1.
You need a network that provides a centralized authentication for your users. Which of the following logical topologies should you use?
Correct Answer
C. Client/Server
Explanation
A client/server topology is the most suitable choice for providing centralized authentication for users. In this topology, there is a central server that manages user authentication and authorization, while the clients connect to the server for authentication purposes. This allows for a centralized and controlled access to resources, ensuring security and efficient management of user accounts. VLANs are used for network segmentation, peer-to-peer topology lacks centralized control, and mesh topology is more suitable for redundancy and fault tolerance, rather than centralized authentication.
2.
You need a topology that is scalable to use in your network. Which of the following will you install?
Correct Answer
C. Star
Explanation
A star topology is the most scalable option for a network. In a star topology, all devices are connected to a central hub or switch, allowing for easy expansion by simply adding more devices to the central hub. This makes it flexible and scalable, as new devices can be added without disrupting the entire network. Additionally, it provides better performance and reliability compared to other topologies like bus or ring, as any failure in one device does not affect the entire network. Therefore, installing a star topology would be the best choice for a scalable network.
3.
Which of the phyiscal topologies has the least likelihood of having a collision?
Correct Answer
D. Mesh
Explanation
Mesh topology has the least likelihood of having a collision because it provides a dedicated point-to-point connection between each device. In a mesh network, each device is directly connected to every other device, eliminating the need for data to pass through multiple devices before reaching its destination. This reduces the chances of collisions as there is no shared medium for data transmission. In contrast, bus, star, and ring topologies involve shared media or a central hub, which increases the likelihood of collisions.
4.
In a phyiscal Star topology , what happens when a workstation loses it phyiscal connection to another device?
Correct Answer
B. Only that work station loses ability to communicate
Explanation
When a workstation loses its physical connection to another device in a physical Star topology, only that workstation loses the ability to communicate. The rest of the network remains unaffected and communication between other devices can still occur.
5.
You want to remotely log onto an office computer using remote desktop in a secure manner. Which of the following should you use?
Correct Answer
A. VPN
Explanation
A VPN (Virtual Private Network) should be used to remotely log onto an office computer using remote desktop in a secure manner. A VPN creates a secure and encrypted connection over a public network, such as the internet, allowing users to access resources on a private network as if they were directly connected to it. This ensures that the data transmitted between the remote device and the office computer is protected from unauthorized access or interception.
6.
What is a logical grouping of network users and resources connected to administratively defined ports on a switch?
Correct Answer
C. VLAN
Explanation
A VLAN, or Virtual Local Area Network, is a logical grouping of network users and resources connected to administratively defined ports on a switch. It allows for the segmentation of a network into multiple virtual networks, each with its own set of users and resources. This enables better network management, security, and efficiency by isolating traffic and controlling access between different VLANs.
7.
Which of the following is a concern when using a Peer to Peer network?
Correct Answer
C. The security associated with such a network
Explanation
A concern when using a Peer to Peer network is the security associated with such a network. Peer to Peer networks are decentralized and rely on individual computers to share resources and information. This decentralized nature can make it difficult to implement strong security measures and control access to sensitive data. Without proper security measures in place, there is a risk of unauthorized access, data breaches, and potential malware or virus infections spreading through the network. It is important to ensure that appropriate security protocols, such as encryption and authentication, are implemented to protect the network and its users.
8.
Which of the following is an exsample of when a point to multipoint network is called for?
Correct Answer
A. When a centralized office needs to communicate with many branch offices
Explanation
A point to multipoint network is called for when a centralized office needs to communicate with many branch offices. In this scenario, a single central location can transmit data to multiple remote locations simultaneously, allowing for efficient communication and coordination between the central office and the branches. This type of network is ideal for scenarios where there is a need for one-to-many communication, such as distributing updates, sharing information, or coordinating operations across multiple locations.
9.
Which of the following is an exsample of a LAN?
Correct Answer
D. A computer connected to another one to share resources
Explanation
The correct answer is "A computer connected to another one to share resources." This is an example of a Local Area Network (LAN) where two computers are connected to each other to share resources such as files, printers, or an internet connection. A LAN typically covers a small area, such as a home, office, or school, and allows for easy communication and resource sharing between connected devices.
10.
Which of the following is a disatantage of a Star topology?
Correct Answer
B. When the central concertrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network
Explanation
In a Star topology, all devices are connected to a central concentrating device, such as a switch or hub. This central device acts as a single point of failure. If this central device experiences a complete failure, all the attached devices lose connectivity to the rest of the network. This is a disadvantage of the Star topology as it can result in a complete network outage if the central device fails.
11.
What is the difference between a LAN and a WAN?
