100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

COMPUTER NETWORKS Straighterline IT101 Information Technology Fundamentals Graded Topic Test (New Version August 2024)

Puntuación
-
Vendido
-
Páginas
21
Grado
A+
Subido en
21-08-2024
Escrito en
2024/2025

COMPUTER NETWORKS Straighterline IT101 Information Technology Fundamentals Graded Topic Test (New Version August 2024) We are a team of experts offering course/class attendance (including final proctored exams!!) for all Straighterline, Online ATI, HESI, NCLEX, Portage Learning, Sophia, Nursing, Business etc courses. We also write essays, discussion posts, research papers and school assignments. Should you need any of these services, Contact us via email: or : +1 (540) 753-5914. Guaranteed Passing! Step 1 of 1 Question 1 of 42 Question 1 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Kevin’s work situation sometimes allows him the flexibility of working from home. When he does so, he accesses his workstation at the office by logging on to it through the Internet. While he is using his workplace computer from home, his workplace computer is what type of computer in relation to him? second-person remote unsecured virtual Correct. Question 2 of 42 Question 2 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a common way to view a computer network? the physical levelthe software level the user interface level the logical level Correct. Question 3 of 42 Question 3 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Fiber optic cables transmit what type of signal in place of electromagnetic waves? sound waves its and bytes light pulses radio waves Correct. Question 4 of 42 Question 4 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a network device that may be used to connect multiple computers together? a network hub a network switch a routerAll of the above are used to connect multiple computers together. Correct. Question 5 of 42 Question 5 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is a significant example of a circuit switched network? telephone network internet radio tower networks all of the above Correct. Question 6 of 42 Question 6 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. In what network topology is a single cable the actual network, with each device connected to that single cable? mesh topology bus topology ring topology star topology Correct.Question 7 of 42 Question 7 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is a factor in the pathway chosen in a packet switched network? other message traffic on the network whether a full pathway can be established prior to transmission whether the pathway can be repeated for all other messages between the two computers all of the above Correct. Question 8 of 42 Question 8 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Why is a switch able to utilize bandwidth more efficiently than a hub? Because it is able to discern which messages can be ignored as spam and which are actually important to pass on. Because messages sent by a switch are compressed into a form that requires fewer bits. Because it recognizes the intended recipient for a particular message and is able to direct that message only towards that single device. all of the above Correct.Question 9 of 42 Question 9 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is a common trait of both routing and switching? Individual device addresses are used to direct messages. Routing and switching both involve the evaluation of which message to send first when there are multiple incoming messages. Used to move traffic from one network to another network. Messages intended for recipients outside of the network are directed using tables of IP addresses from other networks. Correct. Question 10 of 42 Question 10 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. A server provides information to what type of computer? a user a peer a client a subordinate Correct. Question 11 of 42 Question 11This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following correctly describes the characteristics of most servers? Servers are usually cheaper computers that come with only basic system unit components. Servers generally have much greater hard disk storage but slower CPU performance. Servers generally need to be more powerful machines with greater disk storage and faster response times. Servers are usually comparable to client computers in their operational capacity, but they are just dedicated to certain specific functions. Correct. Question 12 of 42 Question 12 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. How do virtual machines relate to operating systems? Virtual machines use advanced input/output technology to remove the need to have an operating system. Virtual machines are temporary operating systems that can be installed and used when a computer is undergoing a conversion from one operating system to another. Virtual machines allow computers with different operating system to communicate over a network. Virtual machines allow users to emulate various operating systems on a single computer. Correct. Question 13 of 42Question 13 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. A virtual machine falls into which of the following categories? software networking hardware component personal computer unit peripheral device Correct. Question 14 of 42 Question 14 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What type of server may be used to support both application software and data files but usually is limited to serving requests only from clients within the local network? file server database server web server all of the above Correct. Question 15 of 42 Question 15 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully.Why are servers sometimes built into cabinets? to keep them from accidentally coming into direct contact with people, which could be dangerous to their health to allow for large numbers of components to be inserted, such as numerous hard disk drives for large storage capacity to keep them under secure lock and key to make them more transportable so that they can carry vital file or database information from location to location Correct. Question 16 of 42 Question 16 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Kyle is wanting to create a simple network between a few devices. He needs the network to be reliable even if one of the devices fail. The devices will not be creating large volumes of traffic. The most important factor in his decision making process is cost, which needs to be low. What is probably the best network topology for his needs? star topology mesh topology bus topology ring topology Correct. Question 17 of 42 Question 17This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. How does a DNS relate to how a user interacts with IP addresses? A DNS provides individual computer devices and webpages with unique IP addresses so that users can locate those devices and pages and communicate with them. A DNS breaks down an IP address into manageable packets of data that can be processed individually. A DNS converts an English-like name provided by a user to its corresponding numerical IP address so that the user does not have to remember the numerical form. A DNS examines the IP address provided by the user and then identifies the location of the device associated with that IP address so that an information packet can be forwarded to that location. Correct. Question 18 of 42 Question 18 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What part of an incoming packet does a router examine in order to determine the next location to send it to? destination IP address routing table the DNS alias any of the above, depending on where the packet originated Correct. Question 19 of 42Question 19 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. When a large message is broken down into multiple smaller message units which are sent across the Internet to their destination individually, what are the individual units called? packets pods bricks parcels Correct. Question 20 of 42 Question 20 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What device connects a computer or computer network to the Internet? LAN Internet Service Provider DNS router Correct. Question 21 of 42 Question 21 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully.What kind of tables does a DNS have? tables that list the MAC addresses of all individual devices connected to the Internet tables that help the server identify the location of each device based on its IP address tables that map out the location of major nodes and links in their region of the Internet so that important pathway decisions can be made tables that contain host IP addresses and their corresponding aliases Correct. Question 22 of 42 Question 22 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following steps comes first in the process of communicating a message over the Internet? The local router decides the best first location to send the message. The message is placed into