

![]()


Introduction to Networking provides students with a foundational understanding of computer networks, covering essential concepts such as network topologies, protocols, data transmission methods, and the OSI and TCP/IP models. The course explores both wired and wireless networks, Ethernet technology, IP addressing, and the basics of routing and switching. Students will also learn about network devices including switches, routers, and hubs as well as network security principles and troubleshooting techniques. Through practical examples and hands-on labs, the course equips learners with the skills needed to understand, set up, and maintain basic networks in both personal and professional environments.
Recommended Textbook
Network Guide to Networks 6th Edition by Tamara Dean
Available Study Resources on Quizplus
15 Chapters
627 Verified Questions
627 Flashcards
Source URL: https://quizplus.com/study-set/1111 Page 2

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21837
Sample Questions
Q1) Which certification requires candidates to pass lab exams?
A) Cisco CCIE
B) CompTIA A+
C) CompTIA Network+
D) Microsoft MCSE
Answer: A
Q2) ____ is a popular career development tool for job seekers and a measure of an employee's qualifications for employers.
A) Certification
B) Evaluation
C) Degree auditing
D) Apprenticeship
Answer: A
Q3) ____ provide a Web-based client for checking e-mail.
A) Web servers
B) Mail servers
C) File servers
D) Access servers
Answer: B
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21838
Sample Questions
Q1) Define a checksum and describe how Transport layer protocols implement them to ensure data integrity.
Answer: To ensure data integrity further, connection-oriented protocols such as TCP use a checksum. A checksum is a unique character string that allows the receiving node to determine if an arriving data unit exactly matches the data unit sent by the source. Checksums are added to data at the source and verified at the destination. If at the destination a checksum doesn't match what the source predicted, the destination's Transport layer protocols ask the source to retransmit the data.
Q2) Which IEEE standard describes specifications for wireless transmissions?
A) 802.1
B) 802.3
C) 802.5
D) 802.11
Answer: D
Q3) The Application layer includes software applications.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above.
4

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21839
Sample Questions
Q1) Latency occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
A)True
B)False
Answer: False
Q2) The use of 1s and 0s to represent information is characteristic of a(n) ____________________ system.
Answer: binary
Q3) ____________________ are the pieces of hardware that connect the wire to the network device.
Answer: Connectors
Q4) ____ describes a popular serial data transmission method.
A) EIA/TIA Commercial Building Wiring Standard
B) EIA/TIA RS-232 (Recommended Standard 232)
C) EIA/TIA 568A standard
D) EIA/TIA 568BA standard
Answer: B
Q5) ____________________ transmission involves one transmitter and multiple receivers.
Answer: Point-to-multipoint
To view all questions and flashcards with answers, click on the resource link above. Page 5

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21840
Sample Questions
Q1) In IPv4 addressing, each IP address is a unique ____ number.
A) 12-bit
B) 32-bit
C) 64-bit
D) 128-bit
Q2) In dotted decimal notation, a(n) ____ separates each decimal.
A) dash
B) slash
C) colon
D) period
Q3) The command used to view IP information on a Windows workstation is ipconfig.
A)True
B)False
Q4) A(n) ____________________ is a special 32-bit number that, when combined with a device's IP address, informs the rest of the network about the segment or network to which the device is attached.
Q5) Describe how ARP improves efficiency of MAC-to-IP address mappings.
Q6) Describe the Time to Live (TTL) field in an IP datagram.
Q7) Describe multicasting.
Q8) TCP ensures reliable data delivery through sequencing and
To view all questions and flashcards with answers, click on the resource link above.
Page 7

