Basic Networking And Information Security Module Exam

  • ISO/IEC 27001
  • NIST SP 800-53
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Cherriemfe
C
Cherriemfe
Community Contributor
Quizzes Created: 1 | Total Attempts: 258
| Attempts: 258 | Questions: 59
Please wait...
Question 1 / 59
0 %
0/100
Score 0/100
1. What is Network Interface Card (NIC)?

Explanation

A Network Interface Card (NIC) is an expansion card or device that is used to provide network access to a computer or other device. It allows the device to connect to a network, such as a local area network (LAN) or the internet, by providing the necessary hardware and software components. The NIC acts as an interface between the computer and the network, allowing the computer to send and receive data over the network. It typically connects to the computer's motherboard and provides a physical connection, such as an Ethernet port, for connecting to the network.

Submit
Please wait...
About This Quiz
Basic Networking And Information Security Module Exam - Quiz

This is your first module examination for BASIC NETWORKING AND INFORMATION SECURITY. Enter your full name and password below(ask the password from your instructor).


GOOD LUCK!

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. _______ describes the rate at which information can be transferred using a specific transmission medium or the amount of the information that can be transferred immediately.

Explanation

Bandwidth refers to the rate at which information can be transferred using a specific transmission medium or the amount of information that can be transferred immediately. It is a measure of the capacity of a communication channel to transmit data. A higher bandwidth allows for faster data transfer and more information to be transmitted simultaneously. It is an important factor in determining the speed and efficiency of data transmission in networks and communication systems.

Submit
3. A LAN (Local Area Network) in which each device (node) is connected to a central computer in a star-shaped configuration (topology); a network consisting of a central computer (the hub) surrounded by terminals.

Explanation

The correct answer is C. Star Network Structure. In a star network, each device is connected to a central computer or hub in a star-shaped configuration. This topology allows for easy management and troubleshooting as each device is connected directly to the hub. It also provides better performance and reliability as the failure of one device does not affect the rest of the network.

Submit
4. In networking, the term ______ refers to a set of rules that govern communications.

Explanation

A protocol is a set of rules that govern communications in networking. It defines the format, timing, sequencing, and error control of data transmission between devices. It ensures that data is transmitted accurately and efficiently across a network. Without protocols, devices would not be able to communicate effectively with each other. Therefore, protocol is the correct answer to the question.

Submit
5. The configuration or physical arrangement of the devices in a communications network is called?

Explanation

Network topology refers to the physical or logical arrangement of devices in a communications network. It defines how the devices are connected and how data flows between them. WAN and LAN are types of networks, while an application is a software program. Therefore, the correct answer is network topology.

Submit
6. A collection of computers and devices connected together via communications devices and media.

Explanation

A network is a collection of computers and devices that are interconnected through communication devices and media. This allows them to share resources, such as files and applications, and communicate with each other. Networks can be wired or wireless and can range in size from small local area networks (LANs) to large wide area networks (WANs) that connect multiple locations.

Submit
7. A computer network that physically links two or more computers within a geographically limited area (generally one building or a group of buildings).

Explanation

LAN stands for Local Area Network, which is a computer network that connects multiple computers within a limited geographical area, such as a building or a group of buildings. LANs are typically used in homes, offices, or schools to allow computers to share resources and communicate with each other. Unlike WANs (Wide Area Networks) or MANs (Metropolitan Area Networks), LANs have a smaller coverage area and are usually privately owned and operated. Therefore, the given answer "LAN" is correct as it accurately describes a network that physically links computers within a geographically limited area.

Submit
8. The operating standards for Ethernet networks are defined by the Institute of Electrical and Electronics Engineers (IEEE) and are known as?

Explanation

The correct answer is IEEE 802.3. This is because the Institute of Electrical and Electronics Engineers (IEEE) is responsible for defining the operating standards for Ethernet networks, and IEEE 802.3 specifically refers to the standards for Ethernet networks. The other options (EEIE 803.2, EEEI 803.2, EIEE 802.3) are not correct because they do not accurately represent the correct naming convention used by the IEEE for Ethernet standards.

