Principles of Networking Final Exam - 748 Verified Questions

Page 1


Principles of Networking Final Exam

Course Introduction

Principles of Networking introduces students to the fundamental concepts and technologies that enable communication and data sharing across computer networks. The course covers the OSI and TCP/IP models, networking hardware, IP addressing, subnetting, and essential protocols such as TCP, UDP, and HTTP. Students learn about wired and wireless network topologies, routing and switching principles, network security basics, and troubleshooting common network issues. Through hands-on exercises and theoretical exploration, the course equips students with the foundational skills needed to understand, design, and maintain modern computer networks.

Recommended Textbook

Network+ Guide to Networks 5th Edition by Tamara Dean

Available Study Resources on Quizplus

15 Chapters

748 Verified Questions

748 Flashcards

Source URL: https://quizplus.com/study-set/430

Page 2

Chapter 1: An Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7588

Sample Questions

Q1) The distinct units of data that are exchanged between nodes on a network. Answer: H

Q2) Often,separate LANs are interconnected and rely on several ____ running many different applications and managing resources other than data.

A) workstations

B) servers

C) clients

D) stand-alone computers

Answer: B

Q3) The scheme for assigning a unique identifying number to every node on the network. Answer: G

Q4) Describe license tracking in networks.

Answer: License tracking determines how many copies of a single application are currently in use on the network and ensures that number does not exceed the number of licenses purchased.This information is important for legal reasons,as software companies are vigilant about illegally copying software or using more than the authorized number of copies.

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Network Standards and the OSI Model

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7589

Sample Questions

Q1) Describe the OSI model Session layer's functions.

Answer: Among the Session layer's functions are establishing and keeping alive the communications link for the duration of the session,keeping the communication secure,synchronizing the dialogue between the two nodes,determining whether communications have been cut off,and,if so,figuring out where to restart transmission,and terminating communications.Session layer services also set the terms of communication by deciding which node communicates first and how long a node can communicate.Finally,the Session layer monitors the identification of session participants,ensuring that only the authorized nodes can access the session.

Q2) The ____ is a fixed number associated with a device's NIC.

A) LLC address

B) frame address

C) logical address

D) physical address

Answer: D

Q3) Briefly describe IEEE's Project 802.

Answer: IEEE's Project 802 is an effort to standardize physical and logical elements of a network.IEEE developed these standards before the OSI model was standardized by ISO,but IEEE's 802 standards can be applied to the layers of the OSI model.

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Transmission Basics and Networking Media

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7590

Sample Questions

Q1) ____ describes wiring that connects workstations to the closest telecommunications closet.

A) Backbone wiring

B) Horizontal wiring

C) Work area

D) Simple wiring

Answer: B

Q2) In modulation,a simple wave called a ____ wave,is combined with another analog signal to produce a unique signal that gets transmitted from one node to another.

A) carrier

B) data

C) information

D) FM

Answer: A

Q3) ______________________________ cabling consists of one or more insulated wire pairs encased in a plastic sheath.

Answer: UTP (unshielded twisted pair)

Unshielded twisted pair

UTP

To view all questions and flashcards with answers, click on the resource link above.

Page 5

Chapter 4: Introduction to TCP/IP Protocols

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7591

Sample Questions

Q1) The most common way of expressing IP addresses.

Q2) If the standard port number for the Telnet service is 23,a host whose IPv4 address is 10.43.3.87 has a socket address for Telnet of ____.

A) 10.43.3.87/23

B) 10.43.3.87:23

C) 10.43.3.87-23

D) 23:10.43.3.87

Q3) Describe how ARP improves efficiency of MAC-to-IP address mappings.

Q4) ____ is a utility that can verify that TCP/IP is installed,bound to the NIC,configured correctly,and communicating with the network.

A) ARP

B) PING

C) Telnet

D) FTP

Q5) Describe the DHCP leasing process.

