Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION, Exams of Nursing

BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION

Typology: Exams

2024/2025

Available from 06/13/2025

docati-ati
docati-ati šŸ‡ŗšŸ‡ø

1.3K documents

1 / 393

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS
C
o
o
r
r
r
e
c
ct
t
!
Question 2 5 / 5 pts
1
Question 1 5 / 5 pts
A policy in which all exit doors for a building stay unlocked during a fire is an
example of what type of policy?
fail-open
fail-close
fail-tolerant
fail-oriented
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49
pf4a
pf4b
pf4c
pf4d
pf4e
pf4f
pf50
pf51
pf52
pf53
pf54
pf55
pf56
pf57
pf58
pf59
pf5a
pf5b
pf5c
pf5d
pf5e
pf5f
pf60
pf61
pf62
pf63
pf64

Partial preview of the text

Download BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS LATEST SOLUTION and more Exams Nursing in PDF only on Docsity!

BUS 1305 FINAL EXAM QUESTIONS AND ANSWERS

Coorrrecctt!

Question 2 5 /^5 pts

Question 1 5 /^5 pts

A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?

fail-open

fail-close

fail-tolerant

fail-oriented

Coorrrecctt!

Coorrrecctt!

Question 3 5 /^5 pts

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

Layer 4

Layer 5

Layer 6

Layer 7

Question 4 5 /^5 pts

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Federated Users (AD FU)

Active Directory Domain Services (AD DS)

Automated Directory Network Services (AD NS)

Windows Named Resource Services (WN RS)

Coorrrecctt!

Question 5 5 /^5 pts

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer describes the interface between two applications, each on separate computers.

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.

The Presentation layer is responsible for transporting Application layer payloads from one application to another.

Coorrrecctt!

Question 6 5 /^5 pts

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Application

Network

Physical

Data Link

Coorrrecctt!

Question 9 5 /^5 pts

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Toxic Chemical Safety Procedure (TCSP)

Coorrrecctt!

Coorrrecctt!

Question 10 5 /^5 pts

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

Workplace Safety and Hazard Administration (WSHA)

Office Safety and Standards Department (OSSD)

Hazardous Materials and Safety Management (HMSM)

Question 11 5 /^5 pts

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

MAC address

IP address

port address

autonomous system address

Coorrrecctt!

Coorrrecctt!

Question 13 5 /^5 pts

What mail protocol is used to send mail messages to a server?

POP

IMAP

SMTP

HTTPS

Question 14 5 /^5 pts

What statement accurately reflects what occurs when a message is too large to transport on a network?

The message is discarded and must be sent again.

The message is sent anyway, and is received by the destination as garbage data.

Coorrrecctt!

temporary failure

Coorrrecctt!

Question 17 5 /^5 pts

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination.

The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed.

The packet will be dropped silently, requiring the communicating application try again.

The packet will be divided into smaller packets using fragmentation.

Question 18 5 /^5 pts

What is a defining characteristic of a bus topology based network?

Devices are connected to two adjacent devices, and communication priority is granted by a token.

Devices are connected directly to a centralized networking device, known as a network switch.

Devices are daisy-chained together in a single line.

Devices are directly attached to a network router, which forwards data to intended destinations.

Coorrrecctt!

Coorrrecctt!

Question 20 5 /^5 pts

At what layer of the OSI model does a network switch normally operate?

Layer 2

Layer 3

Layer 4

Layer 5

Q u i z S c o r e :

Question 19 100 out of 100^5 /^5 pts

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

Application

Internet

Transport

Link

Question 2 5 /^5 pts

Coorrrecctt!

Coorrrecctt!

Question 3 5 /^5 pts

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?

VoIP PBX

VoIP MTA

VoIP gateway

VoIP translator

Question 4 5 /^5 pts

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?

at least 3 inches

at least 3 feet