100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
NWC203c Module 1-3 Questions And Answers With Complete Updates $14.99   Add to cart

Exam (elaborations)

NWC203c Module 1-3 Questions And Answers With Complete Updates

 0 view  0 purchase
  • Course
  • NWC203c
  • Institution
  • NWC203c

NWC203c Module 1-3 Questions And Answers With Complete Updates During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer...

[Show more]

Preview 3 out of 25  pages

  • November 15, 2024
  • 25
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • nwc203c module 1 3
  • NWC203c
  • NWC203c
avatar-seller
Labtech
NWC203c Module 1-3 Questions And Answers With
Complete Updates
1. During a routine inspection, a technician discovered that software that was installed on a computer
was secretly collecting data about websites that were visited by users of the computer. Which type of
threat is affecting this computer?
DoS attack
identity theft
spyware

zero-day attack ANS c


2. Which term refers to a network that provides secure access to the corporate offices by suppliers,
customers and collaborators?
Internet
intranet
extranet

extendednet ANS c


3. A large corporation has modified its network to allow users to access network resources from their
personal laptops and smart phones. Which networking trend does this describe?
cloud computing
online collaboration
bring your own device

video conferencing ANS c


4. What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a protocol that establishes how computers within a local network communicate.
It is a networking device that combines the functionality of several different networking devices in
one

It is an organization that enables individuals and businesses to connect to the Internet. ANS C

,6. An employee at a branch office is creating a quote for a customer. In order to do this, the employee
needs to access confidential pricing information from internal servers at the Head Office. What type
of network would the employee access?
an intranet
the Internet
an extranet

a local area network ANS a


7. Which statement describes the use of powerline networking technology?
A New "smart" electrical cabling is used to extend an existing home LAN.
B A home LAN is installed without the use of physical cabling.
C A device connects to an existing home LAN using an adapter and an existing electrical outlet.

D Wireless access points use powerline adapters to distribute data through the home LAN. ANS c


8. A networking technician is working on the wireless network at a medical clinic. The technician
accidentally sets up the wireless network so that patients can see the medical records data of other
patients. Which of the four network characteristics has been violated in this situation?
A fault-tolerance
B scalability
C security
D Quality of Service (QoS)

reliability ANS c


10. What two criteria are used to help select a network medium from various network media?
(Choose two.)
A. the types of data that need to be prioritized
B. the cost of the end devices utilized in the network
C. the distance the selected medium can successfully carry a signal
D. the number of intermediate devices installed in the network

, E the environment where the selected medium is to be installed ANS c e


11. What type of network traffic requires QoS?
email
on-line purchasing
video conferencing

wiki ANS c


12. A user is implementing security on a small office network. Which two actions would provide the
minimum security requirements for this network? (Choose two.)
A. implementing a firewall
B. installing a wireless network
C. installing antivirus software
D. implementing an intrusion detection system

E. adding a dedicated intrusion prevention device ANS a c


13. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
interfaces that can be protected with passwords. (Choose three.)
A. VTY interface
B. console interface
C. Ethernet interface
D. boot IOS mode
E. privileged EXEC mode

F. router configuration mode ANS B E


14. Which interface allows remote management of a Layer 2 switch?
the AUX interface
the console port interface
the switch virtual interface

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Labtech. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart