0

Networking Quiz - 1

Description: Networking Quiz - 1
Number of Questions: 20
Created by:
Tags: networking
Attempted 0/20 Correct 0 Score 0

Which protocol uses Token Passing in a Bus Topology?

  1. 802.1

  2. 802.2

  3. 802.3

  4. 802.4

  5. 802.5


Correct Option: D
Explanation:

To answer this question, the user needs to know the network topologies and the protocols that use them. Token Passing is a method of sharing a communication medium between network devices by passing a token among the devices. The device holding the token has the right to transmit data, and after transmission, the token is passed to the next device in the sequence. Token Passing is commonly used in Bus Topology, which is a network topology in which all devices are connected to a central cable.

Now let's go through each option and explain which protocol uses Token Passing in a Bus Topology:

A. 802.1: 802.1 is not a protocol, but rather a family of networking standards that deal with network architecture, management, and security.

B. 802.2: 802.2 is a protocol that defines the Logical Link Control (LLC) sublayer of the Data Link Layer in the OSI model. It does not use Token Passing in a Bus Topology.

C. 802.3: 802.3 is a protocol that defines the Ethernet standard, which is a common protocol used in Local Area Networks (LANs). It does not use Token Passing in a Bus Topology.

D. 802.4: 802.4 is a protocol that defines the Token Bus network, which uses Token Passing in a Bus Topology. However, it is not widely used today.

E. 802.5: 802.5 is a protocol that defines the Token Ring network, which uses Token Passing in a Ring Topology. It is used in some legacy systems but has largely been replaced by Ethernet.

Therefore, the answer is:

The Answer is: D. 802.4

How do you terminate a 10BaseT cable?

  1. 50 Ohm Terminator

  2. Crimp Connector

  3. Null Connector

  4. Loop Connection

  5. No Termination Needed


Correct Option: E

AI Explanation

To answer this question, you need to understand the termination requirements for a 10BaseT cable.

A 10BaseT cable is an Ethernet cable that operates at a speed of 10 megabits per second (Mbps) and uses the twisted pair cable technology. In this type of cable, termination is not required.

Termination is typically used in certain types of cables, such as coaxial cables, to prevent signal reflections at the end of the cable. However, in the case of 10BaseT cables, termination is not needed because the twisted pair cable technology used in these cables already provides sufficient signal integrity.

Let's go through each option to understand why it is correct or incorrect:

A) 50 Ohm Terminator - This option is incorrect because a 50 Ohm terminator is typically used for terminating coaxial cables, not twisted pair cables like 10BaseT.

B) Crimp Connector - This option is incorrect because a crimp connector is used to attach a connector to the end of a cable, but it does not provide termination.

C) Null Connector - This option is incorrect because a null connector is used to connect two devices without actually transmitting any data. It is not used for terminating a cable.

D) Loop Connection - This option is incorrect because a loop connection refers to connecting the two ends of a cable together to form a loop, but it is not used for termination.

E) No Termination Needed - This option is correct because termination is not required for a 10BaseT cable. The twisted pair cable technology used in 10BaseT already provides sufficient signal integrity.

The correct answer is E) No Termination Needed. This option is correct because termination is not needed for a 10BaseT cable.

What is the default port of a SMTP server?

  1. 8

  2. 21

  3. 80

  4. 25

  5. 110


Correct Option: D

You install a network adapter on IRQ 3, which of the following might it conflict with?

  1. COM1

  2. COM2

  3. Keyboard

  4. Hard Drive Controller

  5. Display Card


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of IRQ (Interrupt Request) and the devices that commonly use specific IRQ numbers.

IRQ is a mechanism used by devices to request the attention of the CPU. Each device in a computer system is assigned a unique IRQ number to prevent conflicts when multiple devices try to use the CPU simultaneously.

Now, let's go through each option and explain why it is right or wrong:

A. COM1: This option is incorrect. COM1 typically uses IRQ 4, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and COM1.

B. COM2: This option is incorrect. COM2 typically uses IRQ 3, which means there could be a conflict between a network adapter on IRQ 3 and COM2. Both devices may try to use the same IRQ, leading to conflicts.

C. Keyboard: This option is incorrect. The keyboard typically uses IRQ 1 or IRQ 12, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the keyboard.

D. Hard Drive Controller: This option is incorrect. The hard drive controller typically uses IRQ 14 or IRQ 15, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the hard drive controller.