Submit
9. There are two types of Modem

Explanation

The correct answer is Internal Modem and External Modem. This is because a modem is a device that allows computers to connect to the internet or other networks. An internal modem is installed inside the computer, while an external modem is a separate device that connects to the computer through a cable.

Submit
10. A ________ transmission medium is often used when parts of a network cannot be physically joined.

Explanation

A wireless transmission medium is often used when parts of a network cannot be physically joined because it allows for communication without the need for physical cables or wires. Wireless technology uses radio waves or infrared signals to transmit data between devices, making it a suitable option for connecting devices that are located in different areas or cannot be easily connected through traditional wired methods.

Submit
11. _______ is the most commonly used type of transmission medium.  It usually consists of copper wires covered with a protective plastic coating. It is inexpensive as compared to other types of transmission media. The three main types of this are coaxial, unshielded twisted pair and shielded twisted pair.

Explanation

The correct answer is "Cable". This is because cable is the most commonly used type of transmission medium, which typically consists of copper wires covered with a protective plastic coating. It is also mentioned that cable is inexpensive compared to other types of transmission media. Additionally, the passage mentions three main types of cable: coaxial, unshielded twisted pair, and shielded twisted pair.

Submit
12. A form of local area network (LAN) in which all signals are carried over a main bus and are available to all nodes (computers) on the system. In a network each mode monitors activity and only accepts messages addressed to itself.

Explanation

A bus network structure is a form of local area network (LAN) where all signals are carried over a main bus and are available to all nodes (computers) on the system. In this type of network, each node monitors the activity on the bus and only accepts messages addressed to itself. This means that any node can transmit data onto the bus, and all other nodes can receive and access that data. It is a simple and cost-effective network structure, but it can be prone to congestion and collisions if multiple nodes try to transmit data simultaneously.

Submit
13. A ____ network is constructed of different topologies, such as ring, star and bus.

Explanation

A hybrid network is constructed of different topologies, such as ring, star, and bus. This means that the network combines multiple types of network structures to create a more flexible and versatile network. By incorporating different topologies, the hybrid network can take advantage of the strengths of each structure and overcome their individual limitations. This allows for better scalability, fault tolerance, and efficient data transmission within the network.

Submit
14. A ____ network is a type of network where computers are connected in a loop or ring. A message is passed from one computer to the next until it reaches its destination, helps the flow of information in large network.

Explanation

Token-Ring Architecture is a type of network where computers are connected in a loop or ring. In this architecture, a message is passed from one computer to the next until it reaches its destination. This helps in the flow of information in a large network.

Submit
15. Benefits of a network give at least 3

Explanation

The benefits of a network include security, ease of access, and cost. Security is important because it helps protect sensitive information and prevent unauthorized access to the network. Ease of access allows users to easily connect to the network and access resources and information. Cost is a benefit because a network allows for resource sharing, reducing the need for multiple individual systems and reducing overall costs.

Submit
16. Meaning of OSI?

Explanation

The correct answer is Open Systems Interconnection. OSI refers to the model that describes how different computer systems can communicate with each other using a set of protocols. It is a conceptual framework that allows for the interoperability of diverse communication systems.

Submit
17. Network hardware consists of?

Explanation

Network hardware refers to the physical devices that are used on a network to enable communication and functionality. These devices include routers, switches, modems, network cables, and wireless access points, among others. They are essential for the proper functioning of a network and facilitate the transmission of data between different devices.

Submit
18. What is Network Operating System (NOS)?

Explanation

A Network Operating System (NOS) is responsible for organizing and managing all the activities on a network. This includes tasks such as file sharing, resource allocation, security, and communication between devices. In some networks, a central computer called a server is responsible for running the NOS. The NOS allows the network interface card in a computer to communicate with the network and ensures smooth operation and coordination of all network activities.

Submit
19. It is a specialized computer.  An electronic message is sent to its proper destination by this computer.  It selects the most efficient route for sending the messages like a travel agent.  Any e-mail sent through the internet is passed through a number of ______.

