Which three devices are considered intermediate devices in a network choose three?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Other
  2. Computer Skills

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Explore the Network

Terms in this set (34)

Which three devices are considered end devices in a network? (Choose three.):
1. Router
2. Switch
3. VoIP phone
4. Security camera
5. Access point
6. Telepresence endpoint

3, 4, 6

Which term correctly identifies the router as a device?
1. Source
2. End
3. Transfer
4. Intermediary

4

How does BYOD change the way in which businesses implement networks?
1. BYOD requires organizations to purchase laptops rather than desktops.
2. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
3. BYOD devices are more expensive than devices that are purchased by an organization.
4. BYOD provides flexibility in where and how users can access network resources

4

Which statement describes a charecteristic of a converged network?
1. A single network that delivers voice, video, and data to a variety of devices.
2. Network services are delivered over a wide range of network platforms.
3. The network establishes separate communication channels for each network service.
4. The network uses different technologies for voice, video, and data

1

Fill in the blank. The user has left the note with the password on the laptop. This represents an example of an _________ security threat to an organization

internal

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
1. ACL
2. IPS
3. VPN
4. BYOD

3

What are two characteristics of a scalable network?(Choose two.):
1. Easily overloaded with increased traffic.
2. Grows in size without impacting existing users.
3. Is not as reliable as a small network.
4. Suitable for modular devices that allow for expansion.
5. Offers limited number of applications.

2, 4

What is an ISP?
1. It is a standards body that develops cabling and wiring standards for networking.
2. It is a protocol that establishes how computers within a local network communicate.
3. It is an organization that enables individuals and businesses to connect to the Internet.
4. It is a networking device that combines the functionality of several different networking devices in one

3

What is a WAN?
1. A network infrastructure designed to provide data storage, retrieval, and replication
2. A network infrastructure that provides access to other networks over a large geographic area.
3. A network infrastructure that spans a limited physical area such as a city.
4. A network infrastructure that provides access in a small geographic area

2

In which scenario would the use of a WISP be recommended?
1. An Internet cafe in a city
2. A farm in a rural area without wired broadband access.
3. Any home with multiple wireless devices.
4. An apartment in a building with cable access to the Internet.

2

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
1. Quality of Service (QoS)
2. Scalability
3. Security
4. Fault tolerance
5. Integrity

4

Fill in the blank. An
___________ is a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the members and employees of the organization, or others with authorization

intranet

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
1. DoS attack
2. Identity theft
3. Spyware
4. Zero-day attack

3

What type of network must a home user access in order to do online shopping?
1. An extranet
2. A local area network
3. An intranet
4. The Internet

4

Which term describes the state of a network when the demand on the network resources exceeds the available capacity?
1. Convergence
2. Synchronization
3. Optimization
4. Congestion

4

Which expression accurately defines the term bandwidth?
1. A set of techniques to manage the utilization of network resources.
2. A method of limiting the impact of a hardware or software failure on the network.
3. A measure of the data carrying capacity of the media.
4. A state where the demand on the network resources exceeds the available capacity

3

Which statement describes a characteristic of cloud computing?
1. Investment in new infrastructure is required in order to access the cloud.
2. Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.
3. Devices can connect to the Internet through existing electrical wiring.
4. A business can connect directly to the Internet without the use of an ISP

2

What is a characteristic of a converged network?
1. It provides only one path between the source and destination of a message.
2. A converged network requires a separate network infrastructure for each type of communication technology.
3. It delivers data, voice, and video over the same network infrastructure.
4. It limits the impact of a failure by minimizing the number of devices affected

3

Which two Internet connection options do not require that physical cables be run to the building?(Choose two.)
1. DSL
2. Satellite
3. Cellular
4. Dialup
5. Dedicated leased line

2, 3

Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?
1. Intranet
2. Wired LAN
3. Wireless LAN
4. Extranet
5. Wireless WAN

3

What are two functions of end devices on a network?(Choose two.)
1. They direct data over alternate paths in the event of link failures.
2. They filter the flow of data to enhance security.
3. They provide the channel over which the network message travels.
4. They originate the data that flows through the network.
5. They are the interface between humans and the communication network

4, 5

Which two connection options provide an always-on, high-bandwidth Internet connection to computers in a home office? (Choose two.)
1. Satellite
2. DSL
3. Cellular
4. Dial-up telephone
5. Cable

