Pogi si Wensten
Pogi si Dean
Pogi si Vice President
We love maam Lacsamana
100

Through the use of ______, we are connected like never before.

a. Networks    

b. Routers    

c. Databases    

d. Servers

100

Diagrams of networks often use ______ to represent the different devices and connections
that make up a network.

a. Indicators    

b. Cables    

c. Symbols    

d. Nodes

100

A ______ provides an easy way to understand how devices connect in a large network.

a. Connection chart    

b. Diagram    

c. Cables    

d. Network Map

100

_________ refers to the technologies that support the infrastructure and the
programmed services and rules, or protocols, that move data across the network.

a. Network Architecture    

b. Network Protocol    

c. Network Framework

d. Network Model 

200

All computers that are connected to a network and participate directly in network
communication are classified as _______.

a. Nodes        

b. Clients    

c. End devices    

d. Hosts

200

The two types of network infrastructures are ________. 

a. Wired and wireless

b. Local Area Networks (LAN) and Wide area networks (WAN)

c. Public and Private networks

d. Peer-to-Peer and Client-Server 

200

_______ internet connections include cable, DSL, Cellular, Satellite, and Dial-up telephone.

A. Corporate            

B. Metropolitan

C. SOHO               

D. Data center

200

There are several common external and internal ______ to ______.

A. risks to data            

B. attacks to servers    

C. threats to networks    

D. vulnerabilities to  systems

300

Business internet connections include: Dedicated Leased Line, Metro Ethernet, Business DSL, and ______



Satellite

300

The Cisco Certified ______ Associate certification demonstrates your knowledge of
foundational technologies.



Network

300

The four basic characteristics of network architecture are Fault Tolerance, Scalability, Quality of Service (QoS), and ______.

Security

300

The recent networking trends that affect organizations and consumers are: Bring Your Own Device (BYOD), online collaboration, video communications, and ________.

cloud computing

400

Larger networks and corporate networks use antivirus, antispyware, and firewall filtering, but they also have other security requirements. Give two security requirements.

Dedicated firewall systems, access control lists (ACL), intrusion prevention systems (IPS), and virtual private networks (VPN)

(Any of two from the four)

M
e
n
u