Module 1: Introduction to Networking
In the client-server model, what is the primary secure protocol used for communication between
a browser and a web server?
a. HTTPS
b. TLS
c. HTTP
d. SSL - ANS-c. HTTP
Which two encryption protocols might be used to provide secure transmissions for email
services?
a. HTTP and HTTPS
b. SSL and TLS
c. FTP and SFTP
d. SSH and RDP - ANS-b. SSL and TLS
Which of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix - ANS-d. Ngnix
As you're working to fix a problem with an application, you make multiple changes at once
hoping that something will solve the issues you're having. You end up with more problems than
when you started. Which step, if followed correctly, would have prevented this complication?
a. Identify the problem.
b. Test the theory to determine the cause.
c. Establish a plan of action to resolve the problem and identify potential effects.
d. Document findings, actions, outcomes, and lessons learned. - ANS-a. Identify the problem.
In the event of a fire, the most appropriate failure policy is a __________ policy.
a. power-off
b. fail-close
c. fail-open
d. shutdown - ANS-c. fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers
are connected to a switch, which is connected to a router, which is connected to the Internet.
Which logical networking model does the network use?
a. Hub-and-spoke
b. Ring
In the client-server model, what is the primary secure protocol used for communication between
a browser and a web server?
a. HTTPS
b. TLS
c. HTTP
d. SSL - ANS-c. HTTP
Which two encryption protocols might be used to provide secure transmissions for email
services?
a. HTTP and HTTPS
b. SSL and TLS
c. FTP and SFTP
d. SSH and RDP - ANS-b. SSL and TLS
Which of the following applications could be used to run a website from a server?
a. Hypertext Transfer Protocol
b. FileZilla
c. Microsoft Exchange Server
d. Ngnix - ANS-d. Ngnix
As you're working to fix a problem with an application, you make multiple changes at once
hoping that something will solve the issues you're having. You end up with more problems than
when you started. Which step, if followed correctly, would have prevented this complication?
a. Identify the problem.
b. Test the theory to determine the cause.
c. Establish a plan of action to resolve the problem and identify potential effects.
d. Document findings, actions, outcomes, and lessons learned. - ANS-a. Identify the problem.
In the event of a fire, the most appropriate failure policy is a __________ policy.
a. power-off
b. fail-close
c. fail-open
d. shutdown - ANS-c. fail-open
A network consists of five computers, all running Windows 10 Professional. All the computers
are connected to a switch, which is connected to a router, which is connected to the Internet.
Which logical networking model does the network use?
a. Hub-and-spoke
b. Ring