Explanation

Routers are specialized computers that are responsible for sending electronic messages to their proper destinations. They select the most efficient route for sending the messages, similar to how a travel agent selects the best route for a trip. Any email sent through the internet is passed through a number of routers to ensure that it reaches its intended recipient.

Submit
20. A ______ is a barrier to keep destructive forces away from your property.

Explanation

A firewall is a security measure that acts as a barrier to protect your property, such as a computer network, from destructive forces. It monitors and controls incoming and outgoing network traffic based on predetermined security rules, preventing unauthorized access and potential threats like viruses or hackers. By filtering the data packets, a firewall helps to ensure that only safe and legitimate information is allowed to pass through, thus safeguarding your property from potential harm.

Submit
21. A person who overcomes the security measures of a computer system and gains unauthorized access.

Explanation

The term "crackers" refers to individuals who bypass the security measures of a computer system and gain unauthorized access. They are often skilled in exploiting vulnerabilities in computer systems and networks, using techniques such as hacking, phishing, or social engineering. Unlike "fire," "natural disasters," or "theft," which are unrelated to computer security breaches, "crackers" specifically addresses the act of unauthorized access to a computer system.

Submit
22. What level is composed of the parts of a network that is physically exist, such as computers, cables and connectors. This level specifies where the computers on a network are located and how all the parts of the network are connected?

Explanation

The physical level of a network is composed of the tangible components that physically exist, such as computers, cables, and connectors. This level determines the physical location of the computers on the network and how all the different parts of the network are connected. It focuses on the actual hardware and infrastructure of the network rather than the logical or conceptual aspects.

Submit
23. ______ are the physical pathways that join computers and devices on a network.  There are different types of transmission media available to suit any size or type of network.

Explanation

Transmission media refers to the physical pathways that connect computers and devices on a network. These pathways can be wired or wireless, depending on the specific needs of the network. Different types of transmission media are available to accommodate various network sizes and types.

Submit
24. A computer that serves information to connected computers, such as Web servers, applications, files, printers and other information and hardware become available.

Explanation

A server is a computer that provides information and resources to other connected computers. It serves as a central hub for sharing files, running applications, hosting websites, and providing access to printers and other hardware. In the context of the given question, a server is responsible for making information and hardware available to connected computers, such as web servers, applications, files, and printers.

Submit
25. A network user can gain access to a specific computer or printer by identifying himself/herself with a username and a password. By doing this, users can prevent unauthorized people from accessing the network.

Explanation

Logging on refers to the process of gaining access to a specific computer or printer by providing a username and password. This allows authorized users to use the resources and information available on the network while preventing unauthorized individuals from accessing it. Logging on is a security measure that helps protect the network from hacking or unauthorized access.

Submit
26. A ____ network layout is designed in such a way that it places important resources, such as file servers, in one central location.

Explanation

A centralized network layout is designed to have important resources, such as file servers, located in one central location. This allows for easier management and access to these resources, as they are all in one place. It also enables better control and security measures to be implemented, as the central location can be closely monitored and protected. This type of network layout is often used in organizations where centralized control and efficient resource allocation are important considerations.

Submit
27. Short for modulator/demodulator.  A communications device that enables a computer to transmit information over a standard telephone line.

Explanation

A modem is a device that allows a computer to transmit data over a standard telephone line. It acts as both a modulator and a demodulator, converting digital signals from the computer into analog signals that can be transmitted over the telephone line, and vice versa. Modems are essential for connecting to the internet or other remote networks using a dial-up connection. They play a crucial role in enabling communication between computers and the wider network infrastructure.

Submit
28. A network in which one or more computers is/are designated as a _____ and the other computers on the network, called _____, can request services from the server.

Explanation

In this network, one or more computers are designated as the server, which provides services to the other computers on the network, known as clients. The clients can request services from the server.

Submit
29. A device that supports the functions of both a bridge and router.  It links two segments of a local or wide area network, passing packets of data between the segments as necessary and uses Level 2 addresses for routing.

