Select Category
All Categories
Accounting
Agriculture
Astrobiology
Banking & Finance
Business World
Civilizations
Commerce & Economics
Competitive exams
Computer Science & IT
Current affairs
Earth Science
Education
Environment
Explore the Animal World
Food chain
General Knowledge
Geography Map
Green Life
History
Human Health
Journalism
Law
Science
Social Science
TAX
About Us
Contact Us
Login
Computer Networking - Part 2
1
of
25
💡
Hints:
3
Q1. What is a disadvantage of a peer to peer network?
A. It is difficult to add additional de vices
B. If a peer fails the entire network fails
C. It is difficult to manage
D. If server fails entire network fails
Q2. Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source or Destination address
D. Source or Destination address
Q3. What is the main advantage of using wireless networks?
A. easier to connect more devices
B. faster connection
C. less likely to get hacked
Q4. Zero energy level in a channel indicates that the channel is
A. avoided
B. detected
C. busy
D. idle
Q5. Firewalls are used for
A. Routing
B. Tunneling
C. Congestion Control
D. Security
Q6. NAV stands for
A. New aliance vector
B. Network Alliance vector
C. Network Allocation Vector
D. None of the above
Q7. www is a ___layer protocol
A. physical
B. Application
C. Data Link
D. Session
Q8. It is a wireless security protocol created by Cisco to address the weaknesses in WEP and WPA
A. LEAP
B. No Security
C. WPA
Q9. Which type of network is more secure?
A. WAN
B. LAN
Q10. provides many different services to its client computers such as file retrieval, printing, and emailing
A. non-dedicated server
B. dedicated server
C. cloud server
D. database
Q11. Which of the following describes a local area network (LAN)?
A. Computers connected within a small geographic area
B. A network connection within a large city
C. Used to share information with external businesses or individuals
D. The protocol used for sending outgoing e-mail
Q12. What is a best practice to use before beginning an EtherChannel implementation?
A. Assign affected interfaces to VLAN 1.
B. Assign affected interfaces to the management VLAN.
C. Shut down each of the affected interfaces.
D. Assign affected interfaces to an unused VLAN.
Q13. Which of the following is not a networking device?
A. Gateways
B. Linux
C. Routers
D. Firewalls
Q14. Hardware component which are connected to the computer is
A. Peripheral
B. ports
C. Protocol
Q15. Which of the following connections has the fastest speed to send and receive large amounts of data?
A. dial-up
B. satellite
C. wireless
D. leased line
Q16. What is the purpose of a WAN?
A. To allow computers to communicate with each other in the same area
B. To allow computers to communicate with each other- anywhere in the world
Q17. The following are purposes of preventive maintenance EXCEPT for:
A. Organize electrical-related circuit maintenance
B. Upgrading certain hardware or software for security and reliability
C. Ensures minimal system failure
D. Reduces the probability of hardware or software problems
Q18. Which device may also contain a modem?
A. A router
B. A switch
C. A hub
Q19. A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
A. Star-bus
B. Ring
C. Hybrid
D. Peer-to-Peer
Q20. A set of rules that govern the connection, communication, and data transfer between computers on a network
A. protocol
B. ethernet
C. hub
D. provision
Q21. Name this network topology
×
A. Bus
B. Star
C. Mesh
D. Ring
Q22. Put True or FALSE, Linking devices together within a computer network gives the possibility of sharing the data only
A. True
B. False
Q23. The ___of TCP/IP protocol is responsible for figuring out how to get data to its destination.
A. application layer
B. link layer
C. network layer
D. transport layer.
Q24. To send an email, you need to have each of the following, except:
A. a file to attach to the email
B. your own email adress
C. information to type in the email
D. the email address of each intended recipient.
Q25. TheIPAddressFE80::C001:37FF:FE6C:1 is a
A. Global Unicast Adress
B. Loopback Address
C. Link local Address
D. Multicast Address
Submitting Your Quiz...
Please wait while we process your answers