ring, bus topologies
Which of the following is a transmission mode that transmits in two directions, but only in one direction at a time? –
Asynchronous
Which one of the communication channels allows for data to be sent and received in both directions, but not at the same
time? - Half-duplex
One of the other protocols that works along with POP is SMTP, which stands for: - Simple Mail Transport Protocol
In star-wired ring hybrid topology, a failure in one of the nodes of the main ring topology can lead to a breakdown of the
entire hybrid network. What can be done to ensure the network does not fail in such a case? - Making the ring topology to
be bidirectional
What is a single point of failure in a hybrid network topology? - It is a component of a hybrid network topology which
cause a total network failure on failing
How are the inherent weaknesses of star, ring, and bus topologies addressed in a hybrid topology? - When a combination
of two or more of the basic topologies is made into a hybrid network topology, the weaknesses of a given topology is
addressed by another
WEP affects _____ in a network. - wireless connections
Live threat-intelligence helps the firewall to identify and stop _____. - Threats that the firewall may have never seen
before.
When can a network security hardware appliance stop threats on the network? - When it is installed in line.
Which computer network, built by a business, is used to to interconnect its various company sites in order to share
computer resources? - EPN