Explanation

A device that supports the functions of both a bridge and router is known as a bridge router. This device is used to link two segments of a local or wide area network and passes packets of data between the segments as necessary. It uses Level 2 addresses for routing, which means it operates at the data link layer of the OSI model. This combination of bridge and router functionalities allows for efficient and flexible network connectivity and management.

Submit
30. A protocol that is used to download and upload files.

Explanation

FTP (File Transfer Protocol) is a protocol specifically designed for transferring files between a client and a server on a computer network. It allows users to download and upload files from and to a remote server. FTP is widely used for file sharing and is known for its reliability and security features. Unlike TCP and UDP, which are transport layer protocols, FTP operates at the application layer of the TCP/IP protocol suite. Therefore, FTP is the correct answer for a protocol used for downloading and uploading files.

Submit
31. Examples of Communication Media, give at least 3 examples

Explanation

The given examples of communication media are telephone lines, cables, and satellites. These are all examples of physical mediums used to transmit information from one point to another. Telephone lines are used for voice communication, cables are used for wired internet connections, and satellites are used for long-distance communication and broadcasting. These examples demonstrate different types of communication media that are commonly used in various forms of communication.

Submit
32. A LAN (local are network) in which devices (nodes) are connected in a close loop or ring.  When a node receives a message, it examines the destination address attached to the message. The ring can also be designed to bypass any malfunctioning or fails node.

Explanation

A ring network structure is a LAN (local area network) in which devices (nodes) are connected in a close loop or ring. In this network structure, when a node receives a message, it examines the destination address attached to the message. The ring can also be designed to bypass any malfunctioning or failed node. This type of network structure is commonly used in token ring networks, where a token is passed around the network to control access to the shared communication medium.

Submit
33. Can share information at a very high speed of up to 1000 Mbps and is typically used as the backbone of a local area network. Gigabit Ethernet commonly uses fibre-optic cable, but Category 5 unshielded twisted pair cable can also be employed.

Explanation

Gigabit Ethernet can share information at a very high speed of up to 1000 Mbps, making it suitable for use as the backbone of a local area network. It is commonly used with fibre-optic cable, but can also be used with Category 5 unshielded twisted pair cable. The term "Gigabyte Ethernet" is incorrect as it refers to a different unit of measurement (storage capacity) rather than the speed of data transfer.

Submit
34. A network of two or more computers that use the same program or type of program to communicate and share data.

Explanation

Peer-to-peer architecture refers to a network where all computers have equal capabilities and can act as both clients and servers. In this type of network, there is no central server, and each computer can directly communicate and share data with any other computer on the network. This architecture is often used in small networks or where there is a need for decentralized communication and data sharing.

Submit
35. A computer network that is distinguished from a Local Area Network because of its longer-distance communications. The network may cover, say, a whole country or may include the sites of a large multinational organization.

Explanation

A Wide Area Network (WAN) is a computer network that covers a larger geographical area compared to a Local Area Network (LAN). It can span across a whole country or include multiple sites of a large multinational organization. Unlike LANs, which are typically limited to a single building or campus, WANs allow for longer-distance communications and connect multiple LANs together.

Submit
36. An inexpensive local area network developed by Apple Computer, Inc. for Macintosh computers that can be used by Apple and non-Apple computers to communicate and share resources such as printers and file servers.

Explanation

Appletalk Architecture is the correct answer because it accurately describes the inexpensive local area network developed by Apple Computer, Inc. for Macintosh computers. It also mentions that it can be used by both Apple and non-Apple computers to communicate and share resources. This explanation provides a clear and concise understanding of the correct answer.

Submit
37. A _____ connects the cables on a network.  It can also direct information to a specific destination on a network.

Explanation

A switch connects the cables on a network and is capable of directing information to a specific destination on the network. Unlike a hub, which simply broadcasts data to all connected devices, a switch intelligently routes data only to the intended recipient. This allows for more efficient and secure communication on a network. A router, on the other hand, connects multiple networks and directs data between them. A repeater is used to amplify or regenerate signals in order to extend the reach of a network.

