0

Networking Quiz 3

Description: Networking Quiz 3
Number of Questions: 20
Created by:
Tags: networking
Attempted 0/20 Correct 0 Score 0

IEEE designates Thicknet as_______Ethernet.

  1. 10Base5

  2. 10BaseT

  3. 10Base10

  4. 10Base2


Correct Option: A
Explanation:

To answer this question, the user needs to be familiar with the IEEE Ethernet designations and the different types of Ethernet cables.

Thicknet is a type of Ethernet cable that has a thicker diameter than other Ethernet cables. It is also known as 10Base5 because it can support Ethernet networks with a maximum data transfer rate of 10 Mbps over a maximum distance of 500 meters.

Now, let's go through each option and determine which one is the correct answer:

A. 10Base5: This option is correct. Thicknet is also known as 10Base5 according to IEEE Ethernet designations.

B. 10BaseT: This option is incorrect. 10BaseT is a type of Ethernet cable that uses twisted-pair wiring and can support Ethernet networks with a maximum data transfer rate of 10 Mbps over a maximum distance of 100 meters.

C. 10Base10: This option is incorrect. 10Base10 is not a valid Ethernet designation.

D. 10Base2: This option is incorrect. 10Base2 is a type of Ethernet cable that uses thin coaxial wiring and can support Ethernet networks with a maximum data transfer rate of 10 Mbps over a maximum distance of 185 meters.

Therefore, the correct answer is:

The Answer is: A. 10Base5

Vertical connectors between floors are known as_______.

  1. Spans

  2. Riser

  3. Lift


Correct Option: B
Explanation:

To answer this question, the user needs to have basic knowledge of building construction and architecture. Vertical connectors between floors can be referred to by different names, depending on the context.

A. Spans: This option is incorrect. Spans refer to the distance between two supports, such as beams or columns, which support a load like a floor or roof.

B. Riser: This option is partially correct. A riser is the vertical component of a step in a staircase that connects one level to another. However, it is not the correct term for vertical connectors in general.

C. Lift: This option is also partially correct. In some parts of the world, "lift" is another term for an elevator, which is a form of vertical transportation. However, it is not a comprehensive term for all types of vertical connectors between floors.

The correct answer is: B. Riser.

________ensure(s) that data are transferred whole, in sequence, and without error from one node on the network to another.

  1. Data Packets

  2. Addressing

  3. Protocol

  4. File services


Correct Option: C

AI Explanation

To answer this question, you need to understand the concept of data transfer on a network.

Option A) Data Packets - This option is incorrect because data packets are the units in which data is divided for transmission over a network. While data packets play a crucial role in transferring data, they do not ensure that data is transferred whole, in sequence, and without error.

Option B) Addressing - This option is incorrect because addressing is the process of identifying the source and destination of data packets. While addressing is important for routing data to the correct destination, it does not guarantee the integrity of data transfer.

Option C) Protocol - This option is correct because a protocol defines a set of rules and procedures for data communication. It ensures that data is transferred whole, in sequence, and without error by specifying how data should be formatted, transmitted, received, and acknowledged.

Option D) File services - This option is incorrect. File services refer to the functionality provided by a network for accessing and managing files. While file services can facilitate data transfer, they do not specifically ensure the integrity of data transfer.

The correct answer is C) Protocol. This option is correct because protocols define the rules and procedures for data communication, ensuring that data is transferred whole, in sequence, and without error.

The maximum segment lenght on a 10BaseT network is_______meters.

  1. 10

  2. 50

  3. 100

  4. 1000


Correct Option: C

The first networks transmitted data over thick, heavy coaxial cables.

  1. True

  2. False


Correct Option: A

Which cannot support full-duplexing?

  1. 100BaseT4

  2. 10BaseT

  3. 100BaseTX


Correct Option: A

Which is not an exmple of transmission media?

  1. Wire

  2. Coaxial cable

  3. Radio waves

  4. Fiber Optic

  5. None of the above


Correct Option: E

Mail services requires a significant commitment of technical support and administration and resources due to their_______.

  1. Instability

  2. Access ability

  3. Routing capability

  4. Heavy use


Correct Option: D

WAN requires the same technology as LAN.

  1. True

  2. False


Correct Option: B
Explanation:

To solve this question, the user needs to know the difference between WAN and LAN technologies.

A Local Area Network (LAN) is a network that is confined to a small geographic area, such as a single building or a campus. LANs are typically used for connecting computers, printers, and other devices together in an office or home environment. LANs typically use Ethernet or Wi-Fi technology to connect devices together.

