Show Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Explore the Network Terms in this set (34)Which three devices are considered end devices in a network? (Choose three.): 3, 4, 6 Which term correctly identifies the router as a device? 4 How does BYOD change the way in which businesses implement networks? 4 Which statement describes a charecteristic of a converged network? 1 Fill in the blank. The user has left the note with the password on the laptop. This represents an example of an _________ security threat to an organization internal
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network? 3 What are two characteristics of a scalable network?(Choose two.): 2, 4 What is an ISP? 3 What is a WAN? 2 In which scenario would the use of a WISP be recommended? 2 A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here? 4 Fill in the blank. An intranet During a
routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer? 3 What type of network must a home user access in order to do online shopping? 4 Which term describes the state of a network when the demand on the network resources exceeds the available capacity? 4 Which expression accurately defines the term bandwidth? 3 Which statement describes a characteristic of cloud computing? 2 What is a characteristic of a converged network? 3 Which two Internet connection options do not require that physical cables be run to the building?(Choose
two.) 2, 3 Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources? 3 What are two functions of end devices on a network?(Choose two.) 4, 5 Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.) 2, 5 A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network? 1, 3, 6 An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the
employee access? 3 Which statement describes the use of powerline networking technology? 2 What two criteria are used to help select a network medium from various network media?(Choose two.) 4, 5 A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two) 2, 5 Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network? 3 Which device performs the function of determining the path
that messages should take through internetworks? 2 A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support? 3 What type of network traffic requires QoS? 1 Which two statement describe intermediary devices? 2, 3 What is the Internet? 2 What security violation would cause the most amount of damage to the life of a home user? 1 Students also viewedCCNAv7 Part 2 Questions8 terms Intro to Networks V7 -Chapter 629 terms T INFO 250 Quiz 110 terms CCNA 1 Chapter 3 Exam Q&A's21 terms Sets found in the same folderChapter 3.321 terms Chapter 6.117 terms Chapter 1.116 terms Chapter 11.513 terms Other sets by this creatorfinance13 terms Chapter 10.66 terms Chapter 10.521 terms Chapter 10.410 terms Other Quizlet setsEcon test 218 terms antibiotics85 terms Робота в бухгалтерії100 terms exam 260 terms Related questionsQUESTION Adware delivers advertising content in a manner that is unexpected and unwanted by the user. Once it becomes installed, it typically displays advertising banners, pop-up ads, or opens new web browser windows at random intervals. 15 answers QUESTION Which port must be opened to allow a Remote Desktop session through the firewall? 8 answers QUESTION Which protocol is used on the World Wide Web to transmit Web pages to Web browsers? 15 answers QUESTION A coaxial cable that uses F-type screw-on connectors. It is used for digital data, such as from a cable TV company. 2 answers Which device is an intermediary device?Examples of the intermediary devices :
Hubs, switches, wireless access points, and other devices used for accessing the network, file servers, web servers, print servers, modems, devices using for internetworking such as routers, bridges, repeaters, and security firewalls, etc.
Which 3 factors should be considered when choosing the appropriate network media?The criteria for choosing network media are: the distance the media can successfully carry a signal. the environment in which the media is to be installed. the amount of data and the speed at which it must be transmitted.
What are intermediary devices in Packet Tracer?Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Go to the online course and view the animation. The management of data as it flows through the network is also a role of the intermediary devices.
Which devices are considered end devices?The network devices that people are most familiar with are called end devices, or hosts. These devices form the interface between users and the underlying communication network. Some examples of end devices are: Computers (work stations, laptops, file servers, web servers)
|