0

Networking Quiz - 1

Description: Networking Quiz - 1
Number of Questions: 20
Created by:
Tags: networking
Attempted 0/20 Correct 0 Score 0
  1. 802.1

  2. 802.2

  3. 802.3

  4. 802.4

  5. 802.5


Correct Option: D
Explanation:

To answer this question, the user needs to know the network topologies and the protocols that use them. Token Passing is a method of sharing a communication medium between network devices by passing a token among the devices. The device holding the token has the right to transmit data, and after transmission, the token is passed to the next device in the sequence. Token Passing is commonly used in Bus Topology, which is a network topology in which all devices are connected to a central cable.

Now let's go through each option and explain which protocol uses Token Passing in a Bus Topology:

A. 802.1: 802.1 is not a protocol, but rather a family of networking standards that deal with network architecture, management, and security.

B. 802.2: 802.2 is a protocol that defines the Logical Link Control (LLC) sublayer of the Data Link Layer in the OSI model. It does not use Token Passing in a Bus Topology.

C. 802.3: 802.3 is a protocol that defines the Ethernet standard, which is a common protocol used in Local Area Networks (LANs). It does not use Token Passing in a Bus Topology.

D. 802.4: 802.4 is a protocol that defines the Token Bus network, which uses Token Passing in a Bus Topology. However, it is not widely used today.

E. 802.5: 802.5 is a protocol that defines the Token Ring network, which uses Token Passing in a Ring Topology. It is used in some legacy systems but has largely been replaced by Ethernet.

Therefore, the answer is:

The Answer is: D. 802.4

  1. 50 Ohm Terminator

  2. Crimp Connector

  3. Null Connector

  4. Loop Connection

  5. No Termination Needed


Correct Option: E

What is the default port of a SMTP server?

  1. 8

  2. 21

  3. 80

  4. 25

  5. 110


Correct Option: D

You install a network adapter on IRQ 3, which of the following might it conflict with?

  1. COM1

  2. COM2

  3. Keyboard

  4. Hard Drive Controller

  5. Display Card


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of IRQ (Interrupt Request) and the devices that commonly use specific IRQ numbers.

IRQ is a mechanism used by devices to request the attention of the CPU. Each device in a computer system is assigned a unique IRQ number to prevent conflicts when multiple devices try to use the CPU simultaneously.

Now, let's go through each option and explain why it is right or wrong:

A. COM1: This option is incorrect. COM1 typically uses IRQ 4, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and COM1.

B. COM2: This option is incorrect. COM2 typically uses IRQ 3, which means there could be a conflict between a network adapter on IRQ 3 and COM2. Both devices may try to use the same IRQ, leading to conflicts.

C. Keyboard: This option is incorrect. The keyboard typically uses IRQ 1 or IRQ 12, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the keyboard.

D. Hard Drive Controller: This option is incorrect. The hard drive controller typically uses IRQ 14 or IRQ 15, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the hard drive controller.

E. Display Card: This option is incorrect. The display card typically uses IRQ 9 or IRQ 11, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the display card.

Based on the explanations above, the correct answer is:

The Answer is: B. COM2

What is the directory service called in Netware?

  1. Active Directory

  2. Domain Name System

  3. NDS

  4. NWLink

  5. DNS


Correct Option: C

AI Explanation

To answer this question, you need to understand the different directory services used in networking.

Option A) Active Directory - This option is incorrect because Active Directory is a directory service provided by Microsoft for Windows-based networks. It is not specific to Netware.

Option B) Domain Name System (DNS) - This option is incorrect because DNS is a protocol used to translate domain names into IP addresses. It is not a directory service.

Option C) NDS - This option is correct. NDS stands for Novell Directory Services, which is the directory service used in Netware. It provides a centralized database for managing and accessing network resources.

Option D) NWLink - This option is incorrect because NWLink is a protocol used for network communication in Netware. It is not a directory service.

Option E) DNS - This option is incorrect for the same reason as Option B. DNS is not a directory service.

The correct answer is C) NDS. This option is correct because NDS is the directory service used in Netware.

What diagnostic tool helps you find a malfunctioning network interface card?

  1. Multimeter

  2. Protocol Analyzer

  3. Signal Detector

  4. Null Network Unit

  5. Port Sniffer


Correct Option: B

AI Explanation

To answer this question, you need to understand the different diagnostic tools used to troubleshoot network issues. Let's go through each option to understand why it is correct or incorrect:

Option A) Multimeter - This option is incorrect because a multimeter is a tool used to measure voltage, current, and resistance in electrical circuits. It is not specifically designed to diagnose network interface card (NIC) issues.

