1) 1. Which of the following is the name for all computers connected to a network that participate directly in network communication? a) servers b) intermediary devices c) hosts d) media 2) 2. When data is encoded as pulses of light, which media is being used to transmit the data? a) wireless b) Fiber-optic cable c) copper cable 3) 3. Which two devices are intermediary devices? (Choose two) a) hosts b) routers c) servers d) switches 4) 4. Which connection physically connects the end device to the network? a) Port b) NIC c) Interface 5) 5. Which connections are specialized ports on a networking device that connect to individual networks? a) Port b) NIC c) Interface 6) 6. Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used? a) Physical topology b) Logical topology 7) 7. Which type of network topology lets you see the actual location of intermediary devices and cable installation? a) Physical topology b) Logical topology 8) 8. Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business? a) Extranet b) Intranet c) LAN d) WAN 9) 9. Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization’s data? a) Extranet b) Intranet c) LAN d) WAN 10) 10. Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider? a) Extranet b) Intranet c) LAN d) WAN 11) 11. When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved? a) fault tolerance b) Scalability c) QoS d) Security 12) 12. Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture? a) fault tolerance b) Scalability c) QoS d) Security 13) 13. With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion? a) fault tolerance b) Scalability c) QoS d) Security 14) 14. Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture? a) fault tolerance b) Scalability c) QoS d) Security 15) 15. Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country? a) BYOD b) Video communications c) Cloud computing 16) 16. Which feature describes using personal tools to access information and communicate across a business or campus network? a) BYOD b) Video communications c) Cloud computing 17) 17. Which feature contains options such as Public, Private, Custom and Hybrid? a) BYOD b) Video communications c) Cloud computing 18) 18. Which feature is being used when connecting a device to the network using an electrical outlet? a) Smart home technology b) Powerline c) Wireless broadband 19) 19. Which feature uses the same cellular technology as a smart phone? a) Smart home technology b) Powerline c) Wireless broadband
0%
Module 1
共用
共用
共用
由
Finaccsdu
編輯內容
列印
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
測驗
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?