Networking Module 3 Quiz
27 Questions
100 Views

Networking Module 3 Quiz

Created by
@SlickBinary8749

Questions and Answers

Which file-sharing protocol distributes the role of a file server across a collection of dispersed computers?

  • HTTP
  • BitTorrent (correct)
  • SMTP
  • FTP
  • If you wish to set up a file in your home network so that others can look at it but not change it, what is the permission for that?

    Read

    What is the glue that holds the Internet together and makes it possible for data to travel across borders?

    A set of standard protocols that were developed for the original ARPANET

    Which type of network topology connects multiple devices to a central device?

    <p>Star</p> Signup and view all the answers

    If your Internet connection's packet loss is zero, what does this mean?

    <p>The action in a video game you are playing will be smooth</p> Signup and view all the answers

    If your usual DNS server goes down, what might you do to bypass the problem?

    <p>Use one of Google's public domain name servers</p> Signup and view all the answers

    DSL is an example of what type of Internet access?

    <p>Fixed</p> Signup and view all the answers

    What is the feature that allows you to turn your mobile phone into a hotspot?

    <p>Tethering</p> Signup and view all the answers

    What caused the alarm to go off when forgetting to pay for an item while shopping?

    <p>Tag</p> Signup and view all the answers

    What should be your first step when setting up a home router?

    <p>Set up a new password for configuring the router</p> Signup and view all the answers

    Which type of communication protocol converts data into standard formats that can be used by applications?

    <p>Arrival</p> Signup and view all the answers

    What should I configure to ensure visitors using my WiFi cannot access shared files on my desktop computer?

    <p>Guest network</p> Signup and view all the answers

    If your cable Internet service is delivering less than the speed quoted, what does this mean?

    <p>Other users are competing with you for the bandwidth your cable company has from the Internet</p> Signup and view all the answers

    The bandwidth of a channel that carries digital data is usually measured in ___________.

    <p>bits per second</p> Signup and view all the answers

    When activating encryption on her router, what should Maria avoid picking as it is the weakest and oldest option?

    <p>WEP</p> Signup and view all the answers

    Internet addresses are controlled by which of the following protocols?

    <p>IP</p> Signup and view all the answers

    What type of IP address would you want to run a Web server or FTP server from your home?

    <p>Static</p> Signup and view all the answers

    How would Scout find out how many packets are being sent from and received by her Mac?

    <p>Opens Activity Monitor and clicks on the Network tab</p> Signup and view all the answers

    If your Internet connection's download speed is twice your upload speed, what does this mean?

    <p>Asymmetric</p> Signup and view all the answers

    What would Jared's wife correctly point out about using a BitTorrent network?

    <p>It would be illegal to share videos whose copyright is held by someone else on this network</p> Signup and view all the answers

    What does it mean if your IP address on the free WiFi at the Student Center changes from 10.9.32.16 to 10.9.32.85?

    <p>Dynamic</p> Signup and view all the answers

    What are Bluetooth LE, ZigBee, and Z-Wave?

    <p>Low-power, short-range technologies developed for IoT networks</p> Signup and view all the answers

    How can you tell if a hotspot is NOT encrypted?

    <p>No password was required to connect to it the first time</p> Signup and view all the answers

    A wired Ethernet jack looks like:

    <p>A slightly oversized jack for a wired telephone</p> Signup and view all the answers

    Why would I get 'Request timed out' results while doing a traceroute on a site that is actually working?

    <p>One or more of the routers along the path are using defensive security measures</p> Signup and view all the answers

    What type of wire is used to bring a DSL connection into a home?

    <p>The same kind used for standard telephones</p> Signup and view all the answers

    When network protocols clean a corrupted signal, the process is called ______________.

    <p>Error correction</p> Signup and view all the answers

    Study Notes

    File Sharing and Networking Protocols

    • BitTorrent: A decentralized file-sharing protocol that spreads file server roles across multiple computers.
    • Access Permissions: Setting a file in a home network to 'Read' allows others to view it without making changes.
    • Internet Protocols: The foundational protocols developed from ARPANET facilitate seamless data travel across international borders.
    • Network Topology: A star topology connects multiple devices to a central hub, enhancing organization and connectivity.

    Internet Connection Quality

    • Packet Loss: Zero packet loss indicates a smooth experience during activities like gaming.
    • DNS Server Issues: If the primary DNS server fails, Google's public DNS can be utilized as a backup.
    • Cable Internet Speed: Fluctuating speeds below the promised rate may indicate bandwidth contention with other users.

    Home Networking Setup

    • Home Router Configuration: The first step is to set a strong password for router configuration.
    • Guest Network: Configuring a guest network ensures visitors cannot access shared files on personal devices.
    • Static IP Address: Required for running services like a Web or FTP server from home.

    Data Transmission and Security

    • Bandwidth Measurement: Digital data channel bandwidth is measured in bits per second.
    • Encryption Protocols: WEP is an outdated and insecure encryption method; modern standards are recommended.
    • Dynamic IP Addresses: Free WiFi often assigns dynamic IP addresses, leading to changes each connection.

    IoT and Connectivity

    • IoT Technologies: Bluetooth LE, ZigBee, and Z-Wave are low-power, short-range wireless technologies designed for Internet of Things networks.
    • Hotspot Security Indication: A hotspot that requires no password is likely unencrypted.
    • Ethernet Jack Appearance: Resembles a larger version of a standard telephone jack, used for wired connections.

    Diagnostic Tools and Trouble Shooting

    • Tracert/Traceroute: This tool identifies connections along a network path and may show "Request timed out" if routers employ security measures.
    • Signal Integrity: Error correction processes help clean and restore corrupted signals in network protocols.

    Mobile and Alternative Internet Access

    • DSL Connections: The wiring for DSL internet is similar to standard telephone lines, illustrating its legacy technology.
    • Tethering: A feature that allows mobile phones to share their internet connection with devices like laptops.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on key networking concepts and file-sharing protocols with this quiz covering Module 3. Topics include BitTorrent, file permissions, and the infrastructure of the Internet. Perfect for students looking to reinforce their understanding of networking fundamentals.

    Use Quizgecko on...
    Browser
    Browser