packets. The destination IP address is translated from an “external public” address to an “internal private” address. The message information is sent from the source computer to the Internet point of presence for that local network. Correct. Question 23 of 42 Question 23 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What is the major advantage for communications provided by DNS services?DNS services provide a platform for communications between computers running different network protocols. Users are able to reach websites that they otherwise would not be granted access to. Users are far more likely to remember names for websites rather than the lengthy numerical addresses that would be needed without DNS services. DNS services do not provide any additional functionality, but they do speed all Internet communications up significantly. Correct. Question 24 of 42 Question 24 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a common top-level domain name for websites hosted in the United States? .com .edu .gov .pdf Correct. Question 25 of 42 Question 25 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What symbol(s) separate(s) the domain name portion of a URL from the resource ID portion?a period (.) a colon followed by two slashes (://) a slash (/) none of the above Correct. Question 26 of 42 Question 26 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What are the two categories of concern in IAS? security and assurance access and stability integrity and security availability and confidentiality Correct. Question 27 of 42 Question 27 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a concern related to data integrity? Data should not be altered without a record of when, how, and by whom it was altered. Data must be collected in a manner that ensures its accuracy.Data must be entered into the system for storage correctly. Data must be stored in such a way that access is denied to those who should not see it, but is available to those who need to use it. Correct. Question 28 of 42 Question 28 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Lisa is in charge of employee payroll for her company. Sensitive personal employee information must be collected for payroll purposes, including such things as addresses, social security numbers, and retirement account information. Lisa is one of only two employees in the company who have access to the password protected files where the information is stored. She is able to access that information either from a secure workstation at the office or through secure remote access from her personal computer at home. She is able to make changes to the information in those files, but those changes are always recorded and documented. If she opens one of the sensitive files, the other employee who has access to it cannot alter it in any way while she is using it. What is the violation of IAS principles in this scenario? Personal information should only be recorded if necessary, but if it is necessary to record it, it should be available publicly. Availability is compromised because the files are password protected, which might prevent access to the files by those who need to use the information. The fact that Lisa can access this private information remotely from home grants availability at the expense of integrity and security. There are no obvious violations of IAS principles in this scenario. Correct. Question 29 of 42 Question 29This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What is the first step in strategic risk analysis? identifying information assets identifying vulnerabilities identifying threats identifying policies to protect the organization Correct. Question 30 of 42 Question 30 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is an example of public information? an employee’s address an employee’s email address an employee’s health information all of the above Correct. Question 31 of 42 Question 31 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. True or false. Phishing is an example of social engineering.True False Correct. Question 32 of 42 Question 32 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Alan is a web administrator and he is facing a problem with one of his servers. He cannot get it to respond to requests the way it should. When he logs directly into the server and explores the situation, he finds that millions of requests are flooding the server from the same few machines over and over again so that it cannot handle the volume of activity. What type of attack is Alan dealing with? Trojan Horse phishing a denial of service attack packet sniffing Correct. Question 33 of 42 Question 33 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What is a grey-hat hacker? someone who no longer hacks because he was convicted of violating federal hacking laws a hacking professional who only hacks for “good purposes”a hacking professional who only hacks for “bad purposes” a hacking professional who hacks for both “good and bad purposes” Correct. Question 34 of 42 Question 34 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What type of malware is usually downloaded unknown to the user and observes the user’s activities in order to gain sensitive information that the user might enter in regular activities? ghostware worm spyware invisible friend Correct. Question 35 of 42 Question 35 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Anti-malware software can be configured to run on-demand, but what is another common approach to configuring when it is to run? It can be configured to run only after each message is opened. It can be configured to scan every incoming message. There is not another approach: it can only be configured to run on demand. Correct.Question 36 of 42 Question 36 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. What type of security software prevents certain types of messages from coming into or out of the network? firewall software anti-virus software encryption software all of the above Correct. Question 37 of 42 Question 37 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following is not a common basis for authenticating identity? what you know what you have what you are none of the above Correct. Question 38 of 42 Question 38 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully.In what type of access control is a user’s access defined; according to which preset category best describes his function in the organization, such as a supervisor, manager, or analyst? two-factor access control role-based access control 9-bit scheme access control positional hierarchy access control Correct. Question 39 of 42 "Fill in the blank" question: select the correct answer. - Question 39 The input and select elements may be inline with important contextual information. This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. The many parties involved in a business setting can mutually benefit from one another in their activities, but only if they are connected through some sort of network network . Response for: undefined Correct. Question 40 of 42 Question 40 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully.What term refers to the interdependent and constantly developing relationships between customers, suppliers, employees, and others involved in the business process? business ecosystem business web co-dependence none of the above Correct. Question 41 of 42 Question 41 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Which of the following statements accurately describes the benefits of computer networks in business settings? Computer networks provide many advantages for work processes today (cost savings, increased efficiency and productivity, etc.) without any significant drawbacks. Computer networks do provide small to moderate advantages to businesses who install, use, and maintain them properly, but most businesses find that that the costs, trouble, and increased risks involved make computer networks a bad choice. Computer networks provide many advantages to businesses, but one significant drawback is the tendency of employees to take advantage of their flexibility by working from home or other informal settings rather than coming into the central office. In most business settings, computer networks provide many significant benefits, but there is always a need to be aware of the increased risk associated with them. Correct.Question 42 of 42 Question 42 This is not a form; we suggest that you use the browse mode and read all parts of the question carefully. Why might a company’s software expenses decrease if they implement a computer network for their office? They can potentially share software over the network rather than purchasing copies of the software for each user. Networks run primarily using hardware, not software. A network allows users to communicate instantly with one another rather than using software for numerous steps of back and forth communication. The capabilities of networks automate many tasks that would otherwise have required human users.

