Network + Pratice Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Xopiex20
X
Xopiex20
Community Contributor
Quizzes Created: 1 | Total Attempts: 902
Questions: 20 | Attempts: 903

SettingsSettingsSettings
Network Plus Quizzes & Trivia

Questions and Answers
  • 1. 

    You need a network that provides a centralized authentication for your users. Which of the following logical topologies should you use?

    • A.

      VLAN's

    • B.

      Peer to Peer

    • C.

      Client/Server

    • D.

      Mesh

    Correct Answer
    C. Client/Server
    Explanation
    A client/server topology is the most suitable choice for providing centralized authentication for users. In this topology, there is a central server that manages user authentication and authorization, while the clients connect to the server for authentication purposes. This allows for a centralized and controlled access to resources, ensuring security and efficient management of user accounts. VLANs are used for network segmentation, peer-to-peer topology lacks centralized control, and mesh topology is more suitable for redundancy and fault tolerance, rather than centralized authentication.

    Rate this question:

  • 2. 

    You need a topology that is scalable to use in your network. Which of the following will you install?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Mesh

    Correct Answer
    C. Star
    Explanation
    A star topology is the most scalable option for a network. In a star topology, all devices are connected to a central hub or switch, allowing for easy expansion by simply adding more devices to the central hub. This makes it flexible and scalable, as new devices can be added without disrupting the entire network. Additionally, it provides better performance and reliability compared to other topologies like bus or ring, as any failure in one device does not affect the entire network. Therefore, installing a star topology would be the best choice for a scalable network.

    Rate this question:

  • 3. 

    Which of the phyiscal topologies has the least likelihood of having a collision?

    • A.

      Bus

    • B.

      Star

    • C.

      Ring

    • D.

      Mesh

    Correct Answer
    D. Mesh
    Explanation
    Mesh topology has the least likelihood of having a collision because it provides a dedicated point-to-point connection between each device. In a mesh network, each device is directly connected to every other device, eliminating the need for data to pass through multiple devices before reaching its destination. This reduces the chances of collisions as there is no shared medium for data transmission. In contrast, bus, star, and ring topologies involve shared media or a central hub, which increases the likelihood of collisions.

    Rate this question:

  • 4. 

    In a phyiscal Star topology , what happens when a workstation loses it phyiscal connection to another device?

    • A.

      The ring is broken, so no devices can communicate

    • B.

      Only that work station loses ability to communicate

    • C.

      The work station and the device it's connected to lose communication with the rest of the network

    • D.

      No devices can communicate because there are now two unterminated networks

    Correct Answer
    B. Only that work station loses ability to communicate
    Explanation
    When a workstation loses its physical connection to another device in a physical Star topology, only that workstation loses the ability to communicate. The rest of the network remains unaffected and communication between other devices can still occur.

    Rate this question:

  • 5. 

    You want to remotely log onto an office computer using remote desktop in a secure manner. Which of the following should you use?

    • A.

      VPN

    • B.

      Tagged Packets

    • C.

      VLAN's

    • D.

      Telnet

    • E.

      SSH

    Correct Answer
    A. VPN
    Explanation
    A VPN (Virtual Private Network) should be used to remotely log onto an office computer using remote desktop in a secure manner. A VPN creates a secure and encrypted connection over a public network, such as the internet, allowing users to access resources on a private network as if they were directly connected to it. This ensures that the data transmitted between the remote device and the office computer is protected from unauthorized access or interception.

    Rate this question:

  • 6. 

    What is a logical grouping of network users and resources connected to administratively defined ports on a switch?

    • A.

      Host

    • B.

      Hub

    • C.

      VLAN

    • D.

      VTP

    Correct Answer
    C. VLAN
    Explanation
    A VLAN, or Virtual Local Area Network, is a logical grouping of network users and resources connected to administratively defined ports on a switch. It allows for the segmentation of a network into multiple virtual networks, each with its own set of users and resources. This enables better network management, security, and efficiency by isolating traffic and controlling access between different VLANs.

    Rate this question:

  • 7. 

    Which of the following is a concern when using a Peer to Peer network?

    • A.

      Where to place the server

    • B.

      Who's computer is the least busy and can act as the server

    • C.

      The security associated with such a network

    • D.

