Networking Concepts PDF
Document Details
Uploaded by JawDroppingMinimalism1600
Rangsit University
Tags
Summary
This document contains multiple-choice questions related to networking concepts. The questions explore various aspects of computer networks, including network topologies, protocols, and devices. The questions are suited to an undergraduate level study or revision.
Full Transcript
# Networking Concepts ## Multiple Choice **1. You are sitting at the local coffee shop, enjoying your favorite latte. You pull out your laptop and, using the wireless network available at the coffee shop, access your email. Which portion of the electromagnetic spectrum is your laptop most lik...
# Networking Concepts ## Multiple Choice **1. You are sitting at the local coffee shop, enjoying your favorite latte. You pull out your laptop and, using the wireless network available at the coffee shop, access your email. Which portion of the electromagnetic spectrum is your laptop most likely using?** a. Ultraviolet waves b. Visible light waves c. Radio waves d. X-rays **2. Which of the following characteristics distinguishes a PAN from other types of networks?** a. A printer is connected to the network. b. The network is intended to be used by one person at a time. c. The network supports wearable devices. d. The network is small in geographical coverage. **3. When you set up a network at your home with a home router, a few computers, a printer, multimedia devices, and your smartphone, which of the following statements is true?** a. You can have several PANs, you have one LAN, and you probably have one WAN connection. b. You can have several LANs, you have one PAN, and you probably have one WAN connection. c. You can have several WANs, you have one MAN, and you probably have one LAN connection. d. You can have several PANs, you have one MAN, and you probably have one LAN connection. **4. Your company's network administrator mentions during a meeting that she has migrated your company's database to a DBaaS. What can deduce about the database, given just this information?** a. The database has been backed up. b. The database is now more secure than it was. c. The database is stored on a cloud provider’s servers. d. The database has been archived. **5. When your work computer requests a web page, which device does the computer communicate with first?** a. Web server b. Local server c. Router d. Switch **6. As you're setting up your home network, you connect one desktop and two laptops to your home router. You then connect your home router to your cable modem. When you test the connection with your desktop, the computer can access websites on the Internet. What functions is your home router providing for your home network?** a. Web server and file server b. Web server and router c. Switch and web server d. Router and switch **7. What computer “language” is spoken over the Internet?** a. WAN b. NAAS c. TCP/IP d. DSL **8. Using a laptop computer with a wireless connection to your company's LAN, you download a web page from the Internet. Which of the following statements can you know is true, given this information?** a. Your web page request crossed at least two LANs. b. Your web page request crossed exactly one LAN. c. Your web page request was handled by exactly one router. d. Your web page request was handled by exactly one switch. **9. Your coworker, Raul, has stored a few documents on his workstation that you and several others in your office access regularly as you’re writing emails to customers. What function is Raul’s computer filling?** a. Web server b. Switch c. Email server d. File server **10. Your family-owned business is growing and has just added a few new employees. The owners decide, for security purposes, that the network needs to be segmented so that only certain people can get to sensitive data. Which of these changes will accomplish this goal most effectively?** a. Add a new WAN. b. Divide the network into two LANs. c. Divide the network into two WANs. d. Add a new PAN. **11. As you're riding the bus to work, you check your email on your smartphone. Your smartphone is using the cellular network to access the email server at your company’s datacenter. What kind of network is this?** a. Local area network b. Personal area network c. Body area network d. Wide area network **12. Which of the following is not an example of a sensor network?** a. A doorbell sends an alert to the homeowner’s smartphone when movement is detected. b. A security camera records some burglars robbing a gas station. c. A robot rejects a circuit board that does not meet manufacturing standards. d. An alarm sounds when water is detected on the datacenter floor. **13. Peggy owns a MacBook but needs to install and use an application that only works on the Windows operating system. How can she use the hardware she has to install and use the application?