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above". This means that all of the given statements are true and explain the difference between a LAN and a WAN. The first statement states that WANs need a special type of router port, which is true as WANs often require specific hardware to connect to the internet. The second statement states that WANs cover large geographical areas, which is also true as WANs are designed to connect devices over long distances. The third statement states that WANs can utilize either private or public data transport, which is true as WANs can use various types of networks for data transmission.
12.
What does VPNstand for?
Correct Answer
C. Virtual Private Network
Explanation
A VPN stands for Virtual Private Network. It is a technology that allows users to create a secure and encrypted connection over a public network, such as the internet. This enables users to access resources and share data privately and securely, as if they were directly connected to a private network. VPNs are commonly used by individuals and organizations to protect their online privacy, bypass censorship or geo-restrictions, and secure their sensitive information while using public Wi-Fi networks.
13.
In what type of network are all computers considered equals and do they not share any central authority?
Correct Answer
A. Peer to Peer
Explanation
In a peer-to-peer network, all computers are considered equals and there is no central authority. This means that each computer can act as both a client and a server, allowing them to directly communicate and share resources with each other without the need for a central server. This decentralized structure provides greater flexibility and resilience compared to client/server networks where there is a central authority controlling the network.
14.
What advantages does the client/server architecutre have over peer to peer?
Correct Answer
D. All of the above
Explanation
The client/server architecture has advantages over peer-to-peer in terms of easier maintenance, greater organization, and tighter security. With client/server, maintenance is simplified as updates and fixes can be applied centrally on the server, reducing the need for individual updates on each client. The architecture also offers greater organization as resources and data are centralized on the server, making it easier to manage and access. Additionally, client/server provides tighter security as access to resources can be controlled and monitored more effectively, reducing the risk of unauthorized access or data breaches.
15.
An exsample of Hybrid network is which of the following?
Correct Answer
A. Ethernet
Explanation
Ethernet is an example of a hybrid network because it combines both wired and wireless technologies. It uses wired connections for the backbone infrastructure, such as switches and routers, while also supporting wireless connections for devices like laptops and smartphones. This combination allows for flexibility and scalability in network design, making it suitable for a variety of environments and applications.
16.
You have a network with multiple devices and need to have a smaller broadcast domain while working with a tighter budget. Which of the following is the best solution?
Correct Answer
D. Create VLAN's
Explanation
Creating VLANs is the best solution for having a smaller broadcast domain while working with a tighter budget. VLANs allow for logical segmentation of a network, allowing devices to be grouped together based on their function or department. This reduces the size of the broadcast domain, as broadcasts are only sent to devices within the same VLAN. VLANs can be implemented using existing switches, making it a cost-effective solution compared to adding more hubs or switches. Using a static IP address would not address the issue of broadcast domain size.
17.
What type of topology has the greatest number of phyiscal connections?
Correct Answer
D. Mesh
Explanation
A mesh topology has the greatest number of physical connections. In a mesh network, each device is connected to every other device, forming a fully interconnected network. This means that there are multiple direct connections between devices, resulting in a large number of physical connections. This type of topology provides high redundancy and fault tolerance, as data can be rerouted through different paths if one connection fails. However, it also requires a significant amount of cabling and can be complex to set up and manage.
18.
What type of topology gives you a direct connection between two routers so that there is one connections path?
Correct Answer
A. Point to Point
Explanation
Point-to-Point topology gives a direct connection between two routers, allowing for a single connection path. In this type of topology, each router is connected directly to another router without any intermediate devices. This creates a dedicated and private connection between the two routers, ensuring efficient and secure communication.
19.
What network topology is a combination of two or more types of physical or two or more types of logical topologies?
Correct Answer
B. Hybrid
Explanation
A hybrid network topology is a combination of two or more types of physical or logical topologies. It allows for flexibility and scalability by integrating different network structures. This combination can be achieved by connecting different types of topologies such as bus, star, ring, or mesh. It provides the advantages of multiple topologies while mitigating their limitations. Therefore, a hybrid network topology is the correct answer to the given question.
20.
When designing a network and deciding which type of network topology to use, which item(s) should be considered? SELECT ALL THAT APPLY!
Correct Answer(s)
A. Cost
B. Ease of installation
C. Ease of maintance
D. Fault tolerance requirements
Explanation
When designing a network and deciding which type of network topology to use, several factors should be considered. Cost is an important consideration as different network topologies may vary in terms of their equipment and infrastructure costs. Ease of installation is another crucial factor as some topologies may require more complex installation processes than others. Ease of maintenance is also significant as certain topologies may be easier to manage and troubleshoot in case of any issues. Additionally, fault tolerance requirements should be taken into account to ensure that the network can handle failures and maintain uninterrupted connectivity.