E. Display Card: This option is incorrect. The display card typically uses IRQ 9 or IRQ 11, not IRQ 3. Therefore, there would be no conflict between a network adapter on IRQ 3 and the display card.

Based on the explanations above, the correct answer is:

The Answer is: B. COM2

What is the directory service called in Netware?

  1. Active Directory

  2. Domain Name System

  3. NDS

  4. NWLink

  5. DNS


Correct Option: C

AI Explanation

To answer this question, you need to understand the different directory services used in networking.

Option A) Active Directory - This option is incorrect because Active Directory is a directory service provided by Microsoft for Windows-based networks. It is not specific to Netware.

Option B) Domain Name System (DNS) - This option is incorrect because DNS is a protocol used to translate domain names into IP addresses. It is not a directory service.

Option C) NDS - This option is correct. NDS stands for Novell Directory Services, which is the directory service used in Netware. It provides a centralized database for managing and accessing network resources.

Option D) NWLink - This option is incorrect because NWLink is a protocol used for network communication in Netware. It is not a directory service.

Option E) DNS - This option is incorrect for the same reason as Option B. DNS is not a directory service.

The correct answer is C) NDS. This option is correct because NDS is the directory service used in Netware.

What diagnostic tool helps you find a malfunctioning network interface card?

  1. Multimeter

  2. Protocol Analyzer

  3. Signal Detector

  4. Null Network Unit

  5. Port Sniffer


Correct Option: B

AI Explanation

To answer this question, you need to understand the different diagnostic tools used to troubleshoot network issues. Let's go through each option to understand why it is correct or incorrect:

Option A) Multimeter - This option is incorrect because a multimeter is a tool used to measure voltage, current, and resistance in electrical circuits. It is not specifically designed to diagnose network interface card (NIC) issues.

Option B) Protocol Analyzer - This option is correct because a protocol analyzer is a diagnostic tool that captures and analyzes network traffic. It can help identify issues with a malfunctioning network interface card by examining the packets being sent and received by the card.

Option C) Signal Detector - This option is incorrect because a signal detector is used to detect and locate wireless signals, such as Wi-Fi or cellular signals. It is not specifically designed to diagnose network interface card issues.

Option D) Null Network Unit - This option is incorrect because a null network unit is a device used to simulate network connections and test network equipment. It is not specifically designed to diagnose network interface card issues.

Option E) Port Sniffer - This option is incorrect because a port sniffer, also known as a packet sniffer, is a tool used to capture and analyze network traffic. While it can help identify network issues, it is not specifically designed to diagnose network interface card issues.

The correct answer is B) Protocol Analyzer. This option is correct because a protocol analyzer is a diagnostic tool that captures and analyzes network traffic, helping to identify issues with a malfunctioning network interface card.

Which type of backup copies files created or changed since the last full backup?

  1. Application

  2. Physical

  3. Network

  4. Transfer

  5. Session


Correct Option: C

Which of the following support speeds of 1.5 Mbps?

  1. ISDN

  2. DSL

  3. USR

  4. ATM

  5. T1


Correct Option: E

AI Explanation

To answer this question, you need to understand the different types of network technologies and their corresponding speeds.

Let's go through each option to understand why it is correct or incorrect:

Option A) ISDN - Integrated Services Digital Network (ISDN) is a set of communication standards that enables digital transmission of voice, video, and data over traditional telephone lines. The maximum speed supported by ISDN is 128 Kbps, which is lower than 1.5 Mbps. Therefore, Option A is incorrect.

Option B) DSL - Digital Subscriber Line (DSL) is a technology that provides high-speed internet access over traditional telephone lines. While DSL can support speeds higher than 1.5 Mbps, it can also support lower speeds depending on the specific DSL variant and the distance from the DSL provider's central office. Therefore, Option B may or may not support speeds of 1.5 Mbps, so it is not the correct answer.

Option C) USR - USR (U.S. Robotics) is a brand that produces modems and networking equipment. However, the specific technology or product associated with "USR" is not provided in the question. Without knowing the specific context, it is not possible to determine whether USR supports speeds of 1.5 Mbps. Therefore, Option C cannot be determined as the correct answer.

Option D) ATM - Asynchronous Transfer Mode (ATM) is a networking technology that transmits data in fixed-size cells. ATM can support various speeds, including 1.5 Mbps. Therefore, Option D is a possible correct answer.