** a. Wipe the macOS off her MacBook and install Windows instead. b. Spin up a macOS VM in the cloud and install the application on the VM. c. Create a VM on the MacBook and install Windows and the application on the VM. d. Change the hard drive on her MacBook and install Windows and the application on the new hard drive. **14. Which OSI layers does the TCP/IP architecture combine into one?** a. Physical and network b. Network and application c. Application, transport, and physical d. Application, presentation, and session **15. Which of the following protocols functions at the transport layer?** a. HTTP b. TCP c. IP d. SSH **16. Which of the following devices relies on IP addresses to send messages from network to network toward their destination?** a. Routers b. Switches c. Servers d. Workstations **17. As you chat with a friend on social media, what type of connection maintains the immediacy of the conversation?** a. Physical connection b. Logical connection c. Network connection d. Data link connection **18. In what part of a message on the Internet can a router find the destination IP address?** a. Data link layer header b. Application layer header c. Transport layer header d. Network layer header **19. Mae sets up a database in the cloud for her new application, and she configures the database with automatic backups. The application runs on duplicate servers in her local area network. The local area network connects to the Internet through her router that was supplied by her Internet service provider. What is the single point of failure in Mae’s architecture?** a. The database b. The server c. The router d. The Internet **20. Kason creates a server in his private cloud where he will host his new website. Which cloud service model is Kason using for his VM?** a. SaaS b. PaaS c. IaaS d. XaaS # Data and Signals ## Multiple Choice **1. Which of the following is an example of data?** a. Cellular connection between your smartphone and the cell tower b. Bits saved on your hard drive c. Light pulses on a fiber-optic cable d. Wi-Fi signal transmitted through your house **2. What is the essential difference between continuous signals and discrete signals?** a. Number of values within the signal b. Type of data the signal can carry c. Presence of noise d. Waveform shape **3. What is a primary advantage of digital signals over analog signals?** a. Increased complexity b. Infinite number of values c. Can transmit analog data d. Decreased noise **4. Which of the following is NOT a basic component of all signals?** a. Frequency b. Phase c. Bandwidth d. Amplitude **5. What is the frequency in Hz of a signal that repeats 75,000 times in one minute?** a. 3100 Hz b. 1333 Hz c. 3400 Hz d. 1250 Hz **6. What is the period in seconds of a signal that repeats 75,000 times in one minute?** a. .0008 second b. .006 second c. .00075 second d. 1 second **7. What is the spectrum of the human voice?** a. 4200 Hz b. 300 Hz to 3400 Hz c. 30 Hz to 4200 Hz d. 3100 Hz **8. What is the bandwidth of a Wi-Fi channel whose lowest frequency is 2401 MHz (megahertz) and highest frequency is 2423 MHz?** a. 24 MHz b. 2.4 GHz c. 22 MHz d. 5 GHz **9. A signal starts at point X. As it travels to point Y, it loses 8 dB. At point Y, the signal is boosted by 10 dB. As the signal travels to point Z, it loses 5 dB. What is the dB strength of the signal at point Z?** a. -5 dB b. 13 dB c. -3 dB d. 7 dB **10. If a signal starts with a strength of 60 watts and experiences a 3-dB loss in transit to the receiver, what is the power level of the signal at the receiver?** a. 30 watts b. 180 watts c. 57 watts d. 120 watts **11. Incorporating self-clocking in an encoding scheme resulted in a higher** a. bit rate b. data rate c. baud rate d. transmission rate **12. Which encoding scheme has the lowest baud rate?** a. NRZ-L b. Manchester code c. 4B/5B d. 128B/132B **13. What is the equivalent 4B/5B code of the bit string 0001 1000** a. 11110 01001 b. 01001 10010 c. 01001 01111 d. 01001 11011 **14. Which type of shift keying can provide the highest data rates?** a. 8-PSK b. ASK c. QPSK d. FSK **15. If 16-QAM is used to transmit a signal with a baud rate of 10,000, what is the corresponding data transfer rate?** a. 2,000 bps b. 2,500 bps c. 32,000 bps d. 40,000 bps **16. Which of the following statements is true?** a. AM radio uses ASK. b. FM radio uses FSK. c. Wi-Fi uses QAM. d. Cell towers use PAM. **17. Using Shannon’s theorem, calculate the data transfer rate to the nearest whole number given the following information:** > Signal frequency = 10,000 Hz > Signal power = 2000 watts > Noise power = 180 watts a. 10,832 bps b. 45,076 bps c. 13,568 bps d. 35,986 bps **18. Which of these symbols is NOT part of the ASCII character set?** a. Á b. @ c. 9 d. A **19. How many UTF-8 bytes are used for the Unicode symbol U+0041, which represents the English letter A?** a. One b. Two c. Three d. Four **20. Based on the information shown in Figure 3-36, what character encoding scheme does the Cengage website use?