Submit
38. ____ architecture defines how information travels on a network.

Explanation

Network architecture refers to the design and structure of a network, including how information is transmitted and how devices are connected. It determines the protocols, technologies, and standards used for communication. This includes the layout of network components, such as routers, switches, and servers, and the routing algorithms used to direct data packets. Network architecture is crucial for ensuring efficient and reliable communication within a network.

Submit
39. This is an OSI Layer that actually interacts with the operating system or application whenever the user chooses to transfer files, read messages or perform other network-related activities.

Explanation

The application layer is the correct answer because it is the OSI layer that interacts with the operating system or application when the user chooses to transfer files, read messages, or perform other network-related activities. This layer is responsible for providing services such as file transfer, email, web browsing, and remote access. It enables communication between the user and the network by translating user requests into network protocols and vice versa.

Submit
40. A ____ refers to a signal that regulates the flow of information on a network. Works by passing a single token from computer to computer. Before sending information, the computer must collect the token. Only one computer can transmit information at one time on a Token-Ring network. This makes sure that collision never occur.

Explanation

A token refers to a signal that regulates the flow of information on a network. It works by passing a single token from computer to computer. Before sending information, the computer must collect the token. Only one computer can transmit information at one time on a Token-Ring network. This ensures that collisions never occur.

Submit
41. On a local area network or the Internet, a computer that accesses shared network resources provided by another computer.

Explanation

A client is a computer that accesses shared network resources provided by another computer. This means that the client computer is requesting and using services or data from a server computer. The client initiates the communication and makes requests to the server, which then responds and provides the requested resources.

Submit
42. _______ also helps transfer information.  Fibre-optic cable transmits information by sending light signals through a core made of glass or plastic.  Networks using fibre-optic cable transfer information quickly, but they are expensive and difficult to install.

Explanation

Light is the correct answer because fibre-optic cables transmit information by sending light signals through a core made of glass or plastic. This allows for fast and efficient transfer of information.

Submit
43. ____ are commonly hybrid networks. Often connect multiple network structures to create one large network.

Explanation

WAN (Wide Area Network) is the correct answer because it commonly consists of hybrid networks that connect multiple network structures to create one large network. WANs are designed to cover a wide geographical area and connect different locations, such as offices, buildings, or cities, allowing for communication and data transfer between them. This makes WANs suitable for organizations that have branches or offices in different locations and need to establish a unified network infrastructure.

Submit
44. Corresponding to the OSI Transport layer, this is the part of the protocol stack where the Transport Control Protocol (TCP) can be found.

Explanation

The correct answer is Transport because the question is asking for the part of the protocol stack where the Transport Control Protocol (TCP) can be found. TCP is a protocol that operates at the Transport layer of the OSI model. The other options, Network Interface, Internet, and Application, do not correspond to the Transport layer.

Submit
45. A high-speed network that can carry voice, data, and images at up to 200 Mbps or faster over distances of up to 75 km. Based on the network architecture, the transmission speed can be higher for short distances.

Explanation

MAN stands for Metropolitan Area Network, which is a high-speed network that can carry voice, data, and images at up to 200 Mbps or faster over distances of up to 75 km. It is designed to cover a larger geographical area than a LAN (Local Area Network) but smaller than a WAN (Wide Area Network). MANs are typically used to connect multiple LANs within a city or metropolitan area.

Submit
46. A network connection device similar to a bridge except that is usually visible to the user.  It translates data between one type of network and another.

Explanation

A gateway is a network connection device that is similar to a bridge but is usually visible to the user. It translates data between one type of network and another. Gateways are often used to connect networks with different protocols or technologies, allowing them to communicate with each other. Unlike bridges, which only connect networks of the same type, gateways can facilitate communication between different types of networks.

Submit
47. A protocol that is used to break apart and rebuild information that travels over the internet.

