1. Which statement correctly relates to a small network? Small networks are complex. Small networks require an IT department to maintain. The majority of businesses are small. 2. Which factor must be considered when selecting network devices? color console connections cost elasticity 3. What is necessary to plan …
1. Which device controls traffic between two or more networks to help prevent unauthorized access? AAA Server firewall ESA/WSA IPS 2. Which device is used by other network devices to authenticate and authorize management access? AAA Server firewall ESA/WSA IPS 3. Which backup policy consideration is concerned with …
1. Angela, an IT staff member at ACME Inc., notices that communication with the company’s web server is very slow. After investigating, she determines that the cause of the slow response is a computer on the internet sending a very large number of malformed web requests to ACME’S …
1. What kind of threat is described when a threat actor sends you a virus that can reformat your hard drive? data loss or manipulation disruption of service identify theft information theft 2. What kind of threat is described when a threat actor makes illegal online purchases using …
1. How many connections are required by FTP between client and server? 1 2 3 4 2. True or false? FTP data transfers take place from client to server (push) and from server to client (pull). True False 3. Which of these ports are used by FTP? (Choose …
1. Which of the following DNS record types is used to resolve IPv6 addresses? A NS AAAA MX 2. True or false? A DNS server that receives a request for a name resolution that is not within its DNS zone will send a failure message to the requesting …
1. This message type is used when uploading data files to a web server. GET POST PUT 2. This protocol is used by a web browser to establish a connection to a web server. HTTP SSL IMAP SMTP 3. This protocol is used by a client to send …
1. True or false? The peer-to-peer networking model requires the implementation of a dedicated server for data access. True False 2. True or false? In a peer-to-peer network environment every peer can function as both a client and a server. True False 3. Which peer-to-peer application allows users …
1. This layer of the OSI model is concerned with the protocols that exchange data between programs running on hosts. application transport network physical 2. MKV, GIF, and JPG standards are associated with which OSI layer? application presentation session transport 3. These three OSI layers define the same …
1. Why is UDP desirable for protocols that make a simple request and reply transactions? Flow Control Low overhead Reliability Same-order delivery 2. Which UDP datagram reassembly statement is true? UDP does not reassemble the data. UDP reassembles the data in the order that it was received. UDP …