Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
CCNA Exploration 1.docx
Скачиваний:
28
Добавлен:
24.11.2018
Размер:
159.44 Кб
Скачать

1.8 Chapter Quiz

1.8.1 Chapter Quiz Page 1:

1.8.1 - Chapter Quiz 1. Which form of communication is a real-time, text-based communication type used between two or more people who use mostly text to communicate with each other?  A. Weblogs  B. Wikis  C. Instant messaging  D. Podcasting  E. Collaboration tools  2. Which type of network provides customers limited access to corporate data such as inventory, parts lists and orders?  A. intranet  B. extranet  C. internetwork  D. Internet  3. What balances the importance of traffic and its characteristics in order to manage data?  A. network administration  B. network traffic  C. Q o S strategy  D. network evaluation  4. Which processes occur to network traffic so that quality of service strategies work correctly? (Choose two.)  A. Traffic is classified based on quality of service requirements.  B. Priorities are assigned to each classification of application data.  C. Web traffic is always assigned to a high priority queue for processing.  D. Digital movies are always assigned to the high-priority queue for processing.  E. E-mail traffic is always assigned to the low priority queue.  5. What are two components of network architecture? (Choose two.)  A. people that comprise the human network.  B. programmed services and protocols that move the messages across the network.  C. data transferred across the network.  D. technologies that support network communications.  E. corporations that operate and maintain the data network.  6. For which three reasons were circuit-switched, connection-oriented technologies rejected when the Internet was being developed? (Choose three.)  A. Circuit-switched technologies required that a single message be broken up into multiple message blocks that contain addressing information.  B. Early circuit-switched networks did not automatically establish alternative circuits in the event of circuit failure.  C. Circuit-switched technologies required that an open circuit between network endpoints be established, even if data was not actively being transferred between locations.  D. The quality and consistency of messages transmitted across a connection-oriented, circuit-switched network could not be guaranteed.  E. The establishment of multiple, simultaneous open circuits for fault tolerance was costly.  7. For which three reasons was a packet-switched, connectionless data communications technology used when developing the Internet? (Choose three.)  A. It can rapidly adapt to the loss of data transmission facilities.  B. It efficiently utilizes the network infrastructure to transfer data.  C. Data packets can travel multiple paths through the network simultaneously.  D. It allows for billing of network use by the amount of time a connection is established.  E. It requires that a data circuit between the source and destination be established before the data can be transferred.  8. What is the role of Q o S in a converged network?  A. Ensures that all traffic above available bandwidth levels is dropped.  B. Establishes delivery priorities for different communication types in a network.  C. Determines precise priorities for all network communication.  D. Allows unused bandwidth to be shared by other organizations within the network.  9. Match the characteristics of a network architecture with their definitions (Not all options are used.)  Characteristics:  Convergence  Scalability  Security  Fault tolerance  Quality of service  Definitions:  Limits the impact of hardware or software failures and provides failure recovery mechanisms.  Supports expansion of the network infrastructure to support new users and applications.  Provides a level of consistent and uninterrupted data delivery to support expectations of users.  Protects confidential and business critical information from theft or alteration.  10. Network security threats can be classified as relating to either network infrastructure security or content security. Classify the security threats according to the appropriate category.  Security threats:  A custodian unplugs an essential network device.  A disgruntled employee alters information in a customer database.  Builders accidentally cut a network cable while digging.  A competitor accesses sensitive information through an unsecured wireless network.  A secretary sends confidential information in reply to an e-mail that falsely appears to come from her boss.  A hacker connects to a network device and changes settings in its management software.  Categories:  Network infrastructure security  Content security

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]