Explanation

TCP (Transmission Control Protocol) is a protocol used to break apart and rebuild information that travels over the internet. It provides reliable, ordered, and error-checked delivery of data packets between devices. TCP ensures that data packets are transmitted in the correct order and that any lost or corrupted packets are retransmitted. It also manages the flow of data between devices to prevent congestion and ensure efficient transmission. TCP is widely used for applications such as web browsing, email, and file transfer, where reliable and accurate data transmission is crucial.

Submit
48. ______ is used by a router to exchange the information with other routers.

Explanation

ICMP (Internet Control Message Protocol) is used by a router to exchange information with other routers. ICMP is a network protocol that allows routers to send error messages and operational information to other routers or hosts in the network. It is commonly used for diagnostic and troubleshooting purposes, such as reporting errors, checking network connectivity, and determining the best path for data packets. Unlike UDP (User Datagram Protocol), SMTP (Simple Mail Transfer Protocol), and SNMP (Simple Network Management Protocol), ICMP is specifically designed for communication between routers and does not handle data transfer or email transmission.

Submit
49. Bandwidth refers to the speed at which information can transfer and the amount of information that can transfer immediately. As the bandwidth increases, the network becomes more complex.

Explanation

The correct answer is "Transfer of information". Bandwidth refers to the speed at which information can be transferred and the amount of information that can be transferred immediately. Therefore, increasing the bandwidth allows for faster and more efficient transfer of information within a network.

Submit
50. This architecture used for personal computers. They are simple, inexpensive and flexible.

Explanation

Arcnet Architecture is a suitable explanation for this question because it is described as simple, inexpensive, and flexible, which aligns with the given characteristics of the architecture used for personal computers. Additionally, the other options (Token-Ring, Appletalk, and Ethernet) are not mentioned as being simple, inexpensive, and flexible, making Arcnet the most fitting choice based on the given information.

Submit
51. Offers a central location where all the cables on a network meet.  These are found on most modern networks.  Many types of network structures are now using this as the primary method of connecting computers.

Explanation

A hub is a device that offers a central location where all the cables on a network meet. It is commonly found on most modern networks and is used as the primary method of connecting computers in many types of network structures.

Submit
52. A ____ network layout is designed in such a way that it places the most important functions, such as file and printer sharing, throughout the network.

Explanation

A distributed network layout is designed in such a way that it places the most important functions, such as file and printer sharing, throughout the network. This means that these functions are not centralized in one location but are spread out across multiple nodes or devices in the network. This design allows for better efficiency, flexibility, and fault tolerance as multiple devices can handle the workload and if one device fails, the others can still continue to function.

Submit
53. What level traces the path information takes to reach its destination on a network?

Explanation

The logical level is the level that traces the path information takes to reach its destination on a network. This level deals with the logical addressing and routing of data packets, ensuring that they are properly directed to their intended destination. It is responsible for establishing connections, maintaining data flow, and managing network resources. The logical level is essential for efficient and reliable communication within a network.

Submit
54. A device that connects two networks into one large logical network so that information can flow between them.  The networks may be using different protocols and they are joined together at the data link layer (OSI layer 2).

Explanation

A bridge is a device that connects two networks together at the data link layer. It allows information to flow between the networks, even if they are using different protocols. Unlike routers, which operate at the network layer (OSI layer 3), bridges operate at the data link layer (OSI layer 2). This means that bridges are able to forward data based on the MAC addresses of devices connected to the network, rather than IP addresses.

Submit
55. To control the transfer of information on an Ethernet network, can be used. This method is used on AppleTalk networks.

Explanation

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is a method used to control the transfer of information on an Ethernet network. It is particularly used on AppleTalk networks. In CSMA/CA, before transmitting data, a device checks if the network is busy or not. If the network is busy, the device waits for a random amount of time before attempting to transmit again. This helps to avoid collisions and ensures more reliable data transmission on the network.

Submit
56. Network architecture provides?

Explanation

Network architecture provides a pictorial representation of the physical layout of the network. It allows users to visualize how the different components of the network are connected and organized. This can be helpful in troubleshooting network issues, planning network expansions, and understanding the overall structure of the network. By having a clear visual representation, network administrators can effectively manage and maintain the network infrastructure.