2, 5

A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to-peer network?
1. Less cost to implement.
2. Better device performance when acting as both client and server.
3. Lacks centralized administration.
4. Better security.
5. Scalable.
6. Easy to create

1, 3, 6

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?
1. An extranet
2. The Internet
3. An intranet
4. A local area network

3

Which statement describes the use of powerline networking technology?
1. Wireless access points use powerline dapters to distribute data through the home LAN.
2. A device connects to an existing home LAN using an adapter and an electrical outlet.
3. New "smart" electrical cabling is used to extend an existing home LAN.
4. A home LAN is installed without the use of physical cabling

2

What two criteria are used to help select a network medium from various network media?(Choose two.)
1. The cost of the end devices utilized in the network.
2. The types of data that need to be prioritized.
3. The number of intermediate devices installed in the network.
4. The distance the selected medium can successfully carry a signal.
5. The environment where the selected medium is to be installed

4, 5

A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network? (Choose two)
1. Installing a wireless network.
2. Installing antivirus software.
3. Implementing an intrusion detection system.
4. Adding a dedicated intrusion prevention device.
5. Implementing a firewall

2, 5

Which networking trend involves the use of personal tools and devices for accessing resources on a business or campus network?
1. Video conferencing
2. Powerline networking
3. BYOD
4. Cloud computing

3

Which device performs the function of determining the path that messages should take through internetworks?
1. A DSL modem
2. A router
3. A web server
4. A firewall

2

A network administrator is implementing a policy that requires strong, complex passwords. Which data protection goal does this policy support?
1. Data redundancy
2. Data integrity
3. Data confidentiality
4. Data quality

3

What type of network traffic requires QoS?
1. Video conferencing
2. Email
3. On-line purchasing
4. Wiki

1

Which two statement describe intermediary devices?
1. Intermediary devices generate data content.
2. Intermediary devices connect individual hosts to the network.
3. Intermediary devices direct the path of the data.
4. Intermediary devices initiate the encapsulation process.
5. Intermediary devices alter data content

2, 3

What is the Internet?
1. It is a private network for an organization with LAN and WAN connections.
2. It provides connections through interconnected global networks.
3. It is a network based on Ethernet technology.
4. It provides network access for mobile devices

2

What security violation would cause the most amount of damage to the life of a home user?
1. Capturing of personal data that leads to identity theft.
2. Denial of service to your email server.
3. Spyware that leads to spam emails.
4. Replication of worms and viruses in your computer

1

Students also viewed

CCNAv7 Part 2 Questions

8 terms

Intro to Networks V7 -Chapter 6

29 terms

T INFO 250 Quiz 1

10 terms

CCNA 1 Chapter 3 Exam Q&A's

21 terms

Sets found in the same folder

Chapter 3.3

21 terms

Chapter 6.1

17 terms

Chapter 1.1

16 terms

Chapter 11.5

13 terms

Other sets by this creator

finance

13 terms

Chapter 10.6

6 terms

Chapter 10.5

21 terms

Chapter 10.4

10 terms

Other Quizlet sets

Econ test 2

18 terms

antibiotics

85 terms

Робота в бухгалтерії

100 terms

exam 2

60 terms

Related questions

QUESTION

Adware delivers advertising content in a manner that is unexpected and unwanted by the user. Once it becomes installed, it typically displays advertising banners, pop-up ads, or opens new web browser windows at random intervals.

15 answers

QUESTION

Which port must be opened to allow a Remote Desktop session through the firewall?

8 answers

QUESTION

Which protocol is used on the World Wide Web to transmit Web pages to Web browsers?

15 answers

QUESTION

A coaxial cable that uses F-type screw-on connectors. It is used for digital data, such as from a cable TV company.

2 answers

Which device is an intermediary device?

Examples of the intermediary devices : Hubs, switches, wireless access points, and other devices used for accessing the network, file servers, web servers, print servers, modems, devices using for internetworking such as routers, bridges, repeaters, and security firewalls, etc.

Which 3 factors should be considered when choosing the appropriate network media?

The criteria for choosing network media are: the distance the media can successfully carry a signal. the environment in which the media is to be installed. the amount of data and the speed at which it must be transmitted.

What are intermediary devices in Packet Tracer?

Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Go to the online course and view the animation. The management of data as it flows through the network is also a role of the intermediary devices.

Which devices are considered end devices?

The network devices that people are most familiar with are called end devices, or hosts. These devices form the interface between users and the underlying communication network. Some examples of end devices are: Computers (work stations, laptops, file servers, web servers)