12.07.2015 Views

CIS 150 Final Exam Review Sheet Multiple Choice Identify the ...

CIS 150 Final Exam Review Sheet Multiple Choice Identify the ...

CIS 150 Final Exam Review Sheet Multiple Choice Identify the ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>CIS</strong> <strong>150</strong> <strong>Final</strong> <strong>Exam</strong> <strong>Review</strong> <strong>Sheet</strong><strong>Multiple</strong> <strong>Choice</strong><strong>Identify</strong> <strong>the</strong> choice that best completes <strong>the</strong> statement or answers <strong>the</strong> question.____________________________________1. Which statement describes an advantage of networks?a. Networks require decentralized management.b. Isolating network devices decreases costs.c. Isolating network devices allows implementation of <strong>the</strong> sneakernet file sharing method.d. Networks enable multiple users to share resources.2. A ____ facilitates communication and resource sharing between o<strong>the</strong>r computers on <strong>the</strong> network.a. servlet c. personal computerb. workstation d. server3. ____ networks are <strong>the</strong> most popular type of network for medium- and large-scale organizations.a. Client/server c. Stand-aloneb. Peer-to-peer d. Stationary4. A ____ network is confined to a relatively small space.a. NAN c. WANb. MAN d. LAN5. Often, separate LANs are interconnected and rely on several ____ running many different applications andmanaging resources o<strong>the</strong>r than data.a. workstations c. clientsb. servers d. stand-alone computers6. A ____ network connects clients and servers from multiple buildings.a. NAN c. WANb. MAN d. TAN7. A ____ is a specialized device that allows multiple networks or multiple parts of one network to connect andexchange data.a. segment c. nodeb. host d. connectivity device8. Which network topology is <strong>the</strong> most common?a. ring c. hybridb. star d. E<strong>the</strong>rnet9. ____ are <strong>the</strong> distinct units of data that are exchanged between nodes on a network.a. Segments c. Topologiesb. Packets d. Protocols____ 10. The phenomenon of offering multiple types of communications services on <strong>the</strong> same network is known as____.a. convergence c. divergenceb. unified communications d. multi-communications____ 11. Which type of service supports e-mail?a. management c. accessb. communications d. file


____ 12. Security auditing is handled by ____.a. network management services c. access servicesb. communication services d. Internet services____ 13. Dependability is a characteristic of ____.a. soft skills c. technical skillsb. network communications d. network servers____ 14. ____ is a popular career development tool for job seekers and a measure of an employee’s qualifications foremployers.a. Certification c. Degree auditingb. Evaluation d. Apprenticeship____ 15. The ____ is a specialized United Nations agency that provides developing countries with technical expertiseand equipment to advance those nations’ technological bases.a. ANSI c. ITUb. ISO d. ISOC____ 16. In which OSI model layer does TCP operate?a. Physical c. Networkb. Transport d. Data Link____ 17. Transport layer protocols break large data units into ____.a. PDUs c. framesb. segments d. block IDs____ 18. In which OSI model layer does IP operate?a. Physical c. Networkb. Transport d. Data Link____ 19. Which Data Link sublayer manages flow control?a. LLC c. Management layerb. MAC d. Addressing layer____ 20. Which Data Link sublayer manages access to <strong>the</strong> physical medium?a. LLC c. Management layerb. MAC d. Addressing layer____ 21. In which OSI model layer do hubs operate?a. Physical c. Data Linkb. Network d. Physical and Data Link____ 22. A digital signal composed of a pulse of positive voltage represents a(n) ____.a. 0 c. 4b. 1 d. 8____ 23. The byte 00001110 means ____ on a digital network.a. 3 c. 14b. 6 d. 30____ 24. In modulation, a simple wave called a(n) ____ wave, is combined with ano<strong>the</strong>r analog signal to produce aunique signal that gets transmitted from one node to ano<strong>the</strong>r.a. carrier c. information


