

Networking Fundamentals Practice Exam
Course Introduction
Networking Fundamentals introduces students to the basic concepts and principles underlying computer networks. The course covers topics such as network topologies, protocols, and standards, as well as the OSI and TCP/IP models. Students will explore the function of routers, switches, and other networking devices, and learn about IP addressing, subnetting, and network security fundamentals. Practical exercises and real-world scenarios help reinforce theoretical knowledge, preparing students for further studies in networking and IT support.
Recommended Textbook Computer Networking from LANs to WANs Hardware Software and Security 1st Edition by Jr. Kenneth
Available Study Resources on Quizplus
24 Chapters
720 Verified Questions
720 Flashcards
Source URL: https://quizplus.com/study-set/1764 Page 2


Chapter 1: What Is a Computer Network
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35121
Sample Questions
Q1) The _____ Layer is responsible for routing protocol-specific packets to their proper destination using logical IP addressing.
A)Network
B)Data-Link
C)Transport
D)Session
Answer: A
Q2) Token-ring frames are similar to Ethernet frames in that both contain ____ addresses.
A)source and destination
B)source and origin
C)origin and interface
D)source and network
Answer: A
Q3) The high collision rate of an Ethernet system with a lot of communication taking place is eliminated in a token-ring network.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Network Topology
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35122
Sample Questions
Q1) A(n)____________________ network is owned and managed by a private organization or company and may have a much larger bandwidth capability than a public network.
Answer: private
Q2) Logical connections between the nodes of the VPN
A)Tunnels
B)Topology
C)Logical topology
D)NAPs
E)Cloud
Answer: A
Q3) A ____ is a portion of a network.
A)subnet
B)subunit
C)slice
D)subdivision
Answer: A
Q4) ____________________ is a logical,not physical,activity and is accomplished using a special subnet mask,such as 255.255.255.192.
Answer: Subnetting
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Networking Hardware
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35123
Sample Questions
Q1) ____________________ maintain routing tables in their memories to store information about the physical connections on the network.
Answer: Routers
Q2) A valuable tool to have at your disposal when preparing or checking cables is a cable ____________________.
Answer: tester
Q3) A ____ is a special-purpose device designed to interconnect networks.
A)switch
B)router
C)hub
D)bridge
Answer: B
Q4) ____ cable relies on pulses of light to carry information.
A)Copper
B)Light
C)Fiber network
D)Fiber optic
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
Page 5

