Mod1

Mod1

University

39 Qs

quiz-placeholder

Similar activities

QUIZ 3 - Data Design and Database Management

QUIZ 3 - Data Design and Database Management

University

40 Qs

xtgfrt

xtgfrt

University

40 Qs

Quiz Topologi Jaringan

Quiz Topologi Jaringan

11th Grade - University

40 Qs

Final Test preparation and recap

Final Test preparation and recap

University

40 Qs

Microsoft Word Shortcut Keys Quiz

Microsoft Word Shortcut Keys Quiz

University

40 Qs

SoftTest Midterm Review

SoftTest Midterm Review

University

36 Qs

Encryption/Decryption

Encryption/Decryption

University

40 Qs

SAT Informatika Kelas X TP.2024/2025

SAT Informatika Kelas X TP.2024/2025

10th Grade - University

40 Qs

Mod1

Mod1

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Ennairzxs Ennairzxs

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?

quality of service (QoS)
scalability
security
fault tolerance
integrity

Answer explanation

Fault tolerance is the characteristic of a network which allows it to quickly respond to failures of network devices, media, or services. Quality of service refers to the measures taken to ensure that network traffic requiring higher throughput receives the required network resources. Scalability refers to the ability of the network to grow to accommodate new requirements. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is generally not used as a characteristic of networks in the same way as the other terms.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

cloud computing
online collaboration
bring your own device
video conferencing

Answer explanation

BYOD allows end users to use personal tools to access the corporate network. Allowing this trend can have major impacts on a network, such as security and compatibility with corporate software and devices.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?

ACL
IPS
VPN
BYOD

Answer explanation

Virtual private networks (VPN) are used to provide secure access to remote workers.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?

fault tolerance
Scalability
QoS
Security

Answer explanation

Confidentiality, integrity, and availability are requirements of security.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

DoS attack
identity theft
spyware
zero-day attack

Answer explanation

Spyware is software that is installed on a network device and that collects information.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?

fault tolerance
Scalability
QoS
Security

Answer explanation

Redundancy is an example a fault-tolerant network architecture.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does BYOD change the way in which businesses implement networks?

BYOD requires organizations to purchase laptops rather than desktops.
BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.
BYOD devices are more expensive than devices that are purchased by an organization.
BYOD provides flexibility in where and how users can access network resources.

Answer explanation

Reference Topic 1.8.0.A BYOD environment requires an organization to accommodate a variety of devices and access methods. Personal devices, which are not under company control, may be involved, so security is critical. Onsite hardware costs will be reduced, allowing a business to focus on delivering collaboration tools and other software to BYOD users.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?