. data d. FM____ 25. When signals are free to travel in both directions over a medium simultaneously, <strong>the</strong> transmission isconsidered ____.a. simplex c. half-duplexb. multiplex d. full-duplex____ 26. ____ is a technology used with fiber-optic cable, which enables one fiber-optic connection to carry multiplelight signals simultaneously.a. Statistical multiplexingb. WDM (wavelength division multiplexing)c. TDM (time division multiplexing)d. FDM (frequency division multiplexing)____ 27. The data transmission characteristic most frequently discussed and analyzed by networking professionals is____.a. noise c. throughputb. scalability d. cost____ 28. One of <strong>the</strong> most common transmission flaws affecting data signals is ____.a. noise c. throughputb. attenuation d. latency____ 29. The most significant factor in choosing a transmission method is its ____.a. noise c. throughputb. attenuation d. latency____ 30. Modern LANs use ____ or higher wiring.a. Cat 3 c. RG-6b. Cat 5 d. RG-59____ 31. Serial refers to a style of data transmission in which <strong>the</strong> pulses that represent bits follow one ano<strong>the</strong>r along a____ transmission line.a. long c. secondaryb. short d. single____ 32. ____ describes a popular serial data transmission method.a. EIA/TIA Commercial Building Wiring Standardb. EIA/TIA RS-232 (Recommended Standard 232)c. EIA/TIA 568A standardd. EIA/TIA 568BA standard____ 33. Which term describes <strong>the</strong> hardware that makes up <strong>the</strong> enterprise-wide cabling system?a. wiring board c. network diagramb. patch panel d. cable plant____ 34. The points where circuits interconnect with o<strong>the</strong>r circuits is known as ____.a. entrance facilities c. IDF (intermediate distribution frame)b. cross-connect facilities d. telecommunications closet____ 35. A(n) ____ number is <strong>the</strong> address on a host where an application makes itself available to incoming oroutgoing data.a. port c. destinationb. source d. application


____ 36. ____ is more efficient than TCP for carrying messages that fit within one data packet.a. IP c. ICMPb. UDP d. IGMP____ 37. The subprotocol that enables TCP/IP to internetwork - that is, to traverse more than one LAN segment andmore than one type of network through a router is ____.a. TCP c. UDPb. ICMP d. IP____ 38. In <strong>the</strong> TCP/IP protocol suite, ____ is <strong>the</strong> core protocol responsible for logical addressing.a. TCP c. IPb. UDP d. ARP____ 39. In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.a. A c. Cb. B d. D____ 40. In dotted decimal notation, a(n) ____ separates each decimal.a. dash c. colonb. slash d. period____ 41. In most cases, BOOTP has been surpassed by <strong>the</strong> more sophisticated IP addressing utility, ____.a. DNS c. DHCPb. RARP d. APIPA____ 42. In IPv6, each address contains a(n) ____, or a variable-length field at <strong>the</strong> beginning of <strong>the</strong> address thatindicates what type of address it is.a. Variable Prefix c. Format Prefixb. Address Prefix d. Field Prefix____ 43. If <strong>the</strong> standard port number for <strong>the</strong> Telnet service is 23, a host whose IPv4 address is 10.43.3.87 has a socketaddress for Telnet of ____.a. 10.43.3.87/23 c. 10.43.3.87-23b. 10.43.3.87:23 d. 23:10.43.3.87____ 44. In <strong>the</strong> domain name www.google.com, ____ is <strong>the</strong> top-level domain (TLD).a. http c. googleb. www d. com____ 45. ____ is a utility that can verify that TCP/IP is installed, bound to <strong>the</strong> NIC, configured correctly, andcommunicating with <strong>the</strong> network.a. ARP c. Telnetb. PING d. FTP____ 46. A physical topology ____.a. specifies device types c. specifies connectivity methodsb. depicts a network in broad scope d. specifies addressing schemes____ 47. Without ____, a bus network would suffer from signal bounce.a. hubs c. terminatorsb. repeaters d. jamming____ 48. In a ring network, each workstation acts as a(n) ____ for <strong>the</strong> transmission.