      Having enough peers to support creating such a network

    Correct Answer
    C. The security associated with such a network
    Explanation
    A concern when using a Peer to Peer network is the security associated with such a network. Peer to Peer networks are decentralized and rely on individual computers to share resources and information. This decentralized nature can make it difficult to implement strong security measures and control access to sensitive data. Without proper security measures in place, there is a risk of unauthorized access, data breaches, and potential malware or virus infections spreading through the network. It is important to ensure that appropriate security protocols, such as encryption and authentication, are implemented to protect the network and its users.

    Rate this question:

  • 8. 

    Which of the following is an exsample of when a point to multipoint network is called for?

    • A.

      When a centralized office needs to communicate with many branch offices

    • B.

      When a full mesh of WAN links is in place

    • C.

      When multiple offices are daisy-chained to one another in a line

    • D.

      When there are only 2 nodes in the network to be connected

    Correct Answer
    A. When a centralized office needs to communicate with many branch offices
    Explanation
    A point to multipoint network is called for when a centralized office needs to communicate with many branch offices. In this scenario, a single central location can transmit data to multiple remote locations simultaneously, allowing for efficient communication and coordination between the central office and the branches. This type of network is ideal for scenarios where there is a need for one-to-many communication, such as distributing updates, sharing information, or coordinating operations across multiple locations.

    Rate this question:

  • 9. 

    Which of the following is an exsample of a LAN?

    • A.

      Ten buildings interconnected by Ehternet connections over fiber otpic cabling

    • B.

      Ten routers interconnected by frame relay circuits

    • C.

      Two routers interconnected with a T1 circuit

    • D.

      A computer connected to another one to share resources

    Correct Answer
    D. A computer connected to another one to share resources
    Explanation
    The correct answer is "A computer connected to another one to share resources." This is an example of a Local Area Network (LAN) where two computers are connected to each other to share resources such as files, printers, or an internet connection. A LAN typically covers a small area, such as a home, office, or school, and allows for easy communication and resource sharing between connected devices.

    Rate this question:

  • 10. 

    Which of the following is a disatantage of a Star topology?

    • A.

      When a port on the central concertrating device fails, the attached end device loses connectivity to the rest of the network

    • B.

      When the central concertrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network

    • C.

      In a Star topology, a more exspensive type of host must be used when compared to the host used when implementing a phyiscal bus

    • D.

      It is more difficult to add stations and troubleshoot than with other topologies

    Correct Answer
    B. When the central concertrating device experiences a complete failure, all attached devices lose connectivity to the rest of the network
    Explanation
    In a Star topology, all devices are connected to a central concentrating device, such as a switch or hub. This central device acts as a single point of failure. If this central device experiences a complete failure, all the attached devices lose connectivity to the rest of the network. This is a disadvantage of the Star topology as it can result in a complete network outage if the central device fails.

    Rate this question:

  • 11. 

    What is the difference between a LAN and a WAN?

    • A.

      WAN's need a special type of router port

    • B.

      WAN's cover large heographical areas

    • C.

      WAN's can utilize either private or publice data transport

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above". This means that all of the given statements are true and explain the difference between a LAN and a WAN. The first statement states that WANs need a special type of router port, which is true as WANs often require specific hardware to connect to the internet. The second statement states that WANs cover large geographical areas, which is also true as WANs are designed to connect devices over long distances. The third statement states that WANs can utilize either private or public data transport, which is true as WANs can use various types of networks for data transmission.

    Rate this question:

  • 12. 

    What does VPNstand for?

    • A.

      Virtual Processor Network

    • B.

      Virtual Passive Network

    • C.

      Virtual Private Network

    • D.

      Variable-length Private Network

    Correct Answer
    C. Virtual Private Network
    Explanation
    A VPN stands for Virtual Private Network. It is a technology that allows users to create a secure and encrypted connection over a public network, such as the internet. This enables users to access resources and share data privately and securely, as if they were directly connected to a private network. VPNs are commonly used by individuals and organizations to protect their online privacy, bypass censorship or geo-restrictions, and secure their sensitive information while using public Wi-Fi networks.

    Rate this question:

  • 13. 

    In what type of network are all computers considered equals and do they not share any central authority?

    • A.

      Peer to Peer

    • B.

      Client/Server

    • C.

      Physical topology

    • D.

      None of the above

    Correct Answer
    A. Peer to Peer
    Explanation
    In a peer-to-peer network, all computers are considered equals and there is no central authority. This means that each computer can act as both a client and a server, allowing them to directly communicate and share resources with each other without the need for a central server. This decentralized structure provides greater flexibility and resilience compared to client/server networks where there is a central authority controlling the network.

    Rate this question:

  • 14. 

    What advantages does the client/server architecutre have over peer to peer?