Chapter 4: Ethernet Technology
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35124
Sample Questions
Q1) The AUI (attachment unit interface)may be a transceiver cable up to ____ meters in length.
A)25
B)50
C)75
D)100
Q2) Every Ethernet device manufactured (NIC,router)contains a unique ____-bit MAC address assigned by the manufacturer.
A)24
B)32
C)48
D)64
Q3) The maximum frame size allowed on the network.
A)Jabber
B)Jam sequence
C)Runt
D)MTU
E)Collision domain
Q4) List three properties that 10base5,10base2 and 10baseT have in common.
Q5) Describe CSMA/CA.
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Token-Ring, fddi, and Other LAN Technologies
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35125
Sample Questions
Q1) In a token-ring network,data are transmitted using a ____.
A)Differential Equation Encoded Signal
B)Differential Manchester Encoded Signal
C)Differential Turing Encoded Signal
D)Differential Manheim Encoded Signal
Q2) A low-cost baseband network developed by the Datapoint Corporation in the late 1970s
A)ARCnet
B)Token
C)Bluetooth
D)Scatternet
E)FDDI-II
Q3) All aspects of Bluetooth are controlled by the ____,which issues specifications and licenses for Bluetooth technology.
A)Bluetooth Special Consortium
B)Bluetooth Advocacy Forum
C)Bluetooth Internet Forum
D)Bluetooth Special Interest Group
Q4) The ____________________ bits are used to reserve the next token at a specific priority.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Design and Troubleshooting Scenarios
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35126
Sample Questions
Q1) The ____________________ utility is used to display TCP/IP address information on a Linux/UNIX computer system.
Q2) Left-clicking the ____ tab in the Direct Cable Connection allows you to switch between Guest mode and Host mode.
A)Change
B)Properties
C)Alter
D)Interface
Q3) Discuss the names that Microsoft has used for the local network with different versions of Windows.
Q4) Discuss baseband versus broadband.
Q5) Use a ____ to get the fastest data transfer speed between two direct connected computers running Windows 9x.
A)serial cable
B)Firewire cable
C)parallel cable
D)USB cable
Q6) Discuss how to use test equipment to detect hardware problems.
Q7) List three ways to connect just two computers.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Low-Level Protocols
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35127
Sample Questions
Q1) A protocol cannot use an adapter until it is ____ to it.
A)attached
B)bound
C)defined
D)profiled
Q2) ____________________ names are the NetBIOS names that identify each machine on a Windows network.
Q3) A special dynamic database called ____ maps NetBIOS names to IP addresses when larger networks are needed.
A)WINS
B)DNS
C)WIND
D)NDS
Q4) Data communication that takes place one bit at a time over a single communication line
A)SLIP
B)Parity
C)Baud
D)NetBEUI
E)Serial
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: The Tcpip Protocols
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35128
Sample Questions
Q1) The Internet Protocol is unreliable due to the fact there is no guarantee the datagram will reach its destination.
A)True
B)False
Q2) The ____ uses a directed broadcast message to obtain the MAC address for a given IP address.
A)ARP
B)DNS
C)SNMP
D)SMTP
Q3) The Network Interface layer performs the same functions as the Data-Link layer in the ISO/OSI model.
A)True
B)False
Q4) Describe SMTP.
Q5) Describe protocol analyzers.
Q6) Each piece of an IP datagram is routed on the network using a(n)____________________.
Q7) What happens when a hardware frame is sent out to a network?
Q8) Discuss the functionality of PING.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Ipxspx, Appletalk, and Other Network Protocols
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35129
Sample Questions
Q1) List the four fields of the domain-specific part of the DECnet address.
Q2) In IPX,the ____________________ field is normally set to FFFF hexadecimal and is typically not used for error detection.
Q3) Developed by Novell for its NetWare network operating system
A)Internet Packet Exchange (IPX)protocol
B)SSCP
C)NCP
D)IPX/SPX protocol suite
E)Sequenced Packet Exchange (SPX)protocol
Q4) The DECnet protocols are based on a network architecture that is referred to as the
A)Digital Network Architecture
B)Digital Network Infrastructure
C)Digital Network Alliance
D)Digital Network Alignment
Q5) ____ was added to reduce the amount of control traffic necessary when using NCP.
A)NDB
B)NCFP
C)NCPD
D)NCPB
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Switching and Routing
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35130
Sample Questions
Q1) A(n)____ variable is used to control the lifetime of each entry in the routing table.
A)invalid timer
B)update timer
C)hold-time timer
D)flush timer
Q2) ____________________ switching reduces the latency of a switch tremendously.
Q3) The ____ algorithm is a type of routing algorithm that is based on the number of hops in a route between a source and destination computer.
A)distance-vector routing
B)distance-volume routing
C)distance-domain routing
D)domain-vector routing
Q4) Section of the switch that contains the Ethernet receiving logic
A)Crossbar switch
B)Buffer
C)Switching fabric
D)Input port logic
E)Multiplexed bus
Q5) Describe the Exterior Gateway Protocol.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Network Management and Security
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35131
Sample Questions
Q1) A(n)____________________ is a program that replicates itself,but does not necessarily infect other programs.
Q2) A(n)____________________ allows you to connect the keyboard,video,and mouse signals from two or more computers to a single keyboard,video monitor,and mouse.
Q3) List and describe five areas to consider in User Management.
Q4) ____ is a technology where high-capacity file storage is directly connected to the network.
A)NAS
B)SAN
C)MAS
D)NAD
Q5) A(n)____ is a stand-alone hardware unit that connects to the network or a software program running on a network host,collecting statistical information about the network performance.
A)program analyzer
B)packet analyzer
C)interface analyzer
D)protocol analyzer
Q6) List and describe the different types of hardening.
Page 13
To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Electronic Mail
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35132
Sample Questions
Q1) A blank line is used as the separator between the parts of an email message.