** a. ASCII b. Unicode c. UTF-8 d. UTF-16 ## Networking Media ## Multiple Choice **1. Just as you're about to connect your printer to your computer with a USB cable, your coworker walks in the room and says you must shut down your computer first. What USB feature is your coworker apparently not aware of?** a. Dalsy-chaining b. Hot pluggable c. Power delivery d. Full-duplex communication **2. What is one advantage USB-C offers over earlier standards?** a. Reversible plug b. Power delivery c. Backwards compatibility d. Full-duplex connection **3. As you shop for a new Apple device, which of the following ports are you likely to find as options on most of these devices? Choose two.** a. Lightning b. Coaxial c. MTRJ d. Thunderbolt **4. What characteristic of twisted pair cable reduces crosstalk within the cable?** a. External shielding b. Connector type c. Distance limitations d. Twisted wires **5. Your small business has a network at each of two buildings that both use twisted pair cable. You’ve decided to connect these two networks, however, they’re about 150 meters apart. How can you best get a stable signal between the two locations with at least Gigabit Ethernet speeds and without unnecessary expense?** a. Upgrade all network cabling to Cat 8. b. Use coaxial cable for the link between networks. c. Use fiber-optic cable for the link between networks. d. Install a repeater between the two locations with Cat 5e cable. **6. Which category of twisted pair cable currently available for sale offers the fastest data rates while using backwards compatible RJ45 connectors?** a. Cat 6 b. Cat 6a c. Cat 7a d. Cat 8 **7. How many pairs of wires are required for Gigabit Ethernet?** a. 1 b. 2 c. 4 d. 8 **8. As you're planning a cabling installation for a new office location, you notice the drop ceilings and realize this will help installation go faster than having to fish cable through the walls. What special cable rating must you be sure to budget for?** a. Backbone b. EMI c. Gigabit Ethernet d. Plenum **9. What is the primary use for coaxial cable on today’s networks?** a. LAN networking b. Multimedia transmission c. WAN networking d. Digital data transmission **10. True or False: Transmissions on fiber-optic cable do not suffer from noise interference.** **11. Which light source would provide the best performance for a fiber-optic connection?** a. Infrared b. Laser c. LED d. Lightning **12. You just purchased a new home router. As you start setting it up, part of the setup requires you to assign a name to your 5-GHz wireless network. What wireless LAN characteristic does this name define?** a. Frequency b. ESS c. Data rate d. BSS **13. Your company is setting up a Wi-Fi network for a school where multiple user devices need to be able to download files at the same time to reduce congestion. What is the minimum Wi-Fi standard that can accomplish this goal?** a. 802.11n b. 802.11ac c. Wi-Fi 6 d. Wi-Fi 6E **14. Which of the following is not a frequency range used by modern Wi-Fi?** a. 1.2 GHz b. 2.4 GHz c. 5 GHz d. 6 GHz **15. Which of the following characteristics applies to NFC but not Bluetooth?** a. Short-range transmission b. Low power demand c. Wireless power transfer d. Data transfer capability **16. Which wireless signal type would work best to control a garage door opener?** a. IR b. Wi-Fi c. NFC d. Zigbee **17. Which of the following applications most likely uses Infrared?** a. Persistent connection between surround-sound speakers and controller hub b. Sending a print job from a smartphone to a nearby printer c. Auto-transmission of payment information at a self-checkout register d. Safety feature to stop an automatic garage door from closing **18. Which of the following transmission media offers the fastest potential data transfer rates?** a. Bluetooth 5.2 b. Wi-Fi 5 c. Cat 5 cable d. USB 2.0 **19. Which of the following transmission media provides the most security in transit?** a. LED fiber optic b. Wi-Fi 6E c. Cat 8 cable d. USB 3.2 **20. Which of the following wireless transmission media cannot transmit through solid objects?** a. Zigbee b. Bluetooth c. IR d. UWB # Network Devices ## Multiple Choice **1. Which of the following is NOT a function of the data link layer?** a. Create a frame of data for transmission between sender and receiver b. Identify which application on the receiving device should process the message c. Provide a way to check for errors during transmission d. Address the receiving device’s network port **2. Which network device is most concerned with MAC addresses?** a. Router b. Packet sniffer c. Web server d. Switch **3. Which part of a message contains error detection and correction information for the entire message at every network device along the journey?** a. Ethernet header b. IP header c. TCP header d. Ethernet trailer **4. Which of the following is most likely to cause Gaussian noise on a network?** a. Loose cable connection b. Power spike c. Power outage d. Traffic on the highway **5. Which of the following is most likely to cause impulse noise on a network?