a. repeater c. terminatorb. amplifier d. manager____ 49. A ____ is simply a linked series of devices.a. star c. ringb. star-wired ring d. daisy-chain____ 50. In packet switching, when packets reach <strong>the</strong>ir destination node, <strong>the</strong> node ____ <strong>the</strong>m based on <strong>the</strong>ir controlinformation.a. disassembles c. reassemblesb. deletes d. separates____ 51. Collectively, MPLS labels are sometimes called a ____.a. header c. frameb. shim d. title____ 52. All E<strong>the</strong>rnet networks, independent of <strong>the</strong>ir speed or frame type, use an access method called ____.a. CSMA c. CSAM/CDb. CSMA/DC d. CSMA/CD____ 53. On an E<strong>the</strong>rnet network, a(n) ____ is <strong>the</strong> portion of a network in which collisions occur if two nodes transmitdata at <strong>the</strong> same time.a. collision domain c. interference domainb. crash domain d. duplicate domain____ 54. The most common 1-Gigabit E<strong>the</strong>rnet standard in use today is ____.a. 1000Base-T c. 10GBase-SRb. 1000Base-SX d. 1000Base-LX____ 55. Within E<strong>the</strong>rnet frame types, <strong>the</strong> ____ signals to <strong>the</strong> receiving node that data is incoming and indicates when<strong>the</strong> data flow is about to begin.a. FCS c. preambleb. header d. frame____ 56. Toge<strong>the</strong>r, <strong>the</strong> FCS and <strong>the</strong> header make up <strong>the</strong> ____-byte “frame” for <strong>the</strong> data.a. 15 c. 21b. 18 d. 24____ 57. NICs contain a(n) ____, which transmits and receives data signals.a. keyboard port c. data transceiverb. mouse port d. antenna____ 58. By far, <strong>the</strong> most popular expansion board NIC today is one that uses a(n) ____ bus.a. onboard c. ExpressCardb. PCIe d. ISA____ 59. PCIe slots vary depending on <strong>the</strong> number of ____ <strong>the</strong>y support.a. lanes c. cardsb. labels d. processors____ 60. Each time a computer starts up, <strong>the</strong> device drivers for all its connected peripherals are loaded into ____.a. ROM c. RAMb. EEPROM d. CMOS


____ 61. In addition to viewing its LEDs and using a loopback plug to test a NIC’s functionality, you can also check aNIC’s connectivity with ____.a. simple commands c. special switchesb. special clients d. special software____ 62. Repeaters operate in <strong>the</strong> ____ layer of <strong>the</strong> OSI model.a. Physical c. Transportb. Network d. Session____ 63. A ____ can interpret physical addressing information.a. repeater c. hubb. switch d. bridge____ 64. Switches that operate anywhere between Layer 4 and Layer 7 are also known as ____ switches.a. peripheral c. contentb. STP d. multiport____ 65. The individual geographic locations connected by a WAN are known as ____.a. WAN sites c. network service providersb. WAN links d. central offices____ 66. Because WAN connections require routers or o<strong>the</strong>r Layer 3 devices to connect locations, <strong>the</strong>ir links are notcapable of carrying ____ protocols.a. open c. routableb. standard d. nonroutable____ 67. On most modern WANs, a ring topology relies on ____ rings to carry data.a. flexible c. serialb. open d. redundant____ 68. ____ WANs are <strong>the</strong> most fault-tolerant type of WAN because <strong>the</strong>y provide multiple routes for data to followbetween any two points.a. Bus c. Meshb. Star d. Tiered____ 69. The ____ encompasses <strong>the</strong> entire telephone system, from <strong>the</strong> wires that enter homes and businesses to <strong>the</strong>network centers that connect different regions of a country.a. SLIP c. PPPb. POTS d. PSTN____ 70. The portion of <strong>the</strong> PSTN that connects any residence or business to <strong>the</strong> nearest CO is known as <strong>the</strong> ____.a. demarcation point c. local loopb. NIU (Network Interface Unit) d. central office____ 71. ____ means that a telephone company connects residential users to its network with fiber-optic cable.a. OLT c. PONb. FITL d. FITH____ 72. ____ is an updated, digital version of X.25 that also relies on packet switching.a. DSL c. Frame relayb. ISDN d. ATM____ 73. A ____ converts digital signals into analog signals for use with ISDN phones and o<strong>the</strong>r analog devices.a. terminal adapter c. smart jack


