Test Quiz IT Essentials Chapter 8

25 Questions | Total Attempts: 61

SettingsSettingsSettings
Please wait...
IT Essentials Quizzes & Trivia

IT Essentials V4. 1 Chapter 8 Fundamental Networks


Questions and Answers
  • 1. 
    The Internet is an example of which type of network?
    • A. 

      LAN

    • B. 

      SAN

    • C. 

      WAN

    • D. 

      WLAN

  • 2. 
    What is the suggested maximum number of PC's in a peer-to-peer network?
    • A. 

      100

    • B. 

      50

    • C. 

      25

    • D. 

      10

  • 3. 
    Which method of data transfer allows information to be sent and received at the same time?
  • 4. 
    Latency is the amount of time it takes to travel from_____ to _______.
  • 5. 
    Half Duplex allows data to be sent and received at the same time.
    • A. 

      True

    • B. 

      False

  • 6. 
    How many bits are in an IP address?
  • 7. 
    What is another name for Logical Address?
    • A. 

      Virtual address

    • B. 

      Physical address

    • C. 

      MAC address

    • D. 

      IP address

  • 8. 
    In dotted decimal notation, 32 bits are grouped into 8-bit bytes called ______.
  • 9. 
    Which IP class is used for experimental testing?
    • A. 

      Class A

    • B. 

      Class B

    • C. 

      Class C

    • D. 

      Class D

    • E. 

      Class E

  • 10. 
    What is the default subnet mask for Class A?
    • A. 

      255.255.255.0

    • B. 

      255.0.0.0

    • C. 

      255.255.0.0

  • 11. 
    What is the communication protocol that establishes a connection on the internet?
    • A. 

      FTP

    • B. 

      SSH

    • C. 

      POP3

    • D. 

      HTTP

  • 12. 
    What is the protocol that provides services for file transfer and manipulation?
    • A. 

      HTTP

    • B. 

      SSH

    • C. 

      FTP

    • D. 

      POP3

  • 13. 
    ______ is a protocol used to send email in a TCP/IP network.
  • 14. 
    What is another name for a hub?(Choose Two)
    • A. 

      Concentrator

    • B. 

      Bridge

    • C. 

      Multiport repeater

    • D. 

      Router

  • 15. 
    Which term describes the process of adding headers to data as it moves through the layers of the OSI model?
  • 16. 
    When purchasing Cisco components for a network installation, what are three warning signs that the equipment may be counterfeit?
    • A. 

      The equipment appears to be performing at a substandard level.

    • B. 

      The packaging appears to be substandard compared to the packaging of other Cisco purchases.

    • C. 

      The price is much less than expected.

    • D. 

      All of the above

  • 17. 
    Which protocol lacks support for encryption and can be initiated from a computer command prompt?
    • A. 

      DHCP

    • B. 

      POP3

    • C. 

      Telnet

    • D. 

      HTTP

  • 18. 
    Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
    • A. 

      Star

    • B. 

      Mesh

    • C. 

      Bus

    • D. 

      Ring

  • 19. 
    What are the Two types of fiber-optic cable?(Choose Two)
    • A. 

      Thicknet

    • B. 

      Thinnet

    • C. 

      Multimode

    • D. 

      Single Mode

  • 20. 
    In a Bus Topology, what prevents signals from being echoed back through the network?
  • 21. 
    Which Windows XP command displays the route taken by packets crossing an IP network?
    • A. 

      Ping

    • B. 

      Ipconfig

    • C. 

      Tracert

    • D. 

      Displaydns

  • 22. 
    Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
    • A. 

      Application Layer

    • B. 

      Presentation Layer

    • C. 

      Session Layer

    • D. 

      Transportation Layer

    • E. 

      Network Layer

    • F. 

      Data Link Layer

    • G. 

      Physical Layer

  • 23. 
    Which three protocols are associated with e-mail? (Choose three.)
    • A. 

      POP3

    • B. 

      HTTP

    • C. 

      SMTP

    • D. 

      Telnet

    • E. 

      ICMP

    • F. 

      IMAP

  • 24. 
    Which two characteristics describe Ethernet technology? (Choose two.)
    • A. 

      Supported by IEEE 802.11g standards

    • B. 

      Supported by IEEE 802.11a standards

    • C. 

      Supported by IEEE 802.3 standards

    • D. 

      Uses a star logical topology

    • E. 

      Uses a bus logical topology

    • F. 

      Uses a mesh logical topology

  • 25. 
    A _____ controller manages all security related aspects of users and network resources.
Back to Top Back to top