Question: Which network device concentrates communications signals, accepts only basic commands, and provides statistics such as throughput measures and uptime percentages? a) Active hub b) Dumb

Which network device concentrates communications signals, accepts only basic commands, and provides statistics such as throughput measures and uptime percentages?

a) Active hub

b) Dumb hub

c) Router

d) Switch

Which network device differentiates network traffic using Layer 2 of the OSI model?

a) Active hub

b) Dumb hub

c) Router

d) Switch

A first-year student in a computer networking class is studying different addressing types and attempting to identify them. Which of the following does she determine is a Media Access Control (MAC) address?

a) 192.168.10.5

b) 2001:0db8:85a3:0000:0000:8a2e:-370:7334

c) 00-14-22-01-23-45

d) 10.0.0.0/8

Fatima has been hired as a contractor to decommission a network topology that has been employed by a small company since the 1990s. In studying the project specifications, she reads that this physical topology uses a special packet called tokens, and can be unidirectional or bidirectional. Although it has fewer collisions than other types of networks, this topology is rarely seen in the twenty-first century. Baffled as to what type of network this is, she goes on the Internet and researches the technology. What sort of topology does she find?

a) Bus

b) Mesh

c) Ring

d) Star

Norman is a network engineer. He is creating a series of logical networks based on different departments for a new branch office. Although the physical locations of the computers for a particular department may be in different areas or on different floors of the building, they have to operate as if they are on a single physical network. Norman's solution involves putting the accounting, engineering, and marketing computer nodes on different subnets. What sort of network topology does Norman create?

a) Access point

b) Local area network (LAN)

c) Star

d) Virtual local area network (VLAN)

Which form of addressing uses 32 bits and subnetting, but suffers from a lack of integrated security?

a) Internet Protocol version 4 (IPv4)

b) Internet Protocol version 6 (IPv6)

c) Media Access Control (MAC)

d) Static

Tonya is a student. She is working through a network addressing scheme example for a class. She has read that the 128-bit address 2001:0f58:0000:0000:0000:0000:1986:62af can be shortened but is trying to understand how. What is the correct solution?

a) 2001:0f58:1986:62af

b) 2001:0f58::1986:62af

c) 2001:0f58:0:1986:62af

d) 2001:0f58:0:0:0:0:1986:62af

While there is no single rule as to the size of this network type, which network is usually made up of fewer than 10 computers and rarely more than 20?

a) Access group

b) Local area network (LAN)

c) Wide area network (WAN)

d) Workgroup

Miles is an IT consultant. He is given the specifications of a networking project for the new campus of a multinational corporation. Among the requirements, switches and wireless access points (WAPs) must interconnect all nodes, the network must use hardware firewalls, and it must support single sign-on (SSO). Which network infrastructure does he select that fulfills these requirements?

a) Client/server

b) Small office/home office (SOHO)

c) Wide area network (WAN)

d) Workgroup

The chief information officer (CIO) is negotiating lease prices with several telecommunications providers. She wants a service that offers circuits that will link to various physical buildings and branches, including a connection to the physical demarcation point. For what network infrastructure will this service be used?

a) Small office/home office (SOHO)

b) Local area network (LAN)

c) Wide area network (WAN)

d) Workgroup

Samantha is a network engineer. She is writing a proposal to her company's chief information office (CIO) about the deployment of a group of end-user nodes to replace the office's aging workstations. Her solution is to use PCs with only display screens, keyboards, and mice, with all of the computing work and storage hosted on servers. What is her solution?

a) Remote access

b) Remote control

c) Thin client

d) Virtual private network (VPN)

Eduardo is configuring a system that allows multiple users working from home to connect to the office network over a wide area network (WAN) link. The platform is required to accept inbound connections from those user computers, allowing the clients to interact with the network is as if they were locally connected. What is he working on?

a) Access control

b) Remote access server (RAS)

c) Remote control

d) Terminal services

Which type of boundary network creates a series of subnets separated by firewalls?

a) Demilitarized zone (DMZ)

b) Extranet

c) Intranet

d) N-tier

Khalilah is a network engineer. She is devising a plan to help her company's infrastructure transition from IPv4 to IPv6 addressing. She selects a solution where both IPv4 and IPv6 protocol stacks coexist in the same network equipment, allowing network communication using both protocols. Which solution did she choose?

a) Dual-stack

b) Internet Protocol Security (IPSec)

c) Translation

d) Tunneling

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!