. DSLAM d. terminator____ 74. ISDN PRI uses ____ B channels and one 64-Kbps D channel.a. 10 c. 23b. 12 d. 32____ 75. A ____ aggregates multiple DSL subscriber lines and connects <strong>the</strong>m to <strong>the</strong> carrier’s CO.a. terminal adapter c. smart jackb. DSLAM d. terminator____ 76. Broadband cable requires many subscribers to share <strong>the</strong> same local line, thus raising concerns about ____ andactual (versus <strong>the</strong>oretical) throughput.a. access c. noiseb. costs d. security____ 77. The data rate of a particular SONET ring is indicated by its ____, a rating that is internationally recognized bynetworking professionals and standards organizations.a. OC (Optical Carrier) level c. BRI (Basic Rate Interface)b. CIR (committed information rate) d. DS0 (digital signal, level 0)____ 78. A directional antenna issues wireless signals along a(n) ____ direction.a. open c. wideb. narrow d. single____ 79. ____ is a significant problem for wireless communications because <strong>the</strong> atmosphere is saturated wi<strong>the</strong>lectromagnetic waves.a. Attenuation c. Diffractionb. Fading d. Interference____ 80. In ____ wireless systems, <strong>the</strong> transmitting antenna focuses its energy directly toward <strong>the</strong> receiving antennawhich results in a point-to-point link.a. mobile c. fixedb. variable d. open____ 81. An 802.11g antenna has a geographic range of ____ meters.a. 20 c. 300b. 100 d. 330____ 82. ____ may use ei<strong>the</strong>r <strong>the</strong> 2.4-GHz or 5-GHz frequency range.a. 802.11a c. 802.11gb. 802.11b d. 802.11n____ 83. ____ is an 802.11n network feature allowing <strong>the</strong> combination of multiple frames into one larger frame.a. Channel bonding c. Frame aggregationb. Channel aggregation d. Frame bonding____ 84. Most satellites circle <strong>the</strong> Earth ____ miles above <strong>the</strong> equator in a geosynchronous orbit.a. 100 c. 6,000b. 1240 d. 22,300____ 85. To establish a satellite Internet connection, each subscriber must have a ____.a. dish antenna c. dish pathwayb. line-of-sight antenna d. source pathway


____ 86. In ____ addressing, <strong>the</strong> network information portion of an IPv4 address is limited to <strong>the</strong> first 8 bits in a ClassA address.a. classful c. statefulb. subnet d. limited____ 87. In classful addressing, Class C IPv4 address host information is located in <strong>the</strong> ____.a. last 8 bits c. first 8 bitsb. last 16 bits d. first 16 bits____ 88. When using classful IPv4 addressing, a network ID always ends with an octet of ____.a. 0 c. 1b. 00000000 d. 255____ 89. The ____ gateway is <strong>the</strong> gateway that first interprets its outbound requests to o<strong>the</strong>r subnets, and <strong>the</strong>ninterprets its inbound requests from o<strong>the</strong>r subnets.a. proxy c. Internetb. core d. default____ 90. The gateways that make up <strong>the</strong> Internet backbone are called ____ gateways.a. proxy c. Internetb. core d. default____ 91. The most popular mail server programs are Sendmail and ____.a. Eudora c. AOL mailb. Microsoft Outlook d. Microsoft Exchange Server____ 92. SMTP operates from port ____.a. 25 c. 110b. 11 d. 250____ 93. POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.a. 25 c. 110b. 11 d. 250____ 94. The ____ utility allows you to view a host’s routing table.a. nbstat c. digb. pathping d. route____ 95. ____ is <strong>the</strong> most widely implemented virtualization software today.a. Hyper-V c. VirtualBoxb. Citrix d. VMware____ 96. To connect to a network, a virtual machine requires a ____.a. virtual switch c. physical switchb. virtual adapter d. virtual MAC address____ 97. Upon creation, each vNIC is automatically assigned a ____.a. MAC address c. block addressb. switch address d. reference address____ 98. ____ connect vNICs with a network, whe<strong>the</strong>r virtual or physical.a. Virtual routers c. Virtual duplexersb. Virtual crossovers d. Virtual bridges


