Computer Networking Past Paper PDF
Document Details
Uploaded by HonorableChalcedony4970
STI College
Tags
Summary
This is a computer networking exam paper. It contains multiple-choice questions about network concepts, including network topologies, devices, and layers. The document is suitable for secondary school students studying computer networking or computer science.
Full Transcript
Test on Key Concepts of Computer Networking 1. What is the primary purpose of computer networking? a) To send and receive emails only b) To link computers for shared resources c) To enable web browsing, sending emails, sharing files, and downloading media d) To connect computers for gaming purposes...
Test on Key Concepts of Computer Networking 1. What is the primary purpose of computer networking? a) To send and receive emails only b) To link computers for shared resources c) To enable web browsing, sending emails, sharing files, and downloading media d) To connect computers for gaming purposes 2. Which network category is used to connect devices within a single building or a limited area? a) Metropolitan Area Network (MAN) b) Wide Area Network (WAN) c) Local Area Network (LAN) d) Personal Area Network (PAN) 3. Which of the following networks spans multiple cities or large geographic areas? a) Personal Area Network (PAN) b) Local Area Network (LAN) c) Campus Area Network (CAN) d) Metropolitan Area Network (MAN) 4. In network architecture, which of the following describes the role of data center networks? a) Provide connectivity to users in remote locations b) Link multiple servers and data to make them accessible to users c) Connect devices within a single office d) Secure network traffic between users 5. What is the role of the Transport Layer in the OSI Model? a) It establishes, manages, and terminates sessions. b) It deals with data translation and encryption. c) It ensures error-free end-to-end delivery of data. d) It provides routing and addressing information. 6. Which layer of the OSI model is responsible for translating data between different formats for applications? a) Physical Layer b) Network Layer c) Presentation Layer d) Application Layer 7. What is the function of the Data Link Layer in the OSI model? a) Defines the electrical and mechanical connections b) Manages error recovery, flow control, and data sequencing c) Routes data between devices on different networks d) Converts data from one format to another 8. Which of the following is true about Wireless Networks compared to Wired Networks? a) Wireless networks are faster than wired networks. b) Wireless networks provide mobility but can be slower and have potential security issues. c) Wireless networks require more specialized tools for installation. d) Wireless networks do not use radio signals for communication. 9. What does a Hub do in a wired network? a) Provides a secure connection between devices b) Broadcasts data to all devices connected to it c) Directs data only to the intended recipient d) Handles data encryption for security 10. Which of the following devices is responsible for monitoring network traffic and enforcing security policies in a network? a) Wireless Router b) Switch c) Firewall d) Cable Modem 11. Which of the following describes the Star Topology? a) Each device is connected to every other device directly. b) All devices are connected to a central hub or switch. c) Devices are connected in a loop, passing data in a circular pattern. d) Devices share a single communication medium in a linear fashion. 12. In a Mesh Topology, what happens when a device fails? a) The entire network goes down. b) The network can still operate via alternate paths c) Other devices can immediately replace the failed device. d) The failure causes all data to be lost. 13. Which of the following is not an advantage of using wired networks over wireless networks? a) Faster data transfer speeds b) Less susceptible to external interference c) Greater mobility d) More secure than wireless networks 14. What is the primary disadvantage of Token Ring topology? a) It is easy to set up and manage. b) It supports high data transfer speeds. c) If an error corrupts the token, communication can stop. d) It is the most widely used network topology today. 15. Which of the following is not a common function of a Router? a) Forwarding data between networks b) Connecting wireless devices to wired networks c) Assigning IP addresses to devices on the network d) Managing network traffic between different subnets 16. A Wi-Fi Modem combines the functionality of which two devices? a) Router and Hub b) Modem and Router c) Switch and Wireless Access Point d) Hub and Firewall 17. Which OSI layer is responsible for creating packets with routing information? a) Transport Layer b) Network Layer c) Data Link Layer d) Session Layer 18. In a Point-to-Point topology, how are devices connected? a) Devices communicate in a circular pattern. b) Devices are connected via a central hub. c) Two devices are directly connected to each other. d) Multiple devices are connected to each other in a line. 19. Which of the following is not a wired network device? a) LAN Ethernet Cable b) Wireless Router c) Hub d) Switch 20. In a Bus Topology, how do devices share the communication medium? a) Each device has exclusive access to the media. b) All devices share the same communication medium, leading to potential data collisions. c) A central device manages data flow. d) Devices are connected in a loop, passing data from one to another. 