WGU C724 Information Systems Management Unit 5 Test

Page 1

WGU C724 Information Systems Management Unit 5 Test

False - ✔[True/False] Coaxial cable is the required medium for telecommunication transmissions. a.) True b.) False TCP/IP - ✔WHAT is a universal telecommunication network protocol that most operating systems can recognize? a.) TCP/IP b.) Ethernet c.) Bluetooth No, a hypervisor is a computer software that enables network virtualization and is not necessary - ✔Are hypervisors or hypervisor applications necessary in small businesses with simple networks? a.) No, a hypervisor is a computer software that enables network virtualization and is not necessary b.) Yes, hypervisor is another name for simple routers and are necessary c.) Yes, hypervisors enable data network links and are necessary Packet transmission and TCP/IP protocol - ✔What are the two fundamental protocols that can describe modern telecom networks? a.) Asynchronous transfer mode and ATM b.) Packet transmission and TCP/IP protocol c.) Circuit transmission and analog signals Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care - ✔Why is it imperative that modern businesses have a social media marketing strategy? a.) Businesses must have a social media marketing strategy to capture this new community of users and to address issues of social care b.) Businesses must target social media because all transactions now are electronic c.) Businesses must target social media because it has replaced TV and radio


The client has control over the applications residing on the server - ✔The Internet is organized as a client/server system. Which of the following statement is FALSE regarding the client/server architecture? a.) All the applications reside on the server b.) The client has control over the applications residing on the server c.) The client sends messages requesting services from the server on the network d.) The client/server architecture maximizes traffic on the network To increase the number of unique IP addresses - ✔The IP version 6 (IPv6) addressing scheme was developed in 2006 for what purpose? a.) To decrease the number of unique IP addresses b.) To increase the number of unique IP addresses c.) To recycle the number of unique IP addresses d.) To improve the performance of the IPv4 addressing scheme False - ✔[True/False] Telegraph technology provided richer quality, more detailed, and a more reliable form of communication than the telephone. a.) True b.) False A hacker attempt to tie up network host resources making them unavailable - ✔What is a denial of service attack? a.) Denial of service is a spoof b.) A hacker attempt to tie up network host resources making them unavailable c.) Denial of service is a network probing process 1G enabled mobile voice telecommunication while 4G offers voice, data and video ✔What is the primary difference between a 1G cellular network and the current 4G network? a.) 1G offered digital circuits while 4G offers packet switching


b.) 1G is the fastest network and is used for converged technology while 4G are voice only c.) 1G enabled mobile voice telecommunication while 4G offers voice, data and video A radio frequency survey is a signal strength detection process to identify the best wireless access point locations - ✔What is a radio frequency survey? a.) A radio frequency survey is a signal strength detection process to identify the best wireless access point locations b.) A radio frequency survey is used to partition the spectrum for wireless networks c.) A radio frequency survey is performed to understand what spectrum wireless networks should use WPA is a tunneling encryption protocol that secures wireless data transmissions ✔Why is WPA (Wireless Protected Access) critical to wireless networks? a.) WPA is a tunneling encryption protocol that secures wireless data transmissions b.) WPA is necessary for accessing information over the web c.) WPA brings all the wireless technologies into a standard protocol Wireless Sensor Networks - ✔What does WSN stands for? a.) Wireless Sensor Networks b.) Wireless System Networks c.) Wireline Sensor Nodes True - ✔[True/False] A virtual private network (VPN) provides a secure, encrypted, and remote connection between employees and the company's server via a third-party Internet service provider. a.) True b.) False False - ✔[True/False] Wireless communication uses radio waves over the optical spectrum to send and receive signals. a.) True b.) False 7 - ✔How many layers are in the standard OSI (Open System Interconnection) model?


