0

Networking Quiz - 1

Description: Networking Quiz - 1
Number of Questions: 20
Created by:
Tags: networking
Attempted 0/20 Correct 0 Score 0
  1. 802.1

  2. 802.2

  3. 802.3

  4. 802.4

  5. 802.5


Correct Option: D
Explanation:

To answer this question, the user needs to know the network topologies and the protocols that use them. Token Passing is a method of sharing a communication medium between network devices by passing a token among the devices. The device holding the token has the right to transmit data, and after transmission, the token is passed to the next device in the sequence. Token Passing is commonly used in Bus Topology, which is a network topology in which all devices are connected to a central cable.

Now let's go through each option and explain which protocol uses Token Passing in a Bus Topology:

A. 802.1: 802.1 is not a protocol, but rather a family of networking standards that deal with network architecture, management, and security.

B. 802.2: 802.2 is a protocol that defines the Logical Link Control (LLC) sublayer of the Data Link Layer in the OSI model. It does not use Token Passing in a Bus Topology.

C. 802.3: 802.3 is a protocol that defines the Ethernet standard, which is a common protocol used in Local Area Networks (LANs). It does not use Token Passing in a Bus Topology.

D. 802.4: 802.4 is a protocol that defines the Token Bus network, which uses Token Passing in a Bus Topology. However, it is not widely used today.

E. 802.5: 802.5 is a protocol that defines the Token Ring network, which uses Token Passing in a Ring Topology. It is used in some legacy systems but has largely been replaced by Ethernet.

Therefore, the answer is:

The Answer is: D. 802.4

  1. 50 Ohm Terminator

  2. Crimp Connector

  3. Null Connector

  4. Loop Connection

  5. No Termination Needed


Correct Option: E
  1. COM1

  2. COM2

  3. Keyboard

  4. Hard Drive Controller

  5. Display Card


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of IRQ (Interrupt Request) and the devices that commonly use specific IRQ numbers.

IRQ is a mechanism used by devices to request the attention of the CPU. Each device in a computer system is assigned a unique IRQ number to prevent conflicts when multiple devices try to use the CPU simultaneously.

Now, let's go through each option and explain why it is right or wrong:

A. COM1: This option is incorrect. COM1 typically uses IRQ 4, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and COM1.

B. COM2: This option is incorrect. COM2 typically uses IRQ 3, which means there could be a conflict between a network adapter on IRQ 3 and COM2. Both devices may try to use the same IRQ, leading to conflicts.

C. Keyboard: This option is incorrect. The keyboard typically uses IRQ 1 or IRQ 12, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the keyboard.

D. Hard Drive Controller: This option is incorrect. The hard drive controller typically uses IRQ 14 or IRQ 15, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the hard drive controller.

E. Display Card: This option is incorrect. The display card typically uses IRQ 9 or IRQ 11, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the display card.

Based on the explanations above, the correct answer is:

The Answer is: B. COM2

  1. Active Directory

  2. Domain Name System

  3. NDS

  4. NWLink

  5. DNS


Correct Option: C
  1. Multimeter

  2. Protocol Analyzer

  3. Signal Detector

  4. Null Network Unit

  5. Port Sniffer


Correct Option: B

Which cable supports a speed of 100 Mbps?

  1. Category 1

  2. Category 2

  3. Category 3

  4. Category 4

  5. Category 5


Correct Option: E

AI Explanation

To answer this question, we need to understand the different categories of network cables.

Category 1 (Cat 1) cables are the oldest and do not support data transmission. They were primarily used for telephone communications.

Category 2 (Cat 2) cables were an improvement over Cat 1 cables, but they still do not support high-speed data transmission. They were also used for telephone communications.

Category 3 (Cat 3) cables can support data transmission at up to 10 Mbps. They were commonly used for Ethernet networks in the past.

Category 4 (Cat 4) cables can support data transmission at up to 16 Mbps. They were also used for Ethernet networks but are less common today.

Category 5 (Cat 5) cables can support data transmission at up to 100 Mbps. They became widely used for Ethernet networks and are still commonly used today.