Option B) Protocol Analyzer - This option is correct because a protocol analyzer is a diagnostic tool that captures and analyzes network traffic. It can help identify issues with a malfunctioning network interface card by examining the packets being sent and received by the card.

Option C) Signal Detector - This option is incorrect because a signal detector is used to detect and locate wireless signals, such as Wi-Fi or cellular signals. It is not specifically designed to diagnose network interface card issues.

Option D) Null Network Unit - This option is incorrect because a null network unit is a device used to simulate network connections and test network equipment. It is not specifically designed to diagnose network interface card issues.

Option E) Port Sniffer - This option is incorrect because a port sniffer, also known as a packet sniffer, is a tool used to capture and analyze network traffic. While it can help identify network issues, it is not specifically designed to diagnose network interface card issues.

The correct answer is B) Protocol Analyzer. This option is correct because a protocol analyzer is a diagnostic tool that captures and analyzes network traffic, helping to identify issues with a malfunctioning network interface card.

What utility do you use in Windows 95 to release your IP address from a DCHP server?

  1. IPCFG

  2. WINIPCFG

  3. IPREL

  4. DCHP

  5. NETCFG


Correct Option: B

Which cable supports a speed of 100 Mbps?

  1. Category 1

  2. Category 2

  3. Category 3

  4. Category 4

  5. Category 5


Correct Option: E

AI Explanation

To answer this question, we need to understand the different categories of network cables.

Category 1 (Cat 1) cables are the oldest and do not support data transmission. They were primarily used for telephone communications.

Category 2 (Cat 2) cables were an improvement over Cat 1 cables, but they still do not support high-speed data transmission. They were also used for telephone communications.

Category 3 (Cat 3) cables can support data transmission at up to 10 Mbps. They were commonly used for Ethernet networks in the past.

Category 4 (Cat 4) cables can support data transmission at up to 16 Mbps. They were also used for Ethernet networks but are less common today.

Category 5 (Cat 5) cables can support data transmission at up to 100 Mbps. They became widely used for Ethernet networks and are still commonly used today.

Based on this information, we can see that the correct answer is E) Category 5. This cable can support a speed of 100 Mbps.

Where do the MAC sublayers fit into the OSI model?

  1. Transport

  2. Network

  3. Data Link

  4. Presentation

  5. Physical


Correct Option: C

AI Explanation

To answer this question, you need to understand the OSI (Open Systems Interconnection) model. The OSI model is a conceptual framework that standardizes the functions of a communication system into seven different layers.

The MAC (Media Access Control) sublayer is a part of the Data Link layer, which is the third layer of the OSI model. The Data Link layer is responsible for the reliable transfer of data over a physical link. It provides error detection and correction, as well as flow control between two directly connected nodes.

The Data Link layer is divided into two sublayers: the Logical Link Control (LLC) sublayer and the MAC sublayer. The LLC sublayer handles the flow control and error checking for the data link, while the MAC sublayer is responsible for controlling access to the physical medium.

Therefore, the correct answer is:

C. Data Link

In older Network Interface Cards, what is the configuration of the switches?

  1. Single Inline pin

  2. Dual Inline pin

  3. Switch integrated pin

  4. Dual integrated pin

  5. Single inline memory module


Correct Option: B

What type of device is a VPN adapter?

  1. Integrated

  2. Virtual

  3. Physical

  4. Logical

  5. Virtual Packet Node


Correct Option: B
Explanation:

To answer this question, the user needs to know what a VPN adapter is and the different types of devices that exist for VPN.

A VPN adapter is a network interface card (NIC) that connects a computer or device to a virtual private network (VPN). It enables the user to securely access a private network over the internet.

Now, let's go through each option and explain why it is right or wrong:

A. Integrated: This option is incorrect because an integrated device refers to a device that is built into another device. A VPN adapter is a separate device that is added to a computer or device to enable VPN access.

B. Virtual: This option is partially correct. A VPN adapter is a virtual device that creates a secure connection between the user's computer and the VPN server. It works by encrypting the user's internet traffic and routing it through the VPN server.

C. Physical: This option is incorrect because a physical device refers to a tangible hardware device. A VPN adapter is not a physical device but a virtual one.

D. Logical: This option is partially correct. A VPN adapter is a logical device that is created by software to enable VPN access. It works by creating a secure tunnel through which the user's internet traffic is routed.

E. Virtual Packet Node: This option is incorrect because a virtual packet node is not a type of device used for VPN. It is a type of virtual machine that is used to emulate network traffic for testing purposes.

Therefore, the correct answer is:

The Answer is: B

What is the total bandwidth of an ISDN BR1 line (in Kbps)?

  1. 144

  2. 16

  3. 64

  4. 128

  5. 256


Correct Option: A

Which network model is most secure?