** a. Fluorescent lighting b. Infrared remote control c. Elevator motor d. Cables running alongside each other **6. Which of the following is the best example of crosstalk in a nontechnical context?** a. Traffic lights directing traffic from multiple directions b. Security cameras monitoring several angles in a parking lot c. A teacher instructing a group of students d. A person participating in two conversations at one time **7. Which of the following is the best example of crosstalk on a network?** a. A loose cable connection b. A power cord running alongside a network cable c. A laptop too far away from a Wi-Fi router d. An incompatible cable connector **8. When an echo interferes with a signal, what is the source of that interfering transmission?** a. The device receiving the message b. The device sending the message c. The cable on which the message is sent d. A third device on the same connection **9. Which of the following transmissions is most susceptible to the degradation caused by jitter?** a. File transfer b. Web page request c. Streaming video d. Email download **10. Which type of noise is continuous?** a. Gaussian noise b. Impulse noise c. Echo d. Jitter **11. Which of the following factors will consistently decrease noise on a connection?** a. Increased attenuation b. Increased parity c. Increased speeds d. Increased shielding **12. Which of these characters employs even parity?** a. 11111001 b. 11001000 c. 11111110 d. 00000001 **13. Which of these error detection techniques potentially offers the most favorable ratio of data bits to parity bits while maximizing the chances of detecting an error?** a. Simple parity b. Cyclic redundancy check c. Arithmetic checksum d. Longitudinal parity **14. With arithmetic checksum, what is being added?** a. Binary values of transmitted characters b. A series of hexadecimal characters c. A series of TCP/IP characters d. Decimal values of transmitted numbers **15. Which of these errors could possibly escape a CRC-32 system?** a. Odd number of bits in error b. Error burst of 32 bits c. Error burst of 34 bits d. Double-bit error **16. How many packets can be sent at one time using the stop-and-wait error control method?** a. 1 b. 7 c. 127 d. Thousands **17. In a sliding window error-control system, Station A sends three packets with bytes 0-99, 100-199, and 200-299, respectively. The second packet with bytes 100-199 is delayed somewhere along its path across the network long enough that the third packet arrives two seconds before the second one. What response will Station B send?** a. ACK 0 b. ACK 100 c. ACK 200 d. ACK 300 **18. What condition must be met for error correction to be performed?** a. The sender doesn’t receive an ACK message b. The receiver sends a NAK message c. Redundant information is present d. The packet is not received **19. A system is going to transmit the byte 10010100. What are the four check bits c8, c4, c2, and c1 that will be added to this byte using even parity?** a. 111000100100 b. 100100100011 c. 100110101000 d. 100100101001 **20. The 12-bit string 010111110010 with embedded Hamming code bits (c8, c4, c2, and c1 using even parity) has just arrived. Is there an error? If so, which bit is in error?** a. There is no error. b. The bit b5 is in error. c. The bit b9 is in error. d. The bit b12 is in error. # Network Topologies and Spanning Tree Protocol ## Multiple Choice **1. Which of the following is the most common topology for today’s LANs?** a. Mesh b. Star c. Bus d. Star-wired bus **2. Which contention-based protocol attempts to avoid collisions?** a. VLAN b. STP c. CSMA/CD d. CSMA/CA **3. Which of these Ethernet standards functions on fiber-optic cable?** a. 100Base-TX b. 1000Base-SX c. 10GBase-T d. 100GBase-T **4. You’re installing a wireless access point in an old building on a wall with no nearby power outlet. What Ethernet technology can you use to make this installation work anyway?** a. POE b. QoS c. STP d. VLAN **5. Suppose Workstation A wants to send the message "HELLO" to Workstation B. Both workstations are on an IEEE 802. 3 LAN. For this example, suppose Workstation A has the binary address 1000, and Workstation B has the binary address 0111. Which of the following is the resulting MAC sublayer frame (in binary) that is transmitted?** a. 0000 1111 b. 0111 1000 c. 1111 0000 d. 1000 0111 **6. Your wireless LAN device has just sent a request to send (RTS). What happens next?** a. The device waits during the DIFS. b. The device sends a frame. c. The device increments the back-off counter. d. The device sets a timer. **7. You need to provide a secure segment of your network for executives at your company. Which standard will allow you to meet this goal?** a. 802.1D b. 802.1Q c. 802.1AX d. 802.1p **8. What is accomplished by upgrading a network from hubs to switches?