____ 99. ____ refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.a. Dialed networking c. Dial-up networkingb. Traditional networking d. Virtual networking____ 100. ____ is an open source system designed to allow one workstation to remotely manipulate and receive screenupdates from ano<strong>the</strong>r workstation.a. Remote Desktop c. Citrixb. VNC d. Xen____ 101. In a ____ VPN, tunnels connect multiple sites on a WAN.a. site-to-site c. client-to-clientb. site-to-client d. link-to-line____ 102. On network diagrams, <strong>the</strong> Internet is frequently depicted as a ____.a. block c. lineb. cloud d. lightening bolt____ 103. In ____, each datagram can follow one of many paths to reach its destination.a. circuit switching c. packet switchingb. line switching d. data switching____ 104. ____ desktops are desktop operating environments hosted virtually, on a different physical computer from <strong>the</strong>one with which <strong>the</strong> user interacts.a. Virtual c. Materialb. Physical d. Guest____ 105. ____ is a social engineering practice in which a person attempts to glean access or au<strong>the</strong>ntication informationby posing as someone who needs that information.a. Cracking c. War drivingb. Hacking d. Phishing____ 106. ____ software searches a node for open ports.a. Phishing c. Au<strong>the</strong>nticationb. Sniffing d. Port scanner____ 107. A router that is not configured to drop packets that match certain or suspicious characteristics is an exampleof a risk associated with ____.a. people c. protocols and softwareb. transmission and hardware d. Internet access____ 108. A ____ attack occurs when a system becomes unable to function because it has inundated with requests forservices and can’t respond to any of <strong>the</strong>m.a. flashing c. war drivingb. denial-of-service d. phishing____ 109. A ____ firewall is a router (or a computer installed with software that enables it to act as a router) thatexamines <strong>the</strong> header of every packet of data it receives to determine whe<strong>the</strong>r that type of packet is authorizedto continue to its destination.a. packet-filtering c. proxyb. gateway d. selective____ 110. A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in adictionary to gain access to <strong>the</strong> network.a. flashing c. dictionary


. denial-of-service d. brute force____ 111. A ____ attack occurs when a hacker tries numerous possible character combinations to find <strong>the</strong> key that willdecrypt encrypted data.a. flashing c. dictionaryb. denial-of-service d. brute force____ 112. The use of certificate authorities to associate public keys with certain users is known as ____.a. PGP c. IPSecb. PKI d. SSL____ 113. A VPN ____ au<strong>the</strong>nticates VPN clients and establishes tunnels for VPN connections.a. router c. concentratorb. service d. certificate authority____ 114. RADIUS and TACACS belong to a category of protocols known as AAA (____).a. access, authorization, and accountingb. au<strong>the</strong>ntication, authorization, and accountingc. au<strong>the</strong>ntication, authorization, and authorityd. au<strong>the</strong>ntication, authorization, and access____ 115. ____ is <strong>the</strong> use of one network to simultaneously carry voice, video, and data communications.a. Multicasting c. Divergenceb. Unicasting d. Convergence____ 116. IPTV, videoconferencing, streaming video, and IP multicasting belong to <strong>the</strong> range of services known as____.a. voice over IP c. video over IPb. data over IP d. Web over IP____ 117. ____ messaging is a service that makes several forms of communication available from a single userinterface.a. Unified c. Diversifiedb. Instant d. Open____ 118. Using VoIP over a WAN allows an organization to avoid paying long-distance telephone charges, a benefitknown as ____.a. charge bypass c. toll bypassb. distance bypass d. easypass____ 119. In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.a. IP-PBX c. Data PBXb. analog PBX d. IT-PBX____ 120. When a caller uses an IP telephone, his or her voice is immediately digitized and issued from <strong>the</strong> telephone to<strong>the</strong> network in ____ form.a. segment c. circuitb. frame d. packet____ 121. ____ signaling functions are more limited than those performed by <strong>the</strong> protocols in <strong>the</strong> H.323 group.a. RTCP c. MEGACOb. MGC d. SIP____ 122. SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.