A)True
B)False
Q2) What is IMAP and what does it do?
Q3) The mailbox portion of the address is often made from a user's ____.
A)home address
B)first name
C)server name
D)account name
Q4) Electronic mail uses the ____ model to allow mail messages to be exchanged.
A)client-server
B)client-client
C)servlet-servlet
D)server-server
Q5) Discuss the issue with sending messages in clear text.
Q6) The Internet Network Authority is responsible for maintenance of the Top Level Domains.
A)True
B)False
Q7) List three features that the MIME standard provides.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: FTP and Telnet
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35133
Sample Questions
Q1) The FTP client can use any port numbers greater than ____________________.
Q2) When transferring files using FTP,it is necessary to use the correct mode,ASCII or binary,otherwise file corruption can occur.
A)True
B)False
Q3) One of the most frustrating experiences with the Telnet protocol involves keyboard mapping.
A)True
B)False
Q4) When using ____________________ FTP,it is necessary to provide a valid username and password in order to access the private files on the FTP server.
Q5) The ____ protocol provides for a bidirectional,byte-oriented service using TCP as the transport to reliably deliver messages.
A)Telnet
B)FTP
C)HTTP
D)RPC
Q6) An FTP ____________________ consists of a command or an action to be performed.
Page 15
To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Multimedia Networking
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35134
Sample Questions
Q1) Some of the original image information is thrown away during the lossy compression process.
A)True
B)False
Q2) A(n)______________________________ customer purchases the VoIP product of their choice,and simply enables it to work on the ViaTalk network using the ViaTalk SIP credentials.
Q3) The ____ credentials provide authenticated access between the VoIP service provider and the local VoIP capable device.
A)NAS
B)SIP
C)SIL
D)SIB
Q4) ____________________ is a method for sending voice and fax data using the IP protocol.
Q5) A Web page with one hundred images will require much longer to download and display if all the images are GIF instead of JPG.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: The Internet
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35135
Sample Questions
Q1) Describe XML.
Q2) Provides a method to incorporate style and layout elements into Web pages with an improved level of control of the page appearance,including consistency between background colors,font selections,font sizes,etc
A)JavaScript
B)CGI
C)VPN
D)Applet
E)CSS
Q3) The ____ is used to create traditional computer programs,or active Web pages using Java applets.
A)Java programming language
B)Java interpreter
C)Java development environment
D)Java program standard
Q4) List the capabilities that a VPN using PPTP or L2TP provides.
Q5) ____________________ is an application that provides the capability for a user to send and receive instant messages,which are delivered to the recipient instantly-even faster than electronic mail.
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Writing a Network Application
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35136
Sample Questions
Q1) Client-server messages only contain text-based data.
A)True
B)False
Q2) The ____ project on Linux supports the C# language.
A)notNet
B)mono
C)Babylon
D)Babel
Q3) When a socket is in ___________________ mode,and a read type of function is called,the program will stop and wait for a packet to be received.
Q4) _____________________________________________ is an interpreted language useful for CGI applications.
Q5) Visual Basic comes complete with many sample applications to help get you started with Internet programming right away.
A)True
B)False
Q6) List the two forms of Visual Basic code and two types of applications that can be created with Visual Basic for use with the Internet.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: An Introduction to Networking With Windows
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35137
Sample Questions
Q1) Describe ICA.
Q2) Designed to provide reliable data connections using a modem and a telephone line using Windows 9x computer systems
A)Thin client
B)DHCP server
C)Network Properties menu
D)Dial-Up Networking
E)NetBEUI
Q3) List the three components that the ICA uses.
Q4) When trouble shooting at the software level there are two areas of concern: ____.
A)the network operating system software and the router software
B)the network operating system software and the client routing software
C)the application software and the router software
D)the network operating system software and the application software
Q5) Today,the backbone of Windows network operation is based on NetBEUI.
A)True
B)False
Q6) Describe a network printer.
Q7) Explain how to share files over a network.
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Windows Domains
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35138
Sample Questions
Q1) One of the most important elements in a Windows network
A)C2 compliance
B)Security
C)RAS Server
D)Primary domain controller
E)PWL files
Q2) List four of the features that support enhanced security measures in Active Directory.
Q3) List four different versions of the Windows 2008 Server operating system.
Q4) List four important Active Directory Management features.
Q5) Windows 2003 Server extends the capabilities of Windows 2000 Server.
A)True
B)False
Q6) Involves properly configuring Windows NT/200x to use the built-in safeguards
A)C2 compliance
B)Security
C)RAS Server
D)Primary domain controller
E)PWL files
Q7) When is the Administrator account created in Windows NT?
To view all questions and flashcards with answers, click on the resource link above. Page 20
Chapter 19: Unix and Linux
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35139
Sample Questions
Q1) Describe the Linux documentation project.
Q2) A Linux computer can import and export NFS disks at the same time.
A)True
B)False
Q3) The Gnome interface is provided by the ____ project.
A)Apache
B)GNU
C)Mono
D)Ubuntu
Q4) Describe the Apache Web Server.
Q5) The ____ is a method used on UNIX and Linux systems to share passwords and group file access within a computer network.
A)Distributed File System
B)Network Information Service
C)Network Teller Service
D)Network File System
Q6) For security purposes,it is necessary for the system administrator to protect the ____________________ account.
Q7) Describe NIS+.