1. Why is internet privacy important? A) It ensures that third-party companies can access personal information B) It protects users' personal data from identity theft and malicious activity C) It allows users to share more personal information online D) It helps users monitor their online behavior Correct Answer: B) It protects users' personal data from identity theft and malicious activity 2. Which of the following is NOT a technique to protect internet privacy? A) Securing your web browser B) Using a Virtual Private Network (VPN) C) Double-checking unfamiliar links D) Ignoring social media privacy settings Correct Answer: D) Ignoring social media privacy settings 3. What is the primary function of a VPN? A) To store user data in a secure location B) To encrypt incoming and outgoing internet traffic C) To increase internet speed D) To allow unrestricted access to all websites Correct Answer: B) To encrypt incoming and outgoing internet traffic 4. Which of these is the best practice for limiting personal information on social media? A) Posting details like your favorite color and pet’s name B) Setting your social media accounts to private C) Sharing personal data openly for better connectivity D) Avoiding the use of social media altogether Correct Answer: B) Setting your social media accounts to private 5. What does Multi-factor Authentication (MFA) do? A) Protects your password with a secret key B) Adds an extra verification step to log in to an account C) Prevents all types of cyber-attacks D) Automatically changes your password for you Correct Answer: B) Adds an extra verification step to log in to an account 6. Which of the following is a key feature of Wi-Fi Protected Access 3 (WPA3)? A) It encrypts past sessions even if the server’s private key is compromised B) It eliminates the need for passwords entirely C) It connects only trusted devices to the network without encryption D) It automatically secures all web browsers on the network Correct Answer: A) It encrypts past sessions even if the server’s private key is compromised 7. How does an Intrusion Detection System (IDS) protect a network? A) By allowing unrestricted access to external traffic B) By monitoring and analyzing network traffic for malicious activity C) By blocking all incoming traffic to a network D) By providing VPN access for employees Correct Answer: B) By monitoring and analyzing network traffic for malicious activity 8. What is a common consequence of internet and network failures for businesses? A) Increased productivity B) Revenue loss C) Enhanced security measures D) Legal compliance Correct Answer: B) Revenue loss 9. How can frequent internet and network failures impact a company's reputation? A) They can improve trust with clients B) They can damage the company's reputation and imply negligence C) They have no impact on the company’s public image D) They encourage more customers to use the company’s services Correct Answer: B) They can damage the company's reputation and imply negligence 10. What is one method to prevent network downtime and its associated costs? A) Ignore regular monitoring of cables and devices B) Perform occasional internet checks and maintain cables C) Increase the number of employees without network training D) Avoid backup network solutions Correct Answer: B) Perform occasional internet checks and maintain cables 11. What can happen if a business fails to meet deliverables on time due to network failure? A) It may gain a competitive advantage B) It could face legal repercussions C) It will boost employee morale D) It will improve internet security Correct Answer: B) It could face legal repercussions 12. What is the role of a Firewall in network security? A) It monitors and filters incoming and outgoing network traffic to protect against unauthorized access B) It provides encryption for all network communications C) It allows all incoming and outgoing traffic D) It blocks access to trusted websites Correct Answer: A) It monitors and filters incoming and outgoing network traffic to protect against unauthorized access 13. Which of the following best describes an Intrusion Detection System (IDS)? A) A tool that limits the amount of incoming traffic to a network B) A system that scans for known malicious activity and alerts the network administrator C) A hardware device that filters out unnecessary data D) A network that monitors and blocks phishing emails Correct Answer: B) A system that scans for known malicious activity and alerts the network administrator 14. What does the term “forward secrecy” refer to in WPA3? A) It prevents decryption of past sessions even if a server’s private key is compromised B) It secures passwords used in WPA3 devices C) It increases the speed of encrypted connections D) It prevents the use of outdated encryption protocols Correct Answer: A) It prevents decryption of past sessions even if a server’s private key is compromised 15. What is one reason why an organization might experience revenue loss due to internet or network failure? A) Network security measures are too strict B) Transactions and operations are halted during downtime C) Employees are not trained to use internet-based tools D) The company offers free services during downtime Correct Answer: B) Transactions and operations are halted during downtime 16. How can regular network maintenance help reduce downtime costs? A) By creating additional network bottlenecks B) By identifying and repairing faulty cables and devices before they cause problems C) By reducing the number of employees needing network access D) By increasing internet speed without requiring new devices Correct Answer: B) By identifying and repairing faulty cables and devices before they cause problems 17. What happens if a company experiences frequent network or internet failures and does not address them? A) It could lead to a damaged reputation and loss of trust among clients B) It will boost employee efficiency C) It will improve security and data protection D) It will automatically reduce legal risks Correct Answer: A) It could lead to a damaged reputation and loss of trust among clients 18. Which of the following is the best practice to avoid phishing attacks? A) Clicking on all email links without hesitation B) Double-checking the URL of suspicious links before clicking C) Opening attachments from unknown senders D) Ignoring security warnings from browsers Correct Answer: B) Double-checking the URL of suspicious links before clicking