a.) 7 b.) 5 c.) 6 They carried continuous electronic waveforms - ✔Which of the following is a characteristic of a legacy or old analog network? a.) They carried continuous electronic waveforms b.) They did not have capacity or bandwidth limitations c.) They require packet switched networks True - ✔[True/False] The internet of Things (IoT) will enable automated, just in time ecommerce transactions. a.) True b.) False URL - ✔A Web browser is required to surf the Internet. What other protocol is needed by a client computer to request a Web site via HTTP or HTTPs? a.) DNS b.) FTP c.) Telnet d.) URL Smartphone - ✔Which of the following portable device combines the functionality of the phone technology with the computing of a desktop or laptop? a.) Smartphone b.) Tablet c.) Netbook d.) iPod Interact with suppliers - ✔Not all organizations utilize an extranet. However, an extranet can provide certain benefits. Which of the following is a benefit of an extranet? a.) Interact with employees b.) Interact with suppliers c.) Interact with customers d.) Store and share information Web enabled storefront - ✔Which of the following application provided by the Internet allows an online retailer to conduct business?


a.) Web forms b.) Electronic communications c.) Web enabled storefront d.) Fax machine Packet Switched Data Networks - ✔What does PSDN stand for? a.) Packet Switched Data Networks b.) Packet Standard Data Node c.) Protocol Standard Data Network RFID - ✔Which of the following technologies is used to track inventory and can be read hundreds at a time, even if the tag is covered? a.) Bar code b.) RFID c.) Wireless sensor networks Copper building wire - ✔Which of the following is not an effective telecommunication medium? a.) CAT 5 cable b.) Fiber optics cable c.) Copper building wire Core routers connect large businesses to the Internet backbone - ✔What is the best definition of a core router? a.) Core routers are used in fiber optics networks b.) Core routers connect large businesses to the Internet backbone c.) Core routers have few protocol capabilities False - ✔[True/False] The virtual layer is the seventh layer of the OSI (Open System Interconnection) model. a.) True b.) False A digital signal is a discrete, non-continuous electrical waveform - ✔Which of the following best defines a digital signal? a.) A digital signal is a packet b.) A digital signal is a discrete, non-continuous electrical waveform


c.) A digital signal is a frequency driven medium Smartphones - ✔WHAT will soon surpass desktop computers accessing the internet? a.) Servers b.) Laptops c.) Smartphones 142 and 212 - ✔Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the Internet Service Provider? a.) 142 and 25 b.) 212 and 1 c.) 25 and 1 d.) 142 and 212 Secured access - ✔Many businesses require their employees use VPN to gain remote access to the corporate network. Which of the following is an advantage of VPN? a.) Secured access b.) Greater flexibility c.) Reduced expense 2.4 GHz - ✔Bluetooth is a wireless protocol that connects nearby devices with peripherals at WHAT level? a.) 64 kbps b.) 2.4 MHz c.) 2.4 GHz True - ✔[True/False] 4G networks provide IP based voice, data, and multimedia traffic. a.) True b.) False Scalability - ✔WHAT is the ability of a network to to grow user and services without forklift upgrades? a.) Expandability b.) Portability c.) Scalability Different networks - ✔A router connects data links from a single network and transmits data packets between WHAT?


a.) Hubs installed between switches b.) Single subnets on the same network c.) Different networks Transmit information in discrete, parsed data encapsulated in packets - ✔Packet switching refers to a computer network's ability to do what? a.) Transmit information in non-discrete, data encapsulated packets b.) Transmit information in discrete, non-parsed packets c.) Transmit information in discrete, parsed data encapsulated in packets A secure platform for internal use - ✔A reliable intranet connection provides organizations and their suppliers and vendors with WHAT? a.) A secure platform for outside consumers to place orders b.) A secure platform for internal use c.) A secure platform to conduct business on the cloud Have more flexibility than they do with a VPN - ✔Cloud computing is becoming more popular because users WHAT? a.) Don't need internet access to get to cloud data b.) Have more flexibility than they do with a VPN c.) Have greater security than they do with a VPN 100,000 kbps - ✔What is the typical broadband data speed of a 4G network? a.) 64 kbps b.) 100,000 kbps c.) 2.4 kbps True - ✔[True/False] Wireless networks enable businesses and their customers or suppliers to collaborate and share data on premises. a.) True b.) False Circuit switch - ✔When streaming data or voice, which type of switched network is used? a.) Packet switch