A Wide Area Network (WAN), on the other hand, covers a much larger geographic area, such as a city, region, or even a country. WANs are used to connect LANs together over longer distances, and they typically use technologies such as leased lines, satellite links, or microwave links.

Now, let's go through each option and explain why it is right or wrong:

A. True: This option is incorrect. While LAN and WAN are both types of computer networks, they require different technologies to operate. For example, LANs often use Ethernet or Wi-Fi technology, while WANs may use leased lines, satellite links, or microwave links. In addition, WANs often require specialized hardware and software to ensure that data is transmitted quickly and securely over long distances.

B. False: This option is correct. LAN and WAN are both types of computer networks, but they require different technologies to operate. LANs are typically confined to a small geographic area and use Ethernet or Wi-Fi technology, while WANs cover a much larger area and use technologies such as leased lines, satellite links, or microwave links.

The Answer is: B. False

Mail services can only run one kind of system.

  1. True

  2. False


Correct Option: B

AI Explanation

To answer this question, you need to understand the concept of mail services.

Option A) True - This option is incorrect because mail services are not limited to running only one kind of system. There are multiple types of mail services available, such as Microsoft Exchange, Gmail, Yahoo Mail, etc., which can run on different systems.

Option B) False - This option is correct because mail services can run on different kinds of systems. For example, Microsoft Exchange can run on Windows servers, while Gmail can run on Google's infrastructure.

The correct answer is B) False. This option is correct because mail services are not limited to running only one kind of system.

______ is a network management protocol sponsored by the ISO that was once a competitor to SNMP.

  1. SIMP

  2. CIMP

  3. CMIP

  4. MMIP


Correct Option: C

Which of the following commands provide information on virtual memory, disk access, and CPU use?

  1. vmstat

  2. stat

  3. ps

  4. uptime


Correct Option: A

AI Explanation

To answer this question, you need to understand the different commands used to gather information about virtual memory, disk access, and CPU use. Let's go through each option to understand why it is correct or incorrect:

Option A) vmstat - This option is correct because vmstat is a command-line utility that provides information about virtual memory, including memory usage, paging activity, and swap usage. It also provides information about CPU usage and disk access statistics.

Option B) stat - This option is incorrect because the stat command is used to display file or file system status, such as file size, permissions, and timestamps. It does not provide information about virtual memory, disk access, or CPU use.

Option C) ps - This option is incorrect because the ps command is used to display information about active processes, including their process IDs, CPU usage, and memory usage. While it provides information about CPU use, it does not provide information about virtual memory or disk access.

Option D) uptime - This option is incorrect because the uptime command is used to display how long the system has been running and the current system load average. It does not provide information about virtual memory, disk access, or CPU use.

The correct answer is Option A) vmstat. This option is correct because vmstat provides information on virtual memory, disk access, and CPU use.

______ routers communicate with other routers to calculate routes automatically using routing protocols such as RIP and OSPF.

  1. Static

  2. Manual

  3. Direct

  4. Dynamic


Correct Option: D

______ is a programming language used by SNMP to create actual MIB objects.

  1. BER

  2. VB

  3. C++

  4. ASN.1


Correct Option: D
  1. True

  2. False


Correct Option: A
Explanation:

To solve this question, the user needs to know the concept of binary number representation and the parity of numbers.

In binary number representation, each digit can only be 0 or 1. The rightmost digit represents $2^0 = 1$, the second rightmost digit represents $2^1 = 2$, the third rightmost digit represents $2^2 = 4$, and so on. To get the decimal equivalent of a binary number, we add up the values of the digits that have a value of 1.

For the binary number 10111001, the decimal equivalent is:

$1\times2^7 + 0\times2^6 + 1\times2^5 + 1\times2^4 + 1\times2^3 + 0\times2^2 + 0\times2^1 + 1\times2^0$

$= 128 + 0 + 32 + 16 + 8 + 0 + 0 + 1$

$= 185$

To determine if 185 is an odd number, we can check if it is divisible by 2. If it is not divisible by 2, then it is an odd number.

185 is not divisible by 2, therefore it is an odd number.

The Answer is: A

The subnet mask identifies whether the destination address is local or remote through ______.

  1. de-multiplexing

  2. ANDing

  3. supernetting

  4. broadcasting


Correct Option: B

The ______ file holds info on the root name servers needed to initialize the cache of internal domain name servers.

  1. named.local

  2. named.ca

  3. named.boot

  4. named.conf


Correct Option: B

The command for viewing an arp cache in Linux is ______.

  1. arp -a

  2. arp

  3. arp -c

  4. arp -e


Correct Option: B
- Hide questions