21
To view all questions and flashcards with answers, click on the resource link above.

Chapter 20: Other Network Operating Systems
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35140
Sample Questions
Q1) A core component of NetWare consists of the services available for managing and using ____________________.
Q2) Darwin uses ____ as the primary network infrastructure while still supporting AppleTalk.
A)NetBIOS
B)IPX/SPX
C)ICMP
D)TCP/IP
Q3) What is NDS?
Q4) OS/2 Warp contains a built-in TCP/IP stack and Microsoft LAN Manager capability.
A)True
B)False
Q5) Explain print services in the Mac environment.
Q6) Security on the Mac OS X operating system is provided by ____________________.
Q7) To access the Macintosh file system over the network,____________________ must be enabled.
Q8) The latest version of NetWare is version ____________________.
Q9) A workstation connecting to a NetWare server may do so by installing the appropriate ____________________ software. Page 22
To view all questions and flashcards with answers, click on the resource link above.
Page 23

Chapter 21: Cryptography and Security
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35141
Sample Questions
Q1) ____ ciphers encrypt any number of bits
A)Bit
B)Hash
C)Stream
D)Block
Q2) A ____ is visible or invisible information added to an image,video,or audio that identifies the copyright owner of the media.
A)digital signature
B)digital footprint
C)digital fingerprint
D)digital watermark
Q3) A JPG image is a complex data structure containing compressed DCT coefficients for ____ blocks of pixels.
A)4x4
B)8x8
C)16x16
D)32x32
Q4) Hashed data can be unhashed and turned back into their original form.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 24

Chapter 22: Security Hardware
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35142
Sample Questions
Q1) ____ is concerned with understanding what a person is saying.
A)Voice recognition
B)Voice authentication
C)Voice processing
D)Voice translation
Q2) An integrated IDS appliance combines the tap and analysis software all in one device.
A)True
B)False
Q3) Computers with two network adapters
A)Multi-homed
B)Intrusion Detection System
C)Link aggregation
D)Fault tolerance
E)Hardening
Q4) Describe an Intrusion Detection System.
Q5) Windows into a secure area may need to be _____________________ to obscure the view through them while at the same time allowing the area to be monitored.
Q6) Describe the types of doors and locks that should be used to secure an area.
Q7) _____________________ involves the process of identifying a user to a computer. Page 25
To view all questions and flashcards with answers, click on the resource link above. Page 26

Chapter 23: Security Software
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35143
Sample Questions
Q1) ____ is a vulnerability scanner that will scan the host system,or any and all computers on the local network or anywhere on the Internet.
A)GFI LANguard
B)NetCat
C)L0phtCrack
D)Brutus
Q2) Packet sniffing is possible through the use of a special mode of operation in the network adapter called ____________________ mode.
Q3) Capturing packets is also referred to as ____.
A)packet stiffing
B)packet sniffing
C)packet hiding
D)packet blocking
Q4) Describe host-based intrusion detection.
Q5) A(n)____________________ will take action on its own to handle the problem without user intervention,such as interrupting the offending traffic.
Q6) The most common approaches to password ____________________ are guessing,brute force,and dictionary attacks.
To view all questions and flashcards with answers, click on the resource link above. Page 27

Chapter 24: Forensic Techniques
Available Study Resources on Quizplus for this Chatper
30 Verified Questions
30 Flashcards
Source URL: https://quizplus.com/quiz/35144
Sample Questions
Q1) What is the pre-incident preparation that must take place for a CSIRT?
Q2) The first thing you want to do before analyzing network traffic is make sure you have permission to look at it.
A)True
B)False
Q3) List the skills that you need to become proficient at analyzing malware.
Q4) The ____________________ is a written record of all interaction with the evidence from the moment it is acquired to the moment it is released.
Q5) List five laws that have been put into effect to help monitor and control the use of electronic communication systems and computers as well as provide guidelines for prosecution of computer and information-related crimes.
Q6) The ____ file is used when Windows goes into hibernation.
A)Hiberfil.sys
B)Pagefile.sys
C)IO.sys
D)BOOT.INI
Q7) Working with the Registry is easy for the inexperienced user.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 28