Q6) A hierarchical way of associating domain names with IP addresses.

Q7) Ports ranging from 49152 through 65535; open for use without restriction.

Q8) Define and describe Zeroconf (Zero Configuration).

Q9) Describe the Time to Live (TTL)field in an IP datagram.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Topologies and Ethernet Standards

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/7592

Sample Questions

Q1) In a ring network,each workstation acts as a(n)____ for the transmission.

A) repeater

B) amplifier

C) terminator

D) manager

Q2) A ____ occurs when two transmissions interfere with each other.

A) jam

B) collision

C) carrier sense

D) multiple access event

Q3) The most popular method for connecting nodes on a network is circuit switching.

A)True

B)False

Q4) The most common 1-Gigabit Ethernet.

Q5) The smallest LANs do not have a backbone.

A)True

B)False

Q6) IEEE standard for fiber-optic Ethernet networks transmitting data at 10 Gbps.

Q7) Follows the 5-4-3 rule of networking.

Q8) Describe the advantage of the star topology.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Network Hardware

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7593

Sample Questions

Q1) CompactFlash NICs are most frequently used to connect devices too small to handle PCMCIA slots.

A)True

B)False

Q2) Bridges are protocol independent.

A)True

B)False

Q3) A ____ is a multiport connectivity device that directs data between nodes on a network.

A) switch

B) bridge

C) router

D) gateway

Q4) A computer's ____________________ is the circuit,or signaling pathway,used by the motherboard to transmit data to the computer's components,including its memory,processor,hard disk,and NIC.

Q5) Explain why network engineers value VLANs.Include a discussion on reasons for using VLANs.

Q6) Explain hybrid routing protocols.Describe an example.

Q7) Define wireless NICS.Include a description of disadvantages with their use.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: WANs and Remote Connectivity

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7594

Sample Questions

Q1) ____________________ encapsulates incoming Ethernet or token ring frames,then converts them into ATM cells for transmission over an ATM network.

Q2) ISDN PRI uses ____ B channels and one 64-Kbps D channel.

A) 10

B) 12

C) 23

D) 32

Q3) Define and describea PSTN.

Q4) Occurs when data travels from the carrier's switching facility to the customer.

Q5) Occurs when data travels from the customer to the carrier's switching facility.

Q6) ____________________ is the remote virtual computing software that comes with Windows client and server operating systems.

Q7) Explain how a cable modem is utilized in broadband cable connections.

Q8) ____________________ are connections between network nodes that,although based on potentially disparate physical links,logically appear to be direct,dedicated links between those nodes.

Q9) Describe the most important advantage of SONET.

Q11) Explain how ATM relies on virtual circuits. Page 9

Q10) Define the term xDSL and name the better known DSL varieties.

To view all questions and flashcards with answers, click on the resource link above.

Page 10

Chapter 8: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7595

Sample Questions

Q1) ____ may use either the 2.4-GHz or 5-GHz frequency range.

A) 802.11a

B) 802.11b

C) 802.11g

D) 802.11n

Q2) In ____,a wireless signal splits into secondary waves when it encounters an obstruction.

A) reflection

B) scattering

C) diffraction

D) bounce back

Q3) A directional antenna issues wireless signals along a(n)____ direction.

A) open

B) narrow

C) wide

D) single

Q4) Describe the FHSS and DSSS spread spectrum technologies.

Q5) Transmission from a satellite transponder to an earth-based dish-shaped antenna.

Q6) Define reassociation and provide two examples explaining when it occurs.

Q7) The locations of the transmitter and receiver do not move.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Network Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7596

Sample Questions

Q1) The term domain model refers to a type of peer-to-peer network that relies on domains rather than on workgroups.

A)True

B)False

Q2) A workgroup is a group of interconnected computers that share each other's resources without relying on a central ____.

A) OU

B) domain

C) database

D) server

Q3) The directory containing information about objects in a domain resides on computers called ____ controllers.