Mostrar más Leer menos
Grado
IT101










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Información del documento

Subido en
21 de agosto de 2024
Número de páginas
21
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

COMPUTER NETWORKS
Straighterline IT101 Information Technology Fundamentals Graded Topic Test
(New Version August 2024)
We are a team of experts offering course/class attendance (including final proctored exams!!) for all
Straighterline, Online ATI, HESI, NCLEX, Portage Learning, Sophia, Nursing, Business etc courses.
We also write essays, discussion posts, research papers and school assignments. Should you need any
of these services, Contact us via email: or WhatsApp: +1 (540) 753-5914.
Guaranteed Passing!




Step 1 of 1
Question 1 of 42
Question 1
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Kevin’s work situation sometimes allows him the flexibility of working from home.
When he does so, he accesses his workstation at the office by logging on to it through
the Internet. While he is using his workplace computer from home, his workplace
computer is what type of computer in relation to him?

second-person

remote

unsecured

virtual
Correct.
Question 2 of 42
Question 2
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Which of the following is not a common way to view a computer network?

the physical level

,the software level

the user interface level

the logical level
Correct.
Question 3 of 42
Question 3
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Fiber optic cables transmit what type of signal in place of electromagnetic waves?

sound waves

its and bytes

light pulses

radio waves
Correct.
Question 4 of 42
Question 4
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Which of the following is not a network device that may be used to connect multiple
computers together?

a network hub

a network switch

a router

, All of the above are used to connect multiple computers together.
Correct.
Question 5 of 42
Question 5
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
Which of the following is a significant example of a circuit switched network?

telephone network

internet

radio tower networks

all of the above
Correct.
Question 6 of 42
Question 6
This is not a form; we suggest that you use the browse mode and read all parts of the
question carefully.
In what network topology is a single cable the actual network, with each device
connected to that single cable?

mesh topology

bus topology

ring topology

star topology
Correct.

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
AmazingGrace Western Governer\'s University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1655
Miembro desde
3 año
Número de seguidores
1193
Documentos
9304
Última venta
3 días hace

4.1

381 reseñas

5
224
4
57
3
49
2
13
1
38

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes