1) 1. Which of the following is the name for all computers connected to a network that participate directly in network communication? a) servers b) intermediary devices c) hosts d) media 2) 2. When data is encoded as pulses of light, which media is being used to transmit the data? a) wireless b) Fiber-optic cable c) copper cable 3) 3. Which two devices are intermediary devices? (Choose two) a) hosts b) routers c) servers d) switches 4) 4. Which connection physically connects the end device to the network? a) Port b) NIC c) Interface 5) 5. Which connections are specialized ports on a networking device that connect to individual networks? a) Port b) NIC c) Interface 6) 6. Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? a) Physical topology b) Logical topology 7) 7. Which type of network topology lets you see the actual location of intermediary devices and cable installation? a) Physical topology b) Logical topology 8) 8. Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? a) Extranet b) Intranet c) LAN d) WAN 9) 9. Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data? a) Extranet b) Intranet c) LAN d) WAN 10) 10. Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? a) Extranet b) Intranet c) LAN d) WAN 11) 11. When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? a) fault tolerance b) Scalability c) QoS d) Security 12) 12. Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? a) fault tolerance b) Scalability c) QoS d) Security 13) 13. With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? a) fault tolerance b) Scalability c) QoS d) Security 14) 14. Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? a) fault tolerance b) Scalability c) QoS d) Security 15) 15. Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? a) BYOD b) Video communications c) Cloud computing 16) 16. Which feature describes using personal tools to access information and communicate across a business or campus network? a) BYOD b) Video communications c) Cloud computing 17) 17. Which feature contains options such as Public, Private, Custom and Hybrid? a) BYOD b) Video communications c) Cloud computing 18) 18. Which feature is being used when connecting a device to the network using an electrical outlet? a) Smart home technology b) Powerline c) Wireless broadband 19) 19. Which feature uses the same cellular technology as a smart phone? a) Smart home technology b) Powerline c) Wireless broadband
0%
Module 1
שתף
שתף
שתף
על ידי
Finaccsdu
עריכת תוכן
הדפסה
הטבעה
עוד
הקצאות
לוח תוצאות מובילות
הצג עוד
הצג פחות
לוח התוצאות הזה הוא כרגע פרטי. לחץ
שתף
כדי להפוך אותו לציבורי.
לוח תוצאות זה הפך ללא זמין על-ידי בעל המשאב.
לוח תוצאות זה אינו זמין מכיוון שהאפשרויות שלך שונות מאשר של בעל המשאב.
אפשרויות חזרה
חידון
היא תבנית פתוחה. זה לא יוצר ציונים עבור לוח התוצאות.
נדרשת כניסה
סגנון חזותי
גופנים
נדרש מנוי
אפשרויות
החלף תבנית
הצג הכל
תבניות נוספות יופיעו במהלך המשחק.
תוצאות פתוחות
העתק קישור
קוד QR
מחיקה
האם לשחזר את הנתונים שנשמרו באופן אוטומטי:
?