Networking Concepts MCQ Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following statements about wired and wireless LANs is correct:

  • Both operate in the lower three layers of TCP/IP protocol suite
  • Wired LANs operate in the lower three layers, and wireless LANs operate in the lower t layers of the TCP/IP protocol suite
  • Both operate in the lower two layers of TCP/IP protocol suite (correct)
  • Wired LANs operate in the lower two layers, and wireless LANs operate in the lower three layers of the TCP/IP protocol suite

A checksum can

  • Only detect errors (correct)
  • Only correct errors
  • Both detect and correct errors
  • None of the above

In a handoff, a mobile station can communicate with two base stations at the same time.

  • Soft (correct)
  • Stateful
  • Hard
  • Medium

The management system monitors and controls the network to ensure that it is running as efficiently as possible:

<p>Performance (A)</p> Signup and view all the answers

Which of the following is an example of random-access protocol:

<p>Polling (B)</p> Signup and view all the answers

Which of the following IP address ranges is reserved for internal use behind a router:

<p>All the above (B)</p> Signup and view all the answers

What are the three most important criteria in the design of an effective and efficient network:

<p>Performance, reliability, and security (A)</p> Signup and view all the answers

RIP uses the services of:

<p>UDP (A)</p> Signup and view all the answers

The original cable TV network used cable end to end:

<p>Coaxial (B)</p> Signup and view all the answers

Transmission delay (time) is the ratio of:

<p>Packet length to transmission rate (A)</p> Signup and view all the answers

In cyclic redundancy checking, what forms the check bits?

<p>Remainder (D)</p> Signup and view all the answers

In routing, the least cost route between any two nodes is the route with the minimum distance:

<p>Distance vector (D)</p> Signup and view all the answers

When the majority of the internet has moved to the IPv6 but some sites continue to use IPv4, which transition strategy should be used?:

<p>Either tunneling or header translation (D)</p> Signup and view all the answers

Routers in path are not allowed to:

<p>All of the above (D)</p> Signup and view all the answers

A LAN is defined by:

<p>The geometric size of the network (A)</p> Signup and view all the answers

In a communication, the media needs to be shared between devices:

<p>Multipoint (C)</p> Signup and view all the answers

The management system is responsible for controlling access to the network based on the pre-defined policy:

<p>Security (C)</p> Signup and view all the answers

A packet-filter firewall filters at the or layer:

<p>Network; transport (B)</p> Signup and view all the answers

In a handoff, a mobile station only communicates with one base station:

<p>Hard (C)</p> Signup and view all the answers

In Manchester and differential Manchester encoding, the transmission at the middle of the bit is used for:

<p>Synchronization (C)</p> Signup and view all the answers

The idea of address aggregation was designed to alleviate the increase in routing table entries when use addressing.

<p>Classless (C)</p> Signup and view all the answers

The Internet protocol (IP) is protocol.

<p>An unreliable (A)</p> Signup and view all the answers

Flashcards

Wired and Wireless LANs TCP/IP Layers

Wired and wireless LANs both operate at the Network and Data Link layers (Layer 2 and 3) of the TCP/IP model.

Checksum: Error Detection

A checksum can only detect errors, it cannot correct them. It calculates a value based on data, and any discrepancy in the calculated vs. received value indicates an error.

Soft Handoff in Mobile Networks

A soft handoff allows a mobile device to communicate with two base stations simultaneously, ensuring continuous connectivity during transitions between cells.

Performance Management System

The performance management system within a network monitors and controls the network's efficiency, ensuring smooth data flow and minimal bottlenecks.

Signup and view all the flashcards

Polling: Random-Access Protocol

Polling is a random-access protocol where a central entity (master) sequentially requests data from individual devices (slaves) on the network.

Signup and view all the flashcards

Private IP Address Ranges

The IP address ranges 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, and 192.168.0.0 - 192.168.255.255 are reserved for internal use behind routers, providing a safe and private internal network.

Signup and view all the flashcards

Network Design Criteria

Effective and efficient network design prioritizes performance (speed and efficiency), reliability (consistent function), and security (protection from unauthorized access).

Signup and view all the flashcards

RIP and UDP

RIP (Routing Information Protocol) uses UDP (User Datagram Protocol) for communication. It relies on UDP's simplicity and speed for efficiently exchanging routing information between routers.