    • A.

      Easier maintenance

    • B.

      Greater organization

    • C.

      Tighter security

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The client/server architecture has advantages over peer-to-peer in terms of easier maintenance, greater organization, and tighter security. With client/server, maintenance is simplified as updates and fixes can be applied centrally on the server, reducing the need for individual updates on each client. The architecture also offers greater organization as resources and data are centralized on the server, making it easier to manage and access. Additionally, client/server provides tighter security as access to resources can be controlled and monitored more effectively, reducing the risk of unauthorized access or data breaches.

    Rate this question:

  • 15. 

    An exsample of Hybrid network is which of the following?

    • A.

      Ethernet

    • B.

      Ring Topology

    • C.

      Bus topology

    • D.

      Star topology

    Correct Answer
    A. Ethernet
    Explanation
    Ethernet is an example of a hybrid network because it combines both wired and wireless technologies. It uses wired connections for the backbone infrastructure, such as switches and routers, while also supporting wireless connections for devices like laptops and smartphones. This combination allows for flexibility and scalability in network design, making it suitable for a variety of environments and applications.

    Rate this question:

  • 16. 

    You have a network with multiple devices and need to have a smaller broadcast domain while working with a tighter budget. Which of the following is the best solution?

    • A.

      Use a static IP address

    • B.

      Add more hubs

    • C.

      Implement more switches

    • D.

      Create VLAN's

    Correct Answer
    D. Create VLAN's
    Explanation
    Creating VLANs is the best solution for having a smaller broadcast domain while working with a tighter budget. VLANs allow for logical segmentation of a network, allowing devices to be grouped together based on their function or department. This reduces the size of the broadcast domain, as broadcasts are only sent to devices within the same VLAN. VLANs can be implemented using existing switches, making it a cost-effective solution compared to adding more hubs or switches. Using a static IP address would not address the issue of broadcast domain size.

    Rate this question:

  • 17. 

    What type of topology has the greatest number of phyiscal connections?

    • A.

      Point to multipoint

    • B.

      Star

    • C.

      Point to Point

    • D.

      Mesh

    Correct Answer
    D. Mesh
    Explanation
    A mesh topology has the greatest number of physical connections. In a mesh network, each device is connected to every other device, forming a fully interconnected network. This means that there are multiple direct connections between devices, resulting in a large number of physical connections. This type of topology provides high redundancy and fault tolerance, as data can be rerouted through different paths if one connection fails. However, it also requires a significant amount of cabling and can be complex to set up and manage.

    Rate this question:

  • 18. 

    What type of topology gives you a direct connection between two routers so that there is one connections path?

    • A.

      Point to Point

    • B.

      Star

    • C.

      Bus

    • D.

      Stright

    Correct Answer
    A. Point to Point
    Explanation
    Point-to-Point topology gives a direct connection between two routers, allowing for a single connection path. In this type of topology, each router is connected directly to another router without any intermediate devices. This creates a dedicated and private connection between the two routers, ensuring efficient and secure communication.

    Rate this question:

  • 19. 

    What network topology is a combination of two or more types of physical or two or more types of logical topologies?

    • A.

      Point to Multipoint

    • B.

      Hybrid

    • C.

      Bus

    • D.

      Star

    Correct Answer
    B. Hybrid
    Explanation
    A hybrid network topology is a combination of two or more types of physical or logical topologies. It allows for flexibility and scalability by integrating different network structures. This combination can be achieved by connecting different types of topologies such as bus, star, ring, or mesh. It provides the advantages of multiple topologies while mitigating their limitations. Therefore, a hybrid network topology is the correct answer to the given question.

    Rate this question:

  • 20. 

    When designing a network and deciding which type of network topology to use, which item(s) should be considered? SELECT ALL THAT APPLY!

    • A.

      Cost

    • B.

      Ease of installation

    • C.

      Ease of maintance

    • D.

      Fault tolerance requirements

    Correct Answer(s)
    A. Cost
    B. Ease of installation
    C. Ease of maintance
    D. Fault tolerance requirements
    Explanation
    When designing a network and deciding which type of network topology to use, several factors should be considered. Cost is an important consideration as different network topologies may vary in terms of their equipment and infrastructure costs. Ease of installation is another crucial factor as some topologies may require more complex installation processes than others. Ease of maintenance is also significant as certain topologies may be easier to manage and troubleshoot in case of any issues. Additionally, fault tolerance requirements should be taken into account to ensure that the network can handle failures and maintain uninterrupted connectivity.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.