Mod1

Mod1

University

39 Qs

quiz-placeholder

Similar activities

Quiz Manajemen Layanan Teknologi Informasi

Quiz Manajemen Layanan Teknologi Informasi

University

40 Qs

JKI Kelas XII

JKI Kelas XII

12th Grade - University

40 Qs

untitled

untitled

3rd Grade - University

35 Qs

GRADE 9| 2ND QUARTER TLE

GRADE 9| 2ND QUARTER TLE

University

40 Qs

Communication and Literacy Quiz

Communication and Literacy Quiz

12th Grade - University

40 Qs

2nd Year Data Structures Quiz Qn

2nd Year Data Structures Quiz Qn

University

35 Qs

Quiz sur Apollo GraphQL

Quiz sur Apollo GraphQL

University

38 Qs

40 новый

40 новый

University

40 Qs

Mod1

Mod1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Ennairzxs Ennairzxs

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

quality of service (QoS)
scalability
security
fault tolerance
integrity

Answer explanation

Fault tolerance is the characteristic of a network which allows it to quickly respond to failures of network devices, media, or services. Quality of service refers to the measures taken to ensure that network traffic requiring higher throughput receives the required network resources. Scalability refers to the ability of the network to grow to accommodate new requirements. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is generally not used as a characteristic of networks in the same way as the other terms.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

cloud computing
online collaboration
bring your own device
video conferencing

Answer explanation

BYOD allows end users to use personal tools to access the corporate network. Allowing this trend can have major impacts on a network, such as security and compatibility with corporate software and devices.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

ACL
IPS
VPN
BYOD

Answer explanation

Virtual private networks (VPN) are used to provide secure access to remote workers.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

fault tolerance
Scalability
QoS
Security

Answer explanation

Confidentiality, integrity, and availability are requirements of security.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

DoS attack
identity theft
spyware
zero-day attack

Answer explanation

Spyware is software that is installed on a network device and that collects information.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

fault tolerance
Scalability
QoS
Security

Answer explanation

Redundancy is an example a fault-tolerant network architecture.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does BYOD change the way in which businesses implement networks?

BYOD requires organizations to purchase laptops rather than desktops.
BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
BYOD devices are more expensive than devices that are purchased by an organization.
BYOD provides flexibility in where and how users can access network resources.

Answer explanation

Reference Topic 1.8.0.A BYOD environment requires an organization to accommodate a variety of devices and access methods. Personal devices, which are not under company control, may be involved, so security is critical. Onsite hardware costs will be reduced, allowing a business to focus on delivering collaboration tools and other software to BYOD users.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?