




























































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION
Typology: Exams
1 / 393
This page cannot be seen from the preview
Don't miss anything!
BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS
Coorrrecctt!
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
fail-open
fail-close
fail-tolerant
fail-oriented
Coorrrecctt!
Coorrrecctt!
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
Layer 4
Layer 5
Layer 6
Layer 7
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
Active Directory Federated Users (AD FU)
Active Directory Domain Services (AD DS)
Automated Directory Network Services (AD NS)
Windows Named Resource Services (WN RS)
Coorrrecctt!
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?
The Presentation layer describes the interface between two applications, each on separate computers.
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
The Presentation layer is responsible for transporting Application layer payloads from one application to another.
Coorrrecctt!
In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
Application
Network
Physical
Data Link
Coorrrecctt!
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
Toxic Chemical Safety Procedure (TCSP)
Coorrrecctt!
Coorrrecctt!
What federal agency is charged with safety and health in the workplace?
Occupational Safety and Health Administration (OSHA)
Workplace Safety and Hazard Administration (WSHA)
Office Safety and Standards Department (OSSD)
Hazardous Materials and Safety Management (HMSM)
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
MAC address
IP address
port address
autonomous system address
Coorrrecctt!
Coorrrecctt!
What mail protocol is used to send mail messages to a server?
What statement accurately reflects what occurs when a message is too large to transport on a network?
The message is discarded and must be sent again.
The message is sent anyway, and is received by the destination as garbage data.
Coorrrecctt!
temporary failure
Coorrrecctt!
What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?
The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.
The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed.
The packet will be dropped silently, requiring the communicating application try again.
The packet will be divided into smaller packets using fragmentation.
What is a defining characteristic of a bus topology based network?
Devices are connected to two adjacent devices, and communication priority is granted by a token.
Devices are connected directly to a centralized networking device, known as a network switch.
Devices are daisy-chained together in a single line.
Devices are directly attached to a network router, which forwards data to intended destinations.
Coorrrecctt!
Coorrrecctt!
At what layer of the OSI model does a network switch normally operate?
Layer 2
Layer 3
Layer 4
Layer 5
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
Application
Internet
Transport
Link
Coorrrecctt!
Coorrrecctt!
In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?
VoIP PBX
VoIP MTA
VoIP gateway
VoIP translator
In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?
at least 3 inches
at least 3 feet