A) OU

B) domain

C) database

D) server

Q4) ____________________ is the execution of multiple tasks at one time.

Q5) A logical representation of multiple,hierarchical levels within a directory.

Q6) Describe three advantages of choosing a proprietary UNIX system.

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: In-Depth TCP/IP Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7597

Sample Questions

Q1) The TCP/IP configuration and management utility used on UNIX and Linux systems.

Q2) The ____ utility allows you to view a host's routing table.

A) nbstat

B) pathping

C) dig

D) route

Q3) Describe what PAT is and how it works.

Q4) An example of a popular client email software is ____.

A) MIME

B) Microsoft Outlook

C) Sendmail

D) Microsoft Exchange Server

Q5) The gateways that make up the Internet backbone are called ____ gateways.

A) proxy

B) core

C) Internet

D) default

Q6) Used if an administrator already know a host's name and wants to learn its IP address.

Q7) Queries a DNS registration database and obtain information about a domain.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Voice and Video Over IP

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7598

Sample Questions

Q1) When VoIP relies on the Internet,it is often called ____.

A) telephony

B) Internet telephony

C) IP telephony

D) voice telephony

Q2) Explain how gateways on a converged network exchange and translate signaling and control information with each other so that voice and video packets are properly routed through the network.

Q3) IP telephones are directly connected to the local loop.

A)True

B)False

Q4) When using an analog telephone,a VoIP adapter that performs analog-to-digital conversion is known as a(n)____.

A) VTA (voice telephone adapter)

B) ATA (analog telephone adapter)

C) DTA (digital telephone adapter)

D) DTA (data telephone adapter)

Q5) Explain why MGCs are especially advantageous on large VoIP networks.

Q6) When streaming videos are supplied via the Web,they are often called

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Network Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7599

Sample Questions

Q1) In a ____ attack,a person redirects or captures secure transmissions as they occur.

A) denial-of service

B) man-in-the-middle

C) war driving

D) phishing

Q2) ____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.

Q3) ____ software searches a node for open ports.

A) Phishing

B) Sniffing

C) Authentication

D) Port scanner

Q4) A(n)____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.

Q5) A security policy should state exactly which hardware,software,architecture,or protocols will be used to ensure security.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Page 15

Chapter 13: Troubleshooting Network Problems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7600

Sample Questions

Q1) A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.

A) multimeter

B) cable performance tester

C) network monitor

D) protocol analyzer

Q2) ____ are frames that are not actually data frames,but aberrations caused by a device misinterpreting stray voltage on the wire.

A) Jabbers

B) Ghosts

C) Giants

D) Runts

Q3) List eight questions to ask to help identify network problem symptoms that are not immediately obvious.

Q4) Continuity testers can test only copper cable.

A)True

B)False

Q5) Collects data about power quality.

Q6) Describe what a voltage event recorder is and explain how it works.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Ensuring Integrity and Availability

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7601

Sample Questions

Q1) Power that is free from noise is called "____" power.

A) clear

B) clean

C) filtered

D) white

Q2) A(n)____ virus disguises itself as a legitimate program to prevent detection.

A) stealth

B) encrypted

C) time dependent

D) polymorphic

Q3) A(n)____ UPS uses the A/C power from the wall outlet to continuously charge its battery,while providing power to a network device through its battery.

A) standby

B) offline

C) offsite

D) online

Q4) Protection against harmful code involves more than just installing anti-malware software.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 15: Network Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7602

Sample Questions

Q1) Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.

Q2) A ____ is a correction,improvement,or enhancement to a particular piece of a software application.

A) revision

B) change

C) patch

D) software upgrade

Q3) Explain how to gather baseline data on a network.

Q4) ____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.

A) Principle

B) Application

C) Patch

D) Full

Q5) A patch is a replacement for an entire software package.

A)True

B)False

Q6) List six characteristics software running on network devices may use to prioritize traffic.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.