Final Computer Network Quiz

52 Questions | Total Attempts: 54

SettingsSettingsSettings
Please wait...
Final Computer Network Quiz

Computer networking is a branch of information technology, which studies the interconnection of several computers working together. Are you a networks guru? Take the quiz below and see how well informed you are. All the best.


Questions and Answers
  • 1. 
    What is a function of the distribution layer in the hierarchical design model?
    • A. 

      To provide latency free switching

    • B. 

      To organize end devices in small manageable groups to provide connectivity using the high-speed backbone

    • C. 

      To organize end devices in small manageable groups

    • D. 

      To provide connectivity between smaller local networkstion 4

  • 2. 
    Under what circumstance would it be appropriate to use private IP addresses?
    • A. 

      For communication between two ISPs

    • B. 

      For a network that is directly connected to the Internet

    • C. 

      For addresses that are used exclusively within an organization.

    • D. 

      For a host with more than one direct connection to the Internet

  • 3. 
    What two commands can be used to form a new binding if client information does not agree with the DHCP client table? (Choose two.)
    • A. 

      Ipconfig /release

    • B. 

      Ipconfig /all

    • C. 

      Ipconfig /flushdns

    • D. 

      Ipconfig /renew

    • E. 

      Ipconfig

  • 4. 
    What type of computer would most likely use a docking station?
    • A. 

      Laptop

    • B. 

      Server

    • C. 

      Desktop

    • D. 

      Mainframe

    • E. 

      Workstation

  • 5. 
    For an IP address, what component decides the number of bits that is used to represent the host ID?
    • A. 

      Default-gateway

    • B. 

      Host number

    • C. 

      Network number

    • D. 

      Subnet mask

  • 6. 
    What type of cable would be required to connect a Linksys router to a wired PC?
    • A. 

      Crossover cable

    • B. 

      Rollover cable

    • C. 

      Serial cable

    • D. 

      Straight-through cable

  • 7. 
    A network technician suspects that malware on a user PC is opening multiple TCP connections to a specific foreign host address. Which Windows command line utility can be used to confirm the multiple TCP connections?
    • A. 

      Ping

    • B. 

      Netstat

    • C. 

      Tracert

    • D. 

      Ipconfig

    • E. 

      Nslookup

  • 8. 
    A college network administrator is planning a wireless LAN to provide service in the student lounge and outdoor patio. The requirements include a range of at least 80 meters and a speed of 30 Mb/s. Which wireless LAN standard meets these requirements?
    • A. 

      802.11

    • B. 

      802.11a

    • C. 

      802.11b

    • D. 

      802.11g

  • 9. 
    Which of the following statements best describes DNS?
    • A. 

      DNS servers are used to map an IP address to a physical address.

    • B. 

      DNS servers are used to map a name to an IP address.

    • C. 

      DNS servers are used to configure logical address information for host computers.

    • D. 

      DNS servers are used to translate from private addresses to public addresses.

  • 10. 
    A network administrator has been notified that users have experienced problems gaining access to network resources. What utility could be used to directly query a name server for information on a destination domain?
    • A. 

      Ping

    • B. 

      Tracert

    • C. 

      Netstat

    • D. 

      Ipconfig

    • E. 

      Nslookup

  • 11. 
    What is the purpose of pop-up blocker software?
    • A. 

      It detects and removes spyware.

    • B. 

      It detects and removes viruses.

    • C. 

      It prevents the display of advertisement windows.

    • D. 

      It removes unwanted e-mail.

  • 12. 
    What data communication technology uses low-power radio waves to transmit data?
    • A. 

      Copper cable

    • B. 

      Fiber optic cable

    • C. 

      Wireless

    • D. 

      Radio

  • 13. 
    What are two examples of peripheral input devices? (Choose two.) external modem
    • A. 

      Barcode reader

    • B. 

      Digital camera

    • C. 

      Plotter

    • D. 

      Printer

  • 14. 
    Which portion of the packet does a router use to forward the packet to the destination?
    • A. 