Submit
57. A method of controlling the transfer of information on an Ethernet network. This method proves to be very effective when used on Ethernet networks that have a large number of users.

Explanation

CSMA/CD stands for Carrier Sense Multiple Access with Collision Detection. It is a method used to control the transfer of information on an Ethernet network. This method is particularly effective on Ethernet networks with a large number of users. CSMA/CD allows multiple devices to share the same network medium by sensing whether the medium is busy before transmitting data. If a collision occurs (when two or more devices transmit data at the same time), CSMA/CD detects the collision and initiates a backoff algorithm to retransmit the data. This helps to minimize data collisions and ensure efficient communication on the network.

Submit
58. ______ is used to collect system information from a remote computer.

Explanation

SNMP (Simple Network Management Protocol) is used to collect system information from a remote computer. It allows network administrators to manage and monitor network devices, such as routers, switches, and servers, by retrieving information about their performance, configuration, and status. SNMP uses a client-server model, where the SNMP manager (client) collects data from SNMP agents (servers) running on the remote computer. This information can then be used for troubleshooting, performance analysis, and network optimization.

Submit
59. What is Management software?

Explanation

Management software refers to a software that includes the programs that run on computers connected to a network. This software helps network administrators in organizing and managing the network more efficiently. It allows them to make information and resources available to other computers on the network. This definition aligns with the given correct answer.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 21, 2009
    Quiz Created by
    Cherriemfe
Cancel
  • All
    All (59)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What is Network Interface Card (NIC)?
_______ describes the rate at which information can be transferred...
A LAN (Local Area Network) in which each device (node) ...
In networking, the term ______ refers to a set of rules that govern...
The configuration or physical arrangement of the ...
A collection of computers and devices connected together via...
A computer network that physically links two or more ...
The operating standards for Ethernet networks are ...
There are two types of Modem
A ________ transmission medium is often used when ...
_______ is the most commonly used type of transmission ...
A form of local area network (LAN) in which all ...
A ____ network is constructed of different topologies, ...
A ____ network is a type of network where computers ...
Benefits of a network give at least 3
Meaning of OSI?
Network hardware consists of?
What is Network Operating System (NOS)?
It is a specialized computer.  An electronic message is sent to...
A ______ is a barrier to keep destructive forces away from your...
A person who overcomes the security measures of a computer system and...
What level is composed of the parts of a network that ...
______ are the physical pathways that join computers ...
A computer that serves information to connected ...
A network user can gain access to a specific computer ...
A ____ network layout is designed in such a way that ...
Short for modulator/demodulator.  A communications device that...
A network in which one or more computers is/are ...
A device that ...
A protocol that is used to download and upload files.
Examples of Communication Media, give at least 3 examples
A LAN (local are network) in which devices (nodes) are ...
Can share information at a very high speed of up to ...
A network of two or more computers that use the same ...
A computer network that is distinguished from a Local ...
An inexpensive local area network developed by Apple ...
A _____ connects the cables on a network.  It can also direct...
____ architecture defines how information travels on a network.
This is an OSI Layer that actually interacts with the operating system...
A ____ refers to a signal that regulates the flow of ...
On a local area network or the Internet, a computer ...
_______ also helps transfer information.  Fibre-optic cable...
____ are commonly hybrid networks. Often connect ...
Corresponding to the OSI Transport layer, this is the part of the...
A high-speed network that can carry voice, data, and ...
A network connection device similar to a bridge except ...
A protocol that is used to break apart and rebuild information that...
______ is used by a router to exchange the information with other...
Bandwidth refers to the speed at which information can ...
This architecture used for personal computers. They ...
Offers a central location where all the cables on a ...
A ____ network layout is designed in such a way that ...
What level traces the path information takes to reach ...
A device that connects two networks into one large ...
To control the transfer of information on an Ethernet ...
Network architecture provides?
A method of controlling the transfer of information on ...
______ is used to collect system information from a remote computer.
What is Management software?
Alert!

Advertisement