a. call signaling onlyb. control onlyc. call signaling and controld. communication between media gateways____ 123. A(n) ____ is a computer that manages multiple media gateways.a. MPLS c. MEGACOb. MGCP d. MGC____ 124. Many network engineers consider ____ to be superior to MGCP.a. SIP c. MEGACOb. RTCP d. MGC____ 125. ____ are often considered first-level support.a. Help desk coordinators c. Administratorsb. Help desk analysts d. Network specialists____ 126. ____ is one of <strong>the</strong> most important aspects to consider when looking at how a problem solution might affectusers and network functionality.a. Cost c. Scalabilityb. Scope d. Security____ 127. A ____ is a document (preferably online) that lists every service and software package supported within anorganization, plus <strong>the</strong> names of first- and second-level support contacts for those services or softwarepackages.a. call tracking list c. supported services listb. help desk program list d. change management list____ 128. A ____ system is a process or program that provides support personnel with a centralized means ofdocumenting changes to <strong>the</strong> network.a. release management c. change documentb. asset management d. change management____ 129. A____ is a small electronic device that issues a signal on a wire pair.a. tone locator c. tone generatorb. probe kit d. probe____ 130. ____ is a fundamental property of wire that depends on a wire’s molecular structure and size.a. Voltage c. Resistanceb. Current d. Impedance____ 131. Resistance is measured in ____.a. ohms c. centimetersb. hertz d. volts____ 132. When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor atone end of <strong>the</strong> cable.a. resistance c. voltageb. impedance d. current____ 133. The danger in using a ____ is that it could collect more information than you or <strong>the</strong> machine can reasonablyprocess.a. cable continuity tester c. protocol analyzerb. multimeter d. wireless network tester


____ 134. A ____ is a program that runs automatically, without requiring a person to start or stop it.a. virus c. botb. worm d. Trojan horse____ 135. A(n) ____ virus disguises itself as a legitimate program to prevent detection.a. stealth c. time dependentb. encrypted d. polymorphic____ 136. ____ detects malware by comparing current characteristics of files and disks against an archived version of<strong>the</strong>se characteristics to discover any changes.a. Integrity checking c. Signatureb. Polymorphic d. Heuristic____ 137. A(n) ____ is a deviation from a specified level of system performance for a given period of time.a. fault c. errorb. failure d. hoax____ 138. ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant datastorage for a network.a. NAS c. SANsb. RAID d. Optical media____ 139. ____ are distinct networks of storage devices that communicate directly with each o<strong>the</strong>r and with o<strong>the</strong>rnetworks.a. NAS c. SANsb. RAID d. Optical media____ 140. ____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read datafrom it.a. Tape backup media c. Fiber optic mediab. Optical media d. USB____ 141. A(n) ____ is a graphical representation of a network’s devices and connections.a. Multi Router Traffic Grapher c. wiring schematicb. network diagram d. event viewer____ 142. A(n) ____ is a graphical representation of a network’s wired infrastructure.a. Multi Router Traffic Grapher c. wiring schematicb. network diagram d. event viewer____ 143. ____ management refers to monitoring how well links and devices are keeping up with <strong>the</strong> demands placedon <strong>the</strong>m.a. Performance c. Networkb. Fault d. Configuration____ 144. ____ management refers to <strong>the</strong> detection and signaling of device, link, or component faults.a. Performance c. Networkb. Fault d. Configuration____ 145. The process where one network management console collects data from multiple networked devices at regularintervals is known as ____.a. base lining c. pollingb. interrogating d. pushing


____ 146. A network management agent is a ____ that collects information about a device’s operation and provides it to<strong>the</strong> network management application.a. software routine c. GUIb. hardware device d. probe____ 147. ____ involves manipulating certain characteristics of packets, data streams, or connections to manage <strong>the</strong> typeand amount of traffic traversing a network or interface at any moment.a. Traffic monitoring c. Traffic pollingb. Traffic routing d. Traffic shaping____ 148. ____ is <strong>the</strong> local storage of frequently needed files that would o<strong>the</strong>rwise be obtained from an external source.a. Swapping c. Cachingb. Paging d. Segmentation____ 149. A ____ is a correction, improvement, or enhancement to a software application.a. revision c. patchb. change d. software upgrade____ <strong>150</strong>. A networked ____ is perhaps <strong>the</strong> simplest device to add.a. workstation c. printerb. hub d. server

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!