Time limit: 0
Quiz-summary
0 of 21 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
Information
Networking Devices and Initial Configuration Module 1 - 3 Checkpoint Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 21 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- Answered
- Review
-
Question 1 of 21
1. Question
1 pointsA college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?Correct
Incorrect
Hint
Fault tolerance is the characteristic of a network which allows it to quickly respond to failures of network devices, media, or services. Quality of service refers to the measures taken to ensure that network traffic requiring higher throughput receives the required network resources. Scalability refers to the ability of the network to grow to accommodate new requirements. Security refers to protecting networks and data from theft, alteration, or destruction. Integrity refers to the completeness of something and is generally not used as a characteristic of networks in the same way as the other terms. -
Question 2 of 21
2. Question
1 pointsWhich feature relies on prioritization of network traffic and is used to ensure successful delivery of real-time services?Correct
Incorrect
Hint
Quality of Service (QoS) is implemented in networks to prioritize traffic. Traffic for real-time services such as voice and video requires a higher priority than data traffic to ensure reliable delivery of voice and video content to users. -
Question 3 of 21
3. Question
1 pointsA networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?Correct
Incorrect
Hint
Network security includes protecting the confidentiality of data that is on the network. In this case, because confidential data has been made available to unauthorized users, the security characteristic of the network has failed. -
Question 4 of 21
4. Question
1 pointsWhich term describes the state of a network when the demand on the network resources exceeds the available capacity?Correct
Incorrect
Hint
When the demand on the network resources exceeds the available capacity, the network becomes congested. A converged network is designed to deliver multiple communication types, such as data, video and voice services, using the same network infrastructure. -
Question 5 of 21
5. Question
1 pointsWhich is a characteristic of a Type 2 hypervisor?Correct
Incorrect
Hint
Type 2 hypervisors are hosted on an underlaying operating system and are best suited for consumer applications and those experimenting with virtualization. Unlike Type 1 hypervisors, Type 2 hypervisors do not require a management console and do not have direct access to hardware. -
Question 6 of 21
6. Question
1 pointsWhat type of address is physically assigned to the NIC of a workstation?Correct
Incorrect
Hint
A MAC address is physically assigned to the host NIC and is known as the physical address. The physical address remains the same regardless of where the host is placed on the network. The IP address is known as a logical address because it is assigned logically based on where the host is located. IP addresses contain two parts, network address and host address. -
Question 7 of 21
7. Question
1 pointsAn administrator is adding voice and video service capabilities to an existing network. What design requirement is being satisfied by this situation?Correct
Incorrect
Hint
Scalability refers to the ability of a network to expand to support new users, services, and applications. In this example, scalability allows the administrator to expand the ability of the network to support voice and video. -
Question 8 of 21
8. Question
1 pointsMatch the hierarchical design layer with the description.Correct
Incorrect
Hint
Place the options in the following order:access layer provides host connectivity to the network core layer provides a high-speed connection for the backbone network distribution layer provides interconnections for smaller local access networks -
Question 9 of 21
9. Question
1 pointsWhich characteristic defines a private cloud?Correct
Incorrect
Hint
A private cloud is one that is available to a specific organization and not to the general public. -
Question 10 of 21
10. Question
1 pointsA company is considering implementing virtualization solutions in a data center. What are three advantages of virtualization the company can expect to benefit from?(Choose three.)Correct
Incorrect
Hint
Virtualization is the ability to run many instances of an OS simultaneously on the same hardware platform. This reduces the amount of equipment that is required, thus resulting in less power consumption and improved disaster recovery. -
Question 11 of 21
11. Question
1 pointsWhich Cloud computing service would be best for an organization that needs to collaboratively create applications and deliver them over the web?Correct
Incorrect
Hint
Platform as a service (PaaS) provides a collaborative environment where multiple developers can create software and host an application through a Cloud provider. -
Question 12 of 21
12. Question
1 pointsA company leases a cloud-based payroll system. Which cloud computing technology is this company using?Correct
Incorrect
Hint
Software as a service (SaaS) refers to on demand software that is leased from the provider. Platform as a service (PaaS) is when the provider provides the platform for a developer. Infrastructure as a service (IaaS) is when key network devices such as routers and firewalls are leased from a provider. Wireless as a service (WaaS) is when a provider provides wireless connectivity at a fixed monthly cost. -
Question 13 of 21
13. Question
1 pointsWhat is the function of a hypervisor?Correct
Incorrect
Hint
A hypervisor is a software process that abstracts the hardware layer from the operating systems allowing multiple virtual machines to run simultaneously. -
Question 14 of 21
14. Question
1 pointsWhich Cloud computing service would be best for a new organization that cannot afford physical servers and networking equipment and must purchase network services on-demand?Correct
Incorrect
Hint
Infrastructure as a service (IaaS) provides an environment where users have an on-demand infrastructure that they can install any platform as needed. -
Question 15 of 21
15. Question
1 pointsWhat is the decimal equivalent of the hexadecimal value of 3F?Correct
Incorrect
Hint
In order to convert a hexadecimal number to decimal, consider that the digit to the far right represents the 1s column where values 0 through F can appear. A hexadecimal value of A equals the decimal number 10. B equals 11, and so on through F equaling 15. The value of F in the number F equals 15. Next consider the value of 3 in the hexadecimal number of 3F. That place holder is the 16s column. Multiple the number 3 times 16 for a total of 48. Add 48 to 15 for the grand total of 63. Hexadecimal 3F equals a decimal value of 63. -
Question 16 of 21
16. Question
1 pointsWhich IPv4 address format was created for ease of use by people and is expressed as 201.192.1.14?Correct
Incorrect
Hint
For ease of use by people, binary patterns are represented as dotted decimal. Computer systems were created to understand binary addressing. -
Question 17 of 21
17. Question
1 pointsHow many unique values are possible using a single binary digit?Correct
Incorrect
Hint
Binary is a numbering system that consists of the digits 0 and 1 called bits. A binary number is a series of only 1s and 0s. -
Question 18 of 21
18. Question
1 pointsA student is learning number systems. What is the hexadecimal equivalent for the decimal number 165?Correct
Incorrect
Hint
Decimal 165 in binary is 10100101. 128+32+4+1 = 165. Each 4 binary digits equates to 1 hexadecimal digit. 1010 = 10 (decimal) = A (hexadecimal) 0101 = 5 (decimal) = 5 (hexadecimal) -
Question 19 of 21
19. Question
1 pointsWhat is the hexadecimal equivalent for the binary number 10111010?Correct
Incorrect
Hint
Each 4 binary digits equates to 1 hexadecimal digit. 1011 = 11 (decimal) = B (hexadecimal) 1010 = 10 (decimal) = A (hexadecimal) -
Question 20 of 21
20. Question
1 pointsWhat is the dotted decimal representation of the IPv4 address which is represented as the binary string 00001010.01100100.00010101.00000001?Correct
Incorrect
Hint
Converting the binary string of 00001010.01100100.00010101.00000001 to dotted decimal gives 10.100.21.1 -
Question 21 of 21
21. Question
1 pointsWhat are two differences between binary and decimal numbers? (Choose two.)Correct
Incorrect
Hint
Computing devices use the binary system for data processing and storage. Binary numbers are based on powers of 2 and decimal numbers are based on powers of 10.