Option E) T1 - T1 is a dedicated digital communication line that supports a data rate of 1.544 Mbps. This speed is higher than 1.5 Mbps. Therefore, Option E is the correct answer.

The correct answer is Option E) T1. This option is correct because T1 supports speeds higher than 1.5 Mbps.

What utility do you use in Windows 95 to release your IP address from a DCHP server?

  1. IPCFG

  2. WINIPCFG

  3. IPREL

  4. DCHP

  5. NETCFG


Correct Option: B

Which cable supports a speed of 100 Mbps?

  1. Category 1

  2. Category 2

  3. Category 3

  4. Category 4

  5. Category 5


Correct Option: E

AI Explanation

To answer this question, we need to understand the different categories of network cables.

Category 1 (Cat 1) cables are the oldest and do not support data transmission. They were primarily used for telephone communications.

Category 2 (Cat 2) cables were an improvement over Cat 1 cables, but they still do not support high-speed data transmission. They were also used for telephone communications.

Category 3 (Cat 3) cables can support data transmission at up to 10 Mbps. They were commonly used for Ethernet networks in the past.

Category 4 (Cat 4) cables can support data transmission at up to 16 Mbps. They were also used for Ethernet networks but are less common today.

Category 5 (Cat 5) cables can support data transmission at up to 100 Mbps. They became widely used for Ethernet networks and are still commonly used today.

Based on this information, we can see that the correct answer is E) Category 5. This cable can support a speed of 100 Mbps.

Where do the MAC sublayers fit into the OSI model?

  1. Transport

  2. Network

  3. Data Link

  4. Presentation

  5. Physical


Correct Option: C

AI Explanation

To answer this question, you need to understand the OSI (Open Systems Interconnection) model. The OSI model is a conceptual framework that standardizes the functions of a communication system into seven different layers.

The MAC (Media Access Control) sublayer is a part of the Data Link layer, which is the third layer of the OSI model. The Data Link layer is responsible for the reliable transfer of data over a physical link. It provides error detection and correction, as well as flow control between two directly connected nodes.

The Data Link layer is divided into two sublayers: the Logical Link Control (LLC) sublayer and the MAC sublayer. The LLC sublayer handles the flow control and error checking for the data link, while the MAC sublayer is responsible for controlling access to the physical medium.

Therefore, the correct answer is:

C. Data Link

In older Network Interface Cards, what is the configuration of the switches?

  1. Single Inline pin

  2. Dual Inline pin

  3. Switch integrated pin

  4. Dual integrated pin

  5. Single inline memory module


Correct Option: B

What type of device is a VPN adapter?

  1. Integrated

  2. Virtual

  3. Physical

  4. Logical

  5. Virtual Packet Node


Correct Option: B
Explanation:

To answer this question, the user needs to know what a VPN adapter is and the different types of devices that exist for VPN.

A VPN adapter is a network interface card (NIC) that connects a computer or device to a virtual private network (VPN). It enables the user to securely access a private network over the internet.

Now, let's go through each option and explain why it is right or wrong:

A. Integrated: This option is incorrect because an integrated device refers to a device that is built into another device. A VPN adapter is a separate device that is added to a computer or device to enable VPN access.

B. Virtual: This option is partially correct. A VPN adapter is a virtual device that creates a secure connection between the user's computer and the VPN server. It works by encrypting the user's internet traffic and routing it through the VPN server.

C. Physical: This option is incorrect because a physical device refers to a tangible hardware device. A VPN adapter is not a physical device but a virtual one.

D. Logical: This option is partially correct. A VPN adapter is a logical device that is created by software to enable VPN access. It works by creating a secure tunnel through which the user's internet traffic is routed.

E. Virtual Packet Node: This option is incorrect because a virtual packet node is not a type of device used for VPN. It is a type of virtual machine that is used to emulate network traffic for testing purposes.

Therefore, the correct answer is:

The Answer is: B

What is the total bandwidth of an ISDN BR1 line (in Kbps)?

  1. 144

  2. 16

  3. 64

  4. 128

  5. 256


Correct Option: A

Which network model is most secure?

  1. Share level

  2. User Level

  3. Resource level

  4. Secure Level

  5. Network Level


Correct Option: B

An IP address consists of 4 bytes.

  1. True

  2. False


Correct Option: A

AI Explanation

To answer this question, you need to understand what an IP address is and how it is represented.

