Professional Documents
Culture Documents
/w EPDw ULLTEw
1.
Which statement describes an advantage of networks?
C) Isolating network devices allows implementation of the sneakernet file sharing method.
2.
Which network model ensures that no computer on the network has more authority than
another?
A) client/server
B) stand alone
C) peer-to-peer
D) distributed
A) file-serving
B) file-sharing
C) resource-sharing
D) resource-monitoring
4.
A ____ facilitates communication and resource sharing between other computers on the
network.
A) servlet
B) workstation
C) personal computer
D) server
5.
____ networks are the most popular type of network for medium- and large-scale organizations.
A) Client/server
B) Peer-to-peer
C) Stand-alone
D) Stationary
6.
A ____ network is confined to a relatively small space.
A) NAN
B) MAN
C) WAN
D) LAN
7.
Often, separate LANs are interconnected and rely on several ____ running many different
applications and managing resources other than data.
A) workstations
B) servers
C) clients
D) stand-alone computers
8.
A ____ network connects clients and servers from multiple buildings.
A) NAN
B) MAN
C) WAN
D) TAN
9.
A ____ is a specialized device that allows multiple networks or multiple parts of one network to
connect and exchange data.
A) segment
B) host
C) node
D) connectivity device
10.
Which network topology is the most common?
A) ring
B) star
C) hybrid
D) Ethernet
A) Segments
B) Data packets
C) Topologies
D) Protocols
12.
____ services refer to the capability of a server to share data files, applications, and disk storage
space.
A) File
B) Print
C) Management
D) Access
13.
____ services allow remote users to connect to the network.
A) File
B) Print
C) Management
D) Access
14.
The phenomenon of offering multiple types of communications services on the same network is
known as ____.
A) convergence
B) unified communications
C) divergence
D) multi-communications
15.
Which type of service supports e-mail?
A) management
B) communications
C) access
D) file
16.
____ provide a Web-based client for checking e-mail.
A) Web servers
B) Mail servers
C) File servers
D) Access servers
17.
Hardware diagnosis and failure alert are handled by ____.
A) management services
B) communication services
C) access services
D) Internet services
18.
Security auditing is handled by ____.
A) management services
B) communication services
C) access services
D) Internet services
A) soft skills
B) network communications
C) technical skills
D) network servers
20.
Which statement describes a certification drawback?
A) Certification value may be lessened due to the number of people obtaining them.
B) Certified professionals are expected to work harder than others to prove their value.
C) Certified professionals are asked many questions during routine hours requiring them to
work overtime to complete everyday tasks.
21.
Which certification requires candidates to pass lab exams?
A) Cisco CCIE
B) CompTIA A+
C) CompTIA Network+
D) Microsoft MCSE
22.
Match each item with a statement below:
A. transmission media
B. workstation
C. client
D. addressing
E. NIC (network interface card)
F. topology
G. data packets
H. protocol
I. backbone
The scheme for assigning a unique identifying number to every node on the network.
G
The distinct units of data that are exchanged between nodes on a network.
H
The part of a network to which segments and significant shared devices connect.
F
The device inside a computer that connects a computer to the network media.
A
Bottom of Form
Select regrade mode
Drop question
Time expired
Your time has expired. The assessment has been automatically submitted.