Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a front-end computer. 2. What is a packet? a. A protocol that enables information to be sent across a network b. Another name for an e-mail message c. A protocol that sends e-mail messages d. A fixed piece of information sent across a network 3. Which OSI layer is responsible for the reliability of the data sent between hosts? a. Transport layer b. Presentation layer c. Network layer d. Application layer 4. A local area network (LAN) is: a. a group of computers connected over an expansive geographic area. b. another name for a peer-to-peer network. c. a group of computers connected within a confined geographic area. d. another name for a server-based network. 5. Which of the following is a benefit of a peer-to-peer (P2P) network? a. Centralized resources b. File system management c. Security d. Decentralized computing
Quiz Answers-2 Lesson 2 Quiz 1. What network component converts the computer data into a format appropriate for transmission over the network? Choose the best answer. a. Switch b. MAC address c. NIC d. Modem 2. Which of the following can cloud application providers implement to lower their hardware costs? Choose the best answer. a. Switches b. Data centers c. Software as a Service (SaaS) d. Virtualization 3. Which of the following network devices can regulate traffic in and out of a network? Choose the best answer. a. Firewall b. Router c. Switch d. NIC 4. Which wireless network component is usually subscription-based and provides broadband Internet speeds without the need for a cable or DSL modem? Choose the best answer. a. Layer 3 switch b. Wireless router c. 4G mobile hotspot device d. Wi-Fi Ethernet 5. Wireless networks are specified in which of the following IEEE standards? a. IEEE 802.2 b. IEEE 802.3 c. IEEE 802.5 d. IEEE 802.11
Quiz Answers-3 Lesson 3 Quiz 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)? a. A suite of protocols that allow computers running the same operating system to communicate b. A suite of protocols that allow computers from different vendors with various operating systems to communicate c. A single protocol that allows computers from different vendors with various operating systems to communicate d. A single protocol that allows computers running the same operating system to communicate 2. Which process determines the path that a packet will travel across a network? a. Resolving b. ANDing c. Routing d. Pinging 3. Which routing protocol is sensitive to such criteria as available bandwidth and security? a. Open Shortest Path First (OSPF) b. Routing Information Protocol (RIP) c. File Transfer Protocol (FTP) d. Transmission Control Protocol (TCP) 4. In IPv4, which of the following distinguishes network and host portions of an IP address? Choose the best answer. a. Router b. NIC c. Subnet mask d. Internet protocol 5. Which of the following diagnostic tools helps determine connectivity between source and destination systems? a. The tracert command b. The ipconfig command c. The ping command d. The netstat command
Quiz Answers-4 Lesson 4 Quiz 1. What two servers are often incorporated as one service? a. HTTP and directory servers b. Mail and mailing list servers c. File and print servers d. News and media servers 2. How does the HTTP server interact with TCP/IP? a. HTTP enables multi-person text input, which allows many individuals to access and read the same message. b. HTTP validates keys used to decode encryption algorithms. c. HTTP allows many users on a network to access the same files. d. HTTP listens on Port 80 for incoming requests from clients, such as Web browsers. 3. Which cloud service allows the delivery of operating systems over the Internet? a. Infrastructure as a Service (IaaS). b. Platform as a Service (PaaS). c. Software as a Service (SaaS). d. All cloud services can provide this function. 4. The protocol that identifies a file type, encodes the file using the file type, and decodes it at the receiving end to display properly is called: a. Simple Mail Transfer Protocol (SMTP). b. File Transfer Protocol (FTP). c. Post Office Protocol (POP). d. Multipurpose Internet Mail Extensions (MIME). 5. You are a mail administrator and you receive complaints that users can receive mail but cannot send it. Which mail server should you troubleshoot? a. SMTP server b. IMAP server c. POP3 server d. NNTP server
Quiz Answers-5 Lesson 5 Quiz 1. Which of the following describes the location through which a processor transfers data and commands to a device? a. DMA channel b. I/O address c. IRQ assignment d. PIO channel 2. Which of the following electronic interfaces used to connect mass storage devices to the motherboard is currently the de facto standard for PC-based drives? a. IDE b. SATA c. SCSI d. USB 3. What type of problem may be caused by accumulated dust? a. Electrostatic discharge b. Heat c. Power spike d. Resource conflict 4. In order to provide security, which file system must you implement to ensure specific files and folders have controlled access to a Windows computer? a. NTFS b. ReiserFS c. FAT32 d. Ext4 5. Which of the following Windows utilities would you use to rearrange files into contiguous structures to improve system performance? a. Chkdsk b. Convert c. Disk Cleanup d. Disk Defragmenter
Quiz Answers-6 Lesson 6 Quiz 1. A network attack in which repeated attempts are made to guess user names and passwords using a file containing a long list of words is called: a. a back-door attack. b. a brute-force attack. c. a dictionary attack. d. a man-in-the-middle attack. 2. A network-level protocol that uses tunneling to encapsulate data packets into network packets is called: a. non-repudiation. b. Pretty Good Privacy (PGP). c. remote access server (RAS). d. virtual private network (VPN). 3. A server whose primary goal is to enable the secure creation and management of digital certificates is called: a. a certificate authority (CA). b. Data Encryption Standard (DES). c. Public Key Infrastructure (PKI). d. Virtual Network Computing (VNC). 4. The practice of hiding internal IP addresses from the external network is called: a. information caching. b. Network Address Translation (NAT). c. packet-sniffing. d. spoofing. 5. What is the term for the hardware used to allow multiple operating systems to run concurrently in a virtual network? a. Hypervisor b. Rack server c. Data center d. Multi-tenancy