Available Study Resources on Quizplus for this Chatper
39 Verified Questions
39 Flashcards
Source URL: https://quizplus.com/quiz/21841
Sample Questions
Q1) Explain how the star-wired bus topology works. Include a description of its drawbacks and benefits.
Q2) A complex combination of topologies is known as a ____ topology.
A) mixed
B) hybrid
C) compound
D) mulitpart
Q3) The most common 1-Gigabit Ethernet standard in use today is ____.
A) 1000Base-T
B) 1000Base-SX
C) 10GBase-SR
D) 1000Base-LX
Q4) The smallest LANs do not have a backbone.
A)True
B)False
Q5) Explain why it is important to understand logical topologies.
Q6) Briefly explain how CSMA/CD works.
Q7) Explain the 5-4-3 rule of networking.
To view all questions and flashcards with answers, click on the resource link above. Page 8
Q8) Explain how the distributed backbone is connected. Include a description of its benefits.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21842
Sample Questions
Q1) Buses differ according to their ____.
A) connectors
B) resistance
C) capacity
D) speed
Q2) A router that directs data between nodes on an autonomous LAN (or one owned and operated by a single organization) is known as a(n) ____________________ router.
Q3) A ____ is a repeater with more than one output port.
A) bridge
B) switch
C) hub
D) router
Q4) Describe two popular types of gateways.
Q5) Define wireless NICS. Include a description of disadvantages associated with their use.
Q6) Describe the Routing Information Protocol.
Q7) Explain hybrid routing protocols. Describe an example.
Q8) Describe how a computer's bus can be expanded to include devices other than those found on the motherboard.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21843
Sample Questions
Q1) Dial-up ISDN does not convert a computer's digital signals to analog before transmitting them over the PSTN.
A)True
B)False
Q2) Explain how a cable modem is utilized in broadband cable connections.
Q3) ____ WANs are the most fault-tolerant type of WAN because they provide multiple routes for data to follow between any two points.
A) Bus
B) Star
C) Mesh
D) Tiered
Q4) Why is SONET technology typically not implemented by small or medium-size businesses?
Q5) A(n) ____________________ combines individual SONET signals on the transmitting end, and another multiplexer separates combined signals on the receiving end.
Q6) ATM is a WAN technology that functions in the Data Link layer.
A)True
B)False
Q7) Explain how ATM relies on virtual circuits.
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
40 Verified Questions
40 Flashcards
Source URL: https://quizplus.com/quiz/21844
Sample Questions
Q1) Describe the use of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) to access a shared medium.
Q2) Clients are able to exchange signals with satellites as long as they have a ____ path.
A) view
B) line-of-sight
C) proprietary
D) directional
Q3) Describe the wireless spectrum.
Q4) Wireless networks are laid out using the same topologies as wired networks.
A)True
B)False
Q5) Spread spectrum is a popular way of making wireless transmissions more secure.
A)True
B)False
Q6) A directional antenna issues wireless signals along a(n) ____ direction.
A) open
B) narrow
C) wide
D) single
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21845
Sample Questions
Q1) An example of a popular client email software is ____.
A) MIME
B) Microsoft Outlook
C) Sendmail
D) Microsoft Exchange Server
Q2) In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address.
A) classful
B) subnet
C) stateful
D) limited
Q3) The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.
A) 100
B) 1000
C) 10,000
D) 1,000,000
Q4) ____________________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21846
Sample Questions
Q1) ____ desktops are desktop operating environments hosted virtually, on a different physical computer from the one with which the user interacts.
A) Virtual
B) Physical
C) Material
D) Guest
Q2) The software required to establish VPNs is usually expensive.
A)True
B)False
Q3) The physical computer on a virtual machine is known as a ____.
A) guest
B) client
C) host
D) server
Q4) A VM must use the same operating system, type of CPU, storage drive, and NIC as the physical computer it resides on.
A)True
B)False
Q5) Describe PPPoE.
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21847
Sample Questions
Q1) A(n) ____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
Q2) The combination of a public key and a private key is known as a ____.
A) key lock
B) key frame
C) key pair
D) key set
Q3) In a ____ attack, a person redirects or captures secure transmissions as they occur.
A) denial-of service
B) man-in-the-middle
C) war driving
D) phishing
Q4) A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
A) flashing
B) denial-of-service
C) dictionary
D) brute force
To view all questions and flashcards with answers, click on the resource link above. Page 14
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21848
Sample Questions
Q1) ____ signaling functions are more limited than those performed by the protocols in the H.323 group.
A) RTCP
B) MGC
C) MEGACO
D) SIP
Q2) Describe six functions performed by signaling protocols.
Q3) When streaming videos are supplied via the Web, they are often called ____________________.
Q4) A(n) ____ is a computer that manages multiple media gateways.
A) MPLS
B) MGCP
C) MEGACO
D) MGC
Q5) ____ is a measure of how well a network service matches its expected performance.
A) QoS
B) RSVP
C) DiffServ
D) MPLS

Page 15
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21849
Sample Questions
Q1) ____ is a fundamental property of wire that depends on a wire's molecular structure and size.
A) Voltage
B) Current
C) Resistance
D) Impedance
Q2) A____ is a small electronic device that issues a signal on a wire pair.
A) tone locator
B) probe kit
C) tone generator
D) probe
Q3) When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
A) resistance
B) impedance
C) voltage
D) current
Q4) Describe five functions all network monitoring tools perform.
Q5) Describe three advantages of using wireless network tools.
Q6) Describe four ways a network professional might use a multimeter.
Page 16
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21850
Sample Questions
Q1) ____ scanning techniques attempt to identify malware by discovering "malware-like" behavior.
A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
Q2) ____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
A) NAS
B) RAID
C) SANs
D) Optical media
Q3) ____ is intended to eliminate single points of failure.
A) Availability
B) Redundancy
C) Contingency
D) Integrity
Q4) What are external disk drives and why are they useful?
Q5) Describe a backup rotation scheme and explain the goal of a good scheme.
Q6) What is integrity checking?
To view all questions and flashcards with answers, click on the resource link above. Page 17

Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/21851
Sample Questions
Q1) A(n) ____________________ is a report of the network's current state of operation.
Q2) The first step in configuration management is to take an inventory of each node on the network.
A)True
B)False
Q3) On Windows-based computers an event log and can be easily viewed with the GUI ____________________ application.
Q4) A ____ is a network device devoted to storage and delivery of frequently requested files.
A) cache engine
B) Web site host
C) server
D) database host
Q5) Above all, keep ____ in mind when you upgrade or install hardware on a network.
A) user inconvenience
B) time
C) costs
D) safety
Q6) Describe how to select an asset management tool.
To view all questions and flashcards with answers, click on the resource link above. Page 18