Based on this information, we can see that the correct answer is E) Category 5. This cable can support a speed of 100 Mbps.

  1. Transport

  2. Network

  3. Data Link

  4. Presentation

  5. Physical


Correct Option: C

In older Network Interface Cards, what is the configuration of the switches?

  1. Single Inline pin

  2. Dual Inline pin

  3. Switch integrated pin

  4. Dual integrated pin

  5. Single inline memory module


Correct Option: B

What type of device is a VPN adapter?

  1. Integrated

  2. Virtual

  3. Physical

  4. Logical

  5. Virtual Packet Node


Correct Option: B
Explanation:

To answer this question, the user needs to know what a VPN adapter is and the different types of devices that exist for VPN.

A VPN adapter is a network interface card (NIC) that connects a computer or device to a virtual private network (VPN). It enables the user to securely access a private network over the internet.

Now, let's go through each option and explain why it is right or wrong:

A. Integrated: This option is incorrect because an integrated device refers to a device that is built into another device. A VPN adapter is a separate device that is added to a computer or device to enable VPN access.

B. Virtual: This option is partially correct. A VPN adapter is a virtual device that creates a secure connection between the user's computer and the VPN server. It works by encrypting the user's internet traffic and routing it through the VPN server.

C. Physical: This option is incorrect because a physical device refers to a tangible hardware device. A VPN adapter is not a physical device but a virtual one.

D. Logical: This option is partially correct. A VPN adapter is a logical device that is created by software to enable VPN access. It works by creating a secure tunnel through which the user's internet traffic is routed.

E. Virtual Packet Node: This option is incorrect because a virtual packet node is not a type of device used for VPN. It is a type of virtual machine that is used to emulate network traffic for testing purposes.

Therefore, the correct answer is:

The Answer is: B

  1. Share level

  2. User Level

  3. Resource level

  4. Secure Level

  5. Network Level


Correct Option: B

What command changes passwords on a Unix system?

  1. pico pass.conf -[OLD PASSWORD] [NEW PASSWORD]

  2. PASSWD

  3. PASSWORD

  4. CHPASS

  5. SETPASS


Correct Option: B
  1. Bandwidth

  2. Desired throughput

  3. Regeneration ability

  4. Attenuation


Correct Option: D
Explanation:

To determine the maximum number of nodes per segment, we need to consider the factor that influences this limit. Let's analyze each option to understand its relevance:

Option A) Bandwidth - This option is correct. The maximum number of nodes that can be accommodated on a network segment depends on the available bandwidth. Insufficient bandwidth can lead to congestion and decreased performance, limiting the number of nodes that can be supported.

Option B) Desired throughput - This option is not directly related to the maximum number of nodes per segment. Desired throughput refers to the amount of data that a user or application wants to transfer within a given time frame but does not dictate the node capacity of a segment.

Option C) Regeneration ability - This option does not directly influence the maximum number of nodes per segment. Regeneration ability typically refers to the capability of network devices to restore signal quality, which is not directly linked to the number of nodes on a segment.

Option D) Attenuation - While attenuation can impact signal strength and quality over a network segment, it is not the primary determinant of the maximum number of nodes per segment.

Therefore, the correct answer is:

The maximum number of nodes per segment depends on the Bandwidth (Option A).

Bandwidth availability directly affects the number of nodes that can be supported on a network segment.

  1. One

  2. Two

  3. Four

  4. Five


Correct Option: B
Explanation:

To solve this question, the user needs to understand the concept of signalling methods and how information can be transmitted.

The correct answer is:

The Answer is: B - Two

Explanation:

Information can be transmitted via two signalling methods:

  1. Analog Signalling: Analog signalling involves the transmission of information via continuous signals. An example of analog signalling is voice communication over the telephone.

  2. Digital Signalling: Digital signalling involves the transmission of information via discrete signals. Digital signals can be transmitted using different techniques such as amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK). Digital signalling is used in computer networks, mobile phones, and other digital devices.

Options A, C, and D are incorrect because information can be transmitted via two signalling methods, not one, four, or five.

- Hide questions