Signup and view all the flashcards

Original Cable TV Network Cable

Coaxial cable was used end-to-end in original cable TV networks for its ability to carry signals over long distances with minimal interference.

Signup and view all the flashcards

Transmission Delay Calculation

Transmission delay is calculated by dividing packet length by the transmission rate. It represents the time taken to send a packet through a network.

Signup and view all the flashcards

CRC Check Bits

In Cyclic Redundancy Checking (CRC), the remainder after dividing data by a specific divisor is used to form the check bits. This remainder helps detect errors in the transmitted data.

Signup and view all the flashcards

Distance-Vector Routing

Distance-vector routing relies on distance (number of hops) to calculate the least-cost route between any two nodes. Each router maintains a vector of distances to other routers in the network.

Signup and view all the flashcards

IPv6 Transition Strategies

When IPv6 becomes the dominant internet protocol, but some sites still use IPv4, tunneling and header translation strategies are used to ensure communication between both protocols.

Signup and view all the flashcards

Router Restrictions

Routers, during packet forwarding, are not allowed to fragment the packet, decapsulate it, or change its source/destination address. These operations are handled by other network devices.

Signup and view all the flashcards

LAN Definition

A LAN is defined by its geometric size, meaning the physical area it covers. The number of devices on a LAN is not the primary defining factor.

Signup and view all the flashcards

Multipoint Communication

In multipoint communication, a single transmission medium is shared by multiple devices, requiring protocols to manage access and avoid collisions.

Signup and view all the flashcards

Security Management System

The security management system is responsible for enforcing network access policies, controlling who can get access to the network and what they can do.

Signup and view all the flashcards

Packet-Filter Firewall Layers

A packet-filter firewall operates either at the Network layer (Layer 3) or the Transport layer (Layer 4) to control and filter network traffic based on rules.

Signup and view all the flashcards

Hard Handoff in Mobile Networks

A hard handoff occurs when a mobile device switches its connection from one base station to another, resulting in a brief interruption in service.

Signup and view all the flashcards

Synchronization in Manchester Encoding

In Manchester and differential Manchester encoding, the signal transition in the middle of a bit is used for synchronization purposes, ensuring the receiver stays aligned with the sender's timing.

Signup and view all the flashcards

Address Aggregation and Classless Addressing

Address aggregation, also known as route summarization, was designed to address the issue of growing routing table entries in networks using classless addressing, where each network can have a unique size.

Signup and view all the flashcards

IP Protocol Reliability

The Internet Protocol (IP) is an unreliable protocol. It does not guarantee delivery of packets or ensure their order of arrival, making it connectionless.

Signup and view all the flashcards

Study Notes

MCQ Answers and Concepts

  • Question 1: Wired LANs operate in the lower three layers, and wireless LANs operate in the lower three layers of the TCP/IP protocol suite.
  • Question 2: A checksum can only detect errors.
  • Question 3: In a handoff, a mobile station can communicate with two base stations simultaneously.
  • Question 4: The stateful management system monitors and controls the network to ensure efficient operation.
  • Question 5: Polling is an example of a random-access protocol.
  • Question 6: IP address ranges 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to 192.168.255.255 are reserved for internal use.
  • Question 7: The three most important criteria for designing an effective network are performance, availability, and security.
  • Question 8: RIP uses the services of IP.
  • Question 9: The original cable TV networks used coaxial cable.
  • Question 10: Transmission delay is the ratio of transmission rate to distance.
  • Question 11: In cyclic redundancy checking, the remainder forms the check bits.
  • Question 12: In distance vector routing, the least cost route is the one with the minimum distance.
  • Question 13: Tunneling combined with header translation is used when the majority of the internet has moved to IPv6, and some sites still use IPv4.
  • Question 14: Routers cannot change the source or destination address of a packet.
  • Question 15: A Local Area Network (LAN) is defined by its topology.
  • Question 16: Multipoint communication requires a shared media between devices.
  • Question 17: The management system controls access based on predefined policies.
  • Question 18: Packet filter firewalls filter at the network or transport layer.
  • Question 19: In a handoff, a mobile station communicates with only one base station.
  • Question 20: In Manchester and differential Manchester encoding, the transmission at the middle of the bit is used for synchronization.
  • Question 21: Address aggregation reduces the number of entries in routing tables.
  • Question 22: The Internet Protocol (IP) is an unreliable protocol.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Use Quizgecko on...
Browser
Browser