  1. Share level

  2. User Level

  3. Resource level

  4. Secure Level

  5. Network Level


Correct Option: B

An IP address consists of 4 bytes.

  1. True

  2. False


Correct Option: A

AI Explanation

To answer this question, you need to understand what an IP address is and how it is represented.

An IP (Internet Protocol) address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves two main purposes: identifying the host or network interface, and providing the location of the host in the network.

IPv4 (Internet Protocol version 4), which is the most widely used version of IP, uses a 32-bit address format. This means that an IPv4 address consists of 4 bytes or 32 bits.

Option A) True - This option is correct because an IP address does consist of 4 bytes.

Option B) False - This option is incorrect because an IP address does consist of 4 bytes.

The correct answer is A) True.

What command changes passwords on a Unix system?

  1. pico pass.conf -[OLD PASSWORD] [NEW PASSWORD]

  2. PASSWD

  3. PASSWORD

  4. CHPASS

  5. SETPASS


Correct Option: B

Which file on a workstation resolves names similar to a DNS server?

  1. HOSTS

  2. DHCP

  3. DNSHOSTS

  4. NAMEHOSTS

  5. SMHOSTS


Correct Option: A

AI Explanation

To answer this question, you need to understand the purpose of each file listed.

Option A) HOSTS - This option is correct. The HOSTS file is a local file on a workstation that resolves names similar to a DNS server. It contains a list of IP addresses and corresponding hostnames. When a user on the workstation tries to access a website or network resource, the computer first checks the HOSTS file to see if there is a match for the hostname. If there is a match, the IP address from the HOSTS file is used to connect to the resource directly, bypassing the DNS server.

Option B) DHCP - This option is incorrect. DHCP (Dynamic Host Configuration Protocol) is a network protocol used to assign IP addresses and other network configuration settings to devices on a network. While DHCP can provide IP addresses to workstations, it does not resolve names similar to a DNS server.

Option C) DNSHOSTS - This option is incorrect. There is no standard file named DNSHOSTS that resolves names similar to a DNS server. The HOSTS file is the correct file for this purpose.

Option D) NAMEHOSTS - This option is incorrect. There is no standard file named NAMEHOSTS that resolves names similar to a DNS server. The HOSTS file is the correct file for this purpose.

Option E) SMHOSTS - This option is incorrect. There is no standard file named SMHOSTS that resolves names similar to a DNS server. The HOSTS file is the correct file for this purpose.

The correct answer is A) HOSTS. This option is correct because the HOSTS file on a workstation resolves names similar to a DNS server by mapping hostnames to IP addresses.

The maximum number of nodes per segment depends on the_______.?

  1. Bandwidth

  2. Desired throughput

  3. Regeneration ability

  4. Attenuation


Correct Option: D
Explanation:

To determine the maximum number of nodes per segment, we need to consider the factor that influences this limit. Let's analyze each option to understand its relevance:

Option A) Bandwidth - This option is correct. The maximum number of nodes that can be accommodated on a network segment depends on the available bandwidth. Insufficient bandwidth can lead to congestion and decreased performance, limiting the number of nodes that can be supported.

Option B) Desired throughput - This option is not directly related to the maximum number of nodes per segment. Desired throughput refers to the amount of data that a user or application wants to transfer within a given time frame but does not dictate the node capacity of a segment.

Option C) Regeneration ability - This option does not directly influence the maximum number of nodes per segment. Regeneration ability typically refers to the capability of network devices to restore signal quality, which is not directly linked to the number of nodes on a segment.

Option D) Attenuation - While attenuation can impact signal strength and quality over a network segment, it is not the primary determinant of the maximum number of nodes per segment.

Therefore, the correct answer is:

The maximum number of nodes per segment depends on the Bandwidth (Option A).

Bandwidth availability directly affects the number of nodes that can be supported on a network segment.

Information can be transmitted via one of_______siganlling method(s).

  1. One

  2. Two

  3. Four

  4. Five


Correct Option: B
Explanation:

To solve this question, the user needs to understand the concept of signalling methods and how information can be transmitted.

The correct answer is:

The Answer is: B - Two

Explanation:

Information can be transmitted via two signalling methods:

  1. Analog Signalling: Analog signalling involves the transmission of information via continuous signals. An example of analog signalling is voice communication over the telephone.

  2. Digital Signalling: Digital signalling involves the transmission of information via discrete signals. Digital signals can be transmitted using different techniques such as amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK). Digital signalling is used in computer networks, mobile phones, and other digital devices.

Options A, C, and D are incorrect because information can be transmitted via two signalling methods, not one, four, or five.

- Hide questions