NAME

Question types


Start with


Question limit

of 28 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. b. acceptable use policies
  2. c. network design
  3. c. MTU black hole
  4. b. data format
  5. b. data
  1. a All of the following are security issues inherent in network design EXCEPT:
    Select one:
    a. wireless encryption
    b. data format
    c. equipment theft
    d. Access Control Lists
  2. b What is an MTU issue that can happen when a network device blocks ICMP traffic?
    Select one:
    a. MTU fragmentation
    b. Path MTU Discovery
    c. MTU black hole
    d. MTU mismatch
  3. c Network compatibility issues affect interoperability of all of the following EXCEPT:
    Select one:
    a. cabling
    b. data
    c. network devices
    d. applications
  4. d Quantifying the need for equipment, operating systems, and network applications is a function of which of the following?
    Select one:
    a. security
    b. structured cabling
    c. network design
    d. compatibility
  5. e Network design must consider all of the following factors EXCEPT:
    Select one:
    a. wireless
    b. acceptable use policies
    c. system security
    d. structured cabling

5 Multiple choice questions

  1. Which of the following are ways that peripherals, such as printers and scanners, may be networked?
    Select one:
    a. serial cable and dedicated
    b. dedicated and shared from computer
    c. shared from computer and virtualization
    d. virtualization and serial cable
  2. What is the Maximum Transmission Unit (MTU) for Ethernet?
    Select one:
    a. 1400 bytes
    b. 1000 bytes
    c. 1500 bytes
    d. 2500 bytes
  3. All of the following are factors involved in router selection EXCEPT:
    Select one:
    a. expandability
    b. media support
    c. VLAN support
    d. scalability
  4. All of the following are considered characteristics of a SOHO network EXCEPT:
    Select one:
    a. a minimal number of switches, routers, servers, and workstations
    b. simple design (usually)
    c. wide variety of enterprise-level services and servers
    d. standardization of operating systems
  5. Which of the following can be used to avoid using a full-blown file server?
    Select one:
    a. Network Attached Storage (NAS)
    b. File Server
    c. Workstation
    d. Peripheral

5 True/False questions

  1. a. backward compatibilityAll of the following are security issues inherent in network design EXCEPT:
    Select one:
    a. wireless encryption
    b. data format
    c. equipment theft
    d. Access Control Lists

          

  2. a. printer and scannerStructured cabling is a design consideration related to which of the following?
    Select one:
    a. security
    b. external connections
    c. internal connections
    d. compatibility

          

  3. c. lights-out managementQuantifying the need for equipment, operating systems, and network applications is a function of which of the following?
    Select one:
    a. security
    b. structured cabling
    c. network design
    d. compatibility

          

  4. b. physicalNetwork compatibility issues affect interoperability of all of the following EXCEPT:
    Select one:
    a. cabling
    b. data
    c. network devices
    d. applications

          

  5. d. MAC addressingWhich of the following is a compatibility issue with wireless networking?
    Select one:
    a. user accounts
    b. signal strength
    c. WAP placement
    d. encryption

          

Create Set