      Source IP address

    • B. 

      User data

    • C. 

      Destination IP address

    • D. 

      Control information

    • E. 

      Destination MAC address

  • 15. 
    Which two statements are true about local applications? (Choose two.)
    • A. 

      They run on the network.

    • B. 

      An example of a local application is e-mail.

    • C. 

      They are accessed from a remote computer.

    • D. 

      They are stored on the local hard disk.

    • E. 

      They run on the computer where they are installed.

  • 16. 
    Which three address ranges can be used to depict private IP addresses? (Choose three.)
    • A. 

      10.0.0.0 to 10.0.0.255

    • B. 

      127.16.0.0 to 127.16.255.255

    • C. 

      150.150.0.0 to 150.150.255.255

    • D. 

      172.16.1.0 to 172.16.1.255

    • E. 

      192.168.22.0 to 192.168.22.255

    • F. 

      200.100.50.0 to 200.100.50.255

  • 17. 
     Because of an increasing number of users, bandwidth per user on a WLAN has decreased to a point where users are complaining about poor performance. What can be done to improve the user experience?
    • A. 

      Increase the AP radio signal strength.

    • B. 

      Place the AP in a more central location.

    • C. 

      Deploy an external omni-directional antenna.

    • D. 

      Reduce the number of devices using each channel.

  • 18. 
    How does a straight-through cable connect two unlike devices?
    • A. 

      It connects the receive pins on the first device to the receive pins on the second device.

    • B. 

      It connects the transmit pins on the first device to the receive pins on the second device.

    • C. 

      It disconnects the transmit pins and uses only the receive pins.

    • D. 

      It uses the same pins for transmitting and receiving.

  • 19. 
    TCP/IP data transmission between the source and destination host is encapsulated in four steps:  A. adds the data-link header and trailer;  B. converts data to bits for transmission;  C. adds the network IP address to the header of the packet;  D. segments the data for end-to-end transport.  What is the correct sequence of these steps?
    • A. 

      A, B, C, D

    • B. 

      A, D, B, C

    • C. 

      B, D, A, C

    • D. 

      D, C, A, B

    • E. 

      D, C, B, A

  • 20. 
    When are leased lines typically used?
    • A. 

      When low bandwidth is required

    • B. 

      For home and small business connectivity

    • C. 

      When a dedicated digital data line is necessary

    • D. 

      As a less expensive option to cable and DSL modem service

  • 21. 
    What are two ways that a user can interact with an operating system shell? (Choose two.)
    • A. 

      CLI

    • B. 

      OS

    • C. 

      GUI

    • D. 

      NIC

    • E. 

      Kernel

  • 22. 
    Refer to the exhibit. H1 can ping H2, H3, and the Fa0/0 interface of router R1. H2 and H3 but not H1 can ping H4 and H5. What is a possible cause for the H1 failure?
    • A. 

      Router R1 has no route to the destination network.

    • B. 

      Switch S1 does not have an IP address configured.

    • C. 

      The link between router R1 and switch S2 has failed.

    • D. 

      Host H1 does not have a default gateway configured.

  • 23. 
    After issuing the ipconfig/all command on a host that has DHCP enabled, a network administrator notes that the output contains faulty IP configuration information. What is the first step the administrator should take to resolve this issue?
    • A. 

      Replace the NIC in the host.

    • B. 

      Change the IP address of the DHCP server.

    • C. 

      Use static addressing to assign the correct IP address.

    • D. 

      Use the release and renew options supported by the ipconfig command.

  • 24. 
    When terminating a UTP cable, why is it important to push the wires all the way into the end of the connector?
    • A. 

      To allow the cable to endure more stretching or twisting

    • B. 

      To ensure good electrical contact

    • C. 

      To ensure that the wires are in correct order

    • D. 

      To minimize crosstalk

  • 25. 
    Which network design layer provides a connection point for end user devices to the network?
    • A. 

      Access

    • B. 

      Core

    • C. 

      Distribution

    • D. 

      Network