b.) Circuit switch c.) Analog switch Data terminal equipment - ✔What is another name for a network host? a.) Host computer b.) Data terminal equipment c.) Network server Peer-to-peer topologies connect each user in a network directly - ✔What are peer-topeer network topologies? a.) Peer-to-peer topologies are hierarchical networks b.) Peer-to-peer topologies connect each user in a network directly c.) Peer-to-peer topologies connect each user to the mainframe Banking transactions - ✔For an individual or a business, data can be uploaded to the Internet in many forms. Which of the following data should NOT be communicated on the Internet? a.) Banking transactions b.) Data streaming c.) Personnel files d.) Web pages 25 and 1 - ✔Using the IP address of 142.212.25.1, which two bytes are managed and assigned by the computer administrator to each individual host on the network? a.) 142 and 212 b.) 142 and 25 c.) 212 and 1 d.) 25 and 1 More complexity due to the need for more systems and better improvements in their processing capabilities - ✔The Internet has contributed to a complex network system. Businesses continue to grow and develop a need for more computer-enabled productivity which results in what? a.) More complexity due to the need for more systems and better improvements in their processing capabilities b.) The need for less powerful systems due to cloud computing handling processing power


c.) Less complexity due to the need for more systems and better improvements in their processing capabilities Cellular wireless standards - ✔The term 'generations' is used to describe changes in which type of technology? a.) Network hardware devices b.) Telecommunications protocols c.) Cellular wireless standards Passwords and Login IDs - ✔What information can be gained by sniffing a wireless network? a.) VPN access to a corporate network b.) Passwords and Login IDs c.) Root level access to a computer More scalable than wired networks - ✔Wireless LAN networks are WHAT? a.) More scalable and reliable than wired networks b.) More reliable than wired networks c.) More scalable than wired networks QoS is used to measure performance of data communications - ✔What is QoS (Quality of Service)? a.) QoS is used to ensure fiber optic network performance b.) QoS is used to measure performance of data communications c.) QoS is mostly used to measure data switched networks A sniffer is used to monitor network traffic - ✔What is the purpose of a network sniffer? a.) A sniffer is used to hack into networks b.) A sniffer is used to monitor network traffic c.) A sniffer is used to improve QoS Instant message - ✔While enrolled in a traditional course at a university, you and your instructor can communicate synchronously, face-to-face, in the classroom. However, you can also communicate with your instructor synchronously outside the classroom using which of the following Internet applications? a.) Bulletin board b.) Email c.) Instant message


d.) Blog ARPANET - ✔Several independent parties or governing bodies work together to define the rules that help to manage effective network communications. Which of the following is NOT one of the governing bodies that recommend and decides on telecommunications standards? a.) IOS b.) IEEE c.) IETF d.) ARPANET The most widely used channel for business - ✔Among all the connections - Internet, intranet, and extranet - the Internet is WHAT? a.) A type of extranet for suppliers doing business b.) The second most widely used channel for business c.) The most widely used channel for business Electronic Data Interchange - ✔Which of the following application provided by the Internet allows a business to transfer documents automatically without human intervention? a.) Information repositories b.) Electronic Data Interchange c.) Electronic communications d.) Web forms Response - ✔Spoofing is effective to hackers because it solicits a network WHAT? a.) Authentication b.) Denial of service c.) Response Users - ✔When installing a wireless network, it is important to know the best access point locations and the number of WHAT? a.) Routers b.) Hubs c.) Users Productive - ✔RFID technology helps companies to be more WHAT with inventory management because they eliminate the need for physical handling of materials during cycle counting?


a.) Effective b.) Smart c.) Productive SMTP (Simple Mail Transfer Protocol) - ✔Electronic communications has predominantly become the primary form of communications in first world countries. Which of the following protocol is used to manage and monitor the massive amount of emails that we receive every day? a.) Telnet b.) URL (Universal Resource Locator) c.) DDNS (Dynamic Domain Name System) d.) SMTP (Simple Mail Transfer Protocol) It does not have an operating system like those on desktops and laptops - ✔Most people now use smartphones daily for every aspect of their lives, which includes work, communicating with friends and family, entertainment, shopping, and even healthrelated activities. Which of the following statements regarding smartphones is FALSE? a.) It has unique sensors and functions built for mobility b.) It has ample processing power and electronic storage c.) It does not have an operating system like those on desktops and laptops d.) It combines a cellular phone device with a mobile computer platform


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.