** a. Combines data paths into one higher-speed link b. Segments broadcast domains c. Interconnects devices d. Segments collision domains **9. Which LAN topology uses a logical topology that is different than the physical topology?** a. Star-wired bus topology b. Mesh topology c. Star topology d. Bus topology **10. You’re connecting a web server to your network that will need to handle high volumes of traffic. Which standard is best to help you increase the bandwidth available to the server? ** a. 802.3af b. 802.1Q c. 802.1AX d. 802.3u **11. You’re installing an email server that should be accessible by all employees on the internal network. Which network device is the best option to connect your email server to?** a. Router b. Another server c. Workstation d. Switch **12. Which field identifies the protocol encapsulated in the data link header’s payload?** a. Preamble b. EtherType c. Checksum d. SFD **13. Which spanning tree protocol keeps all potential paths active?** a. STP b. RSTP c. SPB d. PCP **14. Which of the following is not a type of protocol that determines which device can transmit on a connection at any given time?** a. Medium access control protocol b. Round-robin protocol c. Link aggregation protocol d. Contention-based protocol **15. What is the minimum preferred category of twisted pair cable required for 10-Gig Ethernet up to 100 meters?** a. Cat 5e b. Cat 6a c. Cat 7 d. Cat 6 **16. Which CSMA/CA transmission comes first?** a. RTS b. ACK c. CTS d. Frame **17. Which of these devices encapsulates a message requesting a web page?** a. Router b. Workstation c. Server d. Switch **18. Given the network in Figure 5-22, which labeled port would STP most likely block to eliminate a cyclic path?** a. Port A b. Port B c. Port C d. Port D [Image Description: Network Diagram - A network diagram with four switches and four network ports labelled as A, B, C, and D. The diagram shows a "hypothetical network with cyclic paths".] # Operating Systems ## Multiple Choice **1. Which of the following functions is specific to a server OS?** a. Manage applications b. Prompt user for network login c. Allocate hardware resources d. Secure files and other resources **2. Which software interface is an application most likely to use to communicate with an OS?** a. CLI b. SDK c. GUI d. API **3. Which type of RAID stores duplicate copies of data?** a. RAID 0 b. RAID 3 c. RAID 5 d. RAID 1 **4. For a medium-sized company with five offices in three cities, which AD layer would most likely correspond to the company’s name?** a. Leaf b. Domain c. Forest d. Organizational unit **5. Which standards served as the template for AD’s design? Choose two.** a. RAID b. LDAP c. Unix d. DNS **6. Which of the following OSs is NOT open-source software?** a. Windows Server b. NetBSD c. RHEL d. Ubuntu **7. Which of the following is NOT an advantage offered by Linux?** a. Fast b. Free c. Easy d. Stable **8. Which OS would most likely be found on a router?** a. Windows Server b. RHEL c. Ubuntu d. IOS **9. Which storage type requires specialized protocols to access stored data?** a. SAN b. CDN c. NAS d. DAS **10. Why is Linux such a stable OS?** a. Linux is open source. b. Linux is lightweight. c. Linux is adaptable. d. Linux is customizable. **11. As you plug a new workstation into a port on your Cisco switch, you realize you need to make sure the new workstation is assigned to the correct VLAN. Which command mode do you need to use to assign the connection to the VLAN?** a. Interface configuration b. User EXEC c. Privileged EXEC d. Global configuration **12. Which of these hypervisors would be easiest for students to use on their home computers?** a. ESX1 b. Oracle VirtualBox c. Citrix Hypervisor d. Android **13. Which of the following is a potential disadvantage of using virtual resources in a corporate datacenter?** a. Requirements for physical hardware b. VM isolation c. Licensing requirements d. Demand on energy resources **14. When you enter a Cisco router’s CLI, which command mode do you start in?** a. Privileged EXEC b. Global configuration c. Interface configuration d. User EXEC **15. Which cloud platform is natively compatible with AD?** a. AWS b. IBM Cloud c. Azure d. GCP **16. Which of the following is a cloud-native technology?** a. Serverless b. NFV c. VLAN d. Hypervisor **17. Which of these technologies is NOT used to minimize costs of cloud storage?** a. Auto-scaling b. Anti-malware c. Compression d. Deduplication **18. To increase redundancy, you’ve created two copies of your database in the cloud. What virtual device can ensure you spread traffic evenly across both copies of the database to increase performance?** a. Router b. Hypervisor c. Firewall d. Load balancer **19. Your client, a medical office, needs to store old patient records for at least seven years since the last date of service. What kind of cloud storage will provide the best price?** a. Hot b. RAID c. Cold d. CDN **20. Which of the following is an AWS compute service?** a. RDS b. EC2 c. EBS d. S3