An IP (Internet Protocol) address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves two main purposes: identifying the host or network interface, and providing the location of the host in the network.

IPv4 (Internet Protocol version 4), which is the most widely used version of IP, uses a 32-bit address format. This means that an IPv4 address consists of 4 bytes or 32 bits.

Option A) True - This option is correct because an IP address does consist of 4 bytes.

Option B) False - This option is incorrect because an IP address does consist of 4 bytes.

The correct answer is A) True.

What command changes passwords on a Unix system?

  1. pico pass.conf -[OLD PASSWORD] [NEW PASSWORD]

  2. PASSWD

  3. PASSWORD

  4. CHPASS

  5. SETPASS


Correct Option: B

Which file on a workstation resolves names similar to a DNS server?

  1. HOSTS

  2. DHCP

  3. DNSHOSTS

  4. NAMEHOSTS

  5. SMHOSTS


Correct Option: A

AI Explanation

To answer this question, you need to understand the purpose of each file listed.

Option A) HOSTS - This option is correct. The HOSTS file is a local file on a workstation that resolves names similar to a DNS server. It contains a list of IP addresses and corresponding hostnames. When a user on the workstation tries to access a website or network resource, the computer first checks the HOSTS file to see if there is a match for the hostname. If there is a match, the IP address from the HOSTS file is used to connect to the resource directly, bypassing the DNS server.

Option B) DHCP - This option is incorrect. DHCP (Dynamic Host Configuration Protocol) is a network protocol used to assign IP addresses and other network configuration settings to devices on a network. While DHCP can provide IP addresses to workstations, it does not resolve names similar to a DNS server.

Option C) DNSHOSTS - This option is incorrect. There is no standard file named DNSHOSTS that resolves names similar to a DNS server. The HOSTS file is the correct file for this purpose.

Option D) NAMEHOSTS - This option is incorrect. There is no standard file named NAMEHOSTS that resolves names similar to a DNS server. The HOSTS file is the correct file for this purpose.

Option E) SMHOSTS - This option is incorrect. There is no standard file named SMHOSTS that resolves names similar to a DNS server. The HOSTS file is the correct file for this purpose.

The correct answer is A) HOSTS. This option is correct because the HOSTS file on a workstation resolves names similar to a DNS server by mapping hostnames to IP addresses.

The maximum number of nodes per segment depends on the_______.?

  1. Bandwidth

  2. Desired throughput

  3. Regeneration ability

  4. Attenuation


Correct Option: D
Explanation:

To determine the maximum number of nodes per segment, we need to consider the factor that influences this limit. Let's analyze each option to understand its relevance:

Option A) Bandwidth - This option is correct. The maximum number of nodes that can be accommodated on a network segment depends on the available bandwidth. Insufficient bandwidth can lead to congestion and decreased performance, limiting the number of nodes that can be supported.

Option B) Desired throughput - This option is not directly related to the maximum number of nodes per segment. Desired throughput refers to the amount of data that a user or application wants to transfer within a given time frame but does not dictate the node capacity of a segment.

Option C) Regeneration ability - This option does not directly influence the maximum number of nodes per segment. Regeneration ability typically refers to the capability of network devices to restore signal quality, which is not directly linked to the number of nodes on a segment.

Option D) Attenuation - While attenuation can impact signal strength and quality over a network segment, it is not the primary determinant of the maximum number of nodes per segment.

Therefore, the correct answer is:

The maximum number of nodes per segment depends on the Bandwidth (Option A).

Bandwidth availability directly affects the number of nodes that can be supported on a network segment.

Information can be transmitted via one of_______siganlling method(s).

  1. One

  2. Two

  3. Four

  4. Five


Correct Option: B
Explanation:

To solve this question, the user needs to understand the concept of signalling methods and how information can be transmitted.

The correct answer is:

The Answer is: B - Two

Explanation:

Information can be transmitted via two signalling methods:

  1. Analog Signalling: Analog signalling involves the transmission of information via continuous signals. An example of analog signalling is voice communication over the telephone.

  2. Digital Signalling: Digital signalling involves the transmission of information via discrete signals. Digital signals can be transmitted using different techniques such as amplitude shift keying (ASK), frequency shift keying (FSK), and phase shift keying (PSK). Digital signalling is used in computer networks, mobile phones, and other digital devices.

Options A, C, and D are incorrect because information can be transmitted via two signalling methods, not one, four, or five.

- Hide questions