NAME

Question types


Start with


Question limit

of 28 available terms

Advertisement Upgrade to remove ads
Print test

5 Written questions

5 Matching questions

  1. b. physical
  2. d. MAC addressing
  3. c. network design
  4. c. MTU black hole
  5. a. servers
  1. a Quantifying the need for equipment, operating systems, and network applications is a function of which of the following?
    Select one:
    a. security
    b. structured cabling
    c. network design
    d. compatibility
  2. b Door locks, deadbolts, and motion sensors that protect equipment rooms are all forms of which type of security?
    Select one:
    a. technical
    b. physical
    c. managerial
    d. logical
  3. c What is an MTU issue that can happen when a network device blocks ICMP traffic?
    Select one:
    a. MTU fragmentation
    b. Path MTU Discovery
    c. MTU black hole
    d. MTU mismatch
  4. d Design considerations such as purpose and functionality, operating system, redundancy, and backups primarily affect which of the following devices?
    Select one:
    a. servers
    b. switches
    c. PBX
    d. routers
  5. e All of the following are design considerations in a network's IP address scheme EXCEPT:
    Select one:
    a. DHCP address assignment
    b. private IP addressing
    c. static address assignment
    d. MAC addressing

5 Multiple choice questions

  1. Which of the following can be used to avoid using a full-blown file server?
    Select one:
    a. Network Attached Storage (NAS)
    b. File Server
    c. Workstation
    d. Peripheral
  2. Compatibility issues stemming from newer equipment or applications when integrated with older or legacy ones are called:
    Select one:
    a. backward compatibility
    b. data compatibility
    c. frontward compatibility
    d. connector compatibility
  3. Which of the following are ways that peripherals, such as printers and scanners, may be networked?
    Select one:
    a. serial cable and dedicated
    b. dedicated and shared from computer
    c. shared from computer and virtualization
    d. virtualization and serial cable
  4. Which of the following steps determines the requirements for the network?
    Select one:
    a. define the network's needs
    b. determine internal connections
    c. determine external connections
    d. plan security
  5. Structured cabling is a design consideration related to which of the following?
    Select one:
    a. security
    b. external connections
    c. internal connections
    d. compatibility

5 True/False questions

  1. a. dataWhich of the following is NOT a consideration when considering electrical and environmental issues in equipment rooms?
    Select one:
    a. data
    b. temperature
    c. humidity
    d. electrical load capacity

          

  2. a. printer and scannerWhich of the following are considered network peripherals?
    Select one:
    a. printer and scanner
    b. scanner and switch
    c. switch and router
    d. router and scanner

          

  3. c. determining file and folder access permissionsAll of the following are considerations in determining network needs EXCEPT:
    Select one:
    a. determining how many servers are needed
    b. determining host and server operating systems
    c. determining file and folder access permissions
    d. determining size and location

          

  4. c. Power over Ethernet (PoE) and VLAN supportWhich of the following are desired features on a network switch?
    Select one:
    a. Power over Ethernet (PoE) and WAN support
    b. VLAN support and WAN support
    c. Power over Ethernet (PoE) and VLAN support
    d. encryption and WAN support

          

  5. b. acceptable use policiesNetwork design must consider all of the following factors EXCEPT:
    Select one:
    a. wireless
    b. acceptable use policies
    c. system security
    d. structured cabling