Networking Concepts Chapter Exam Questions - 748 Verified Questions

Page 1


Networking Concepts

Chapter Exam Questions

Course Introduction

Networking Concepts introduces the foundational principles and technologies that enable computers and devices to communicate over local and wide area networks. The course covers key topics such as network topologies, protocols, models (including the OSI and TCP/IP models), addressing schemes, hardware components, and network security basics. Students will explore how data is transmitted, routed, and managed across modern networks, and will gain practical experience in configuring network devices and troubleshooting common connectivity issues. This course provides a crucial understanding for anyone pursuing further studies or careers in information technology, cybersecurity, or systems administration.

Recommended Textbook Network+ Guide to Networks 5th Edition by Tamara Dean

Available Study Resources on Quizplus

15 Chapters

748 Verified Questions

748 Flashcards

Source URL: https://quizplus.com/study-set/430 Page 2

Chapter 1: An Introduction to Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7588

Sample Questions

Q1) The part of a network to which segments and significant shared devices connect. Answer: B

Q2) Which type of service supports e-mail?

A) management

B) communications

C) access

D) file

Answer: B

Q3) ____ are the distinct units of data that are exchanged between nodes on a network.

A) Segments

B) Data packets

C) Topologies

D) Protocols

Answer: B

Q4) The distinct units of data that are exchanged between nodes on a network.

Answer: H

Q5) In a(n)____________________ network,every computer can communicate directly with every other computer.

Answer: peer-to-peer

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Network Standards and the OSI Model

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7589

Sample Questions

Q1) Coordinates and maintains communications between two nodes on the network. Answer: F

Q2) The ____ is a fixed number associated with a device's NIC.

A) LLC address

B) frame address

C) logical address

D) physical address Answer: D

Q3) ____ oversees the IAB (Internet Architecture Board).

A) EIA

B) ISOC

C) ICANN

D) ISO

Answer: B

Q4) IEEE has divided the Transport layer into two sublayers.

A)True

B)False

Answer: False

Q5) Manages end-to-end delivery of data.

Answer: G

Page 4

To view all questions and flashcards with answers, click on the resource link above.

Chapter 3: Transmission Basics and Networking Media

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7590

Sample Questions

Q1) A common source of noise.

Answer: D

Q2) In a ____ cable,the usual wire positions are exactly reversed in one of the two RJ-45 terminations.

A) crossover

B) cross-through C) straight-through D) rollover

Answer: D

Q3) Modulation can be used to make a signal conform to a specific pathway.

A)True

B)False

Answer: True

Q4) Transmission that issues signals to multiple,defined recipients.

Answer: I

Q5) Transmission that involves one transmitter and multiple,undefined receivers.

Answer: E

Q6) Every pulse in a digital signal.

Answer: A

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Introduction to TCP/IP Protocols

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7591

Sample Questions

Q1) In the domain name www.google.com,____ is the top-level domain (TLD).

A) http

B) www

C) google

D) com

Q2) A UDP header contains ____ fields.

A) four

B) six

C) eight

D) ten

Q3) Ports ranging from 0 to 1023; assigned to processes that only the operating system or an administrator of the system can access.

Q4) In IPv4 addressing,explain what is special about an address containing 127 in the first octet and how this address is used in troubleshooting.

Q5) Describe the size differences in IPv4 and IPv6 IP addresses.

Q6) Any hosts on the Internet that need to look up domain name information.

Q7) If a device does not know its own IP address,it can still use ARP.

A)True

B)False

6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Topologies and Ethernet Standards

Available Study Resources on Quizplus for this Chatper

48 Verified Questions

48 Flashcards

Source URL: https://quizplus.com/quiz/7592

Sample Questions

Q1) The most common 1-Gigabit Ethernet.

Q2) IEEE standard for fiber-optic Ethernet networks transmitting data at 10 Gbps.

Q3) As part of CSMA/CD,a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.

Q4) Briefly explain how CSMA/CD works.

Q5) On an Ethernet network,a(n)____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.

A) collision domain

B) crash domain

C) interference domain

D) duplicate domain

Q6) A network backbone is the ____________________ that connects the hubs,switches,and routers on a network.

Q7) Without ____,a bus network would suffer from signal bounce.

A) hubs

B) repeaters

C) terminators

D) jamming

Page 7

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Network Hardware

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7593

Sample Questions

Q1) ____ hubs possess internal processing capabilities.

A) Passive

B) Intelligent

C) Stand-alone hubs

D) Workgroup

Q2) The primary difference between the two USB standards is ____.

A) connector pin organization

B) security limitations

C) speed

D) transceiver placement

Q3) A ____ is a multiport connectivity device that directs data between nodes on a network.

A) switch

B) bridge

C) router

D) gateway

Q4) Supports up to 16 lanes.

Q5) Describe advantages of VLAN trunking.

Q6) Explain hybrid routing protocols.Describe an example.

Q7) Uses the IEEE 1394 standard.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: WANs and Remote Connectivity

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7594

Sample Questions

Q1) ISDN PRI uses ____ B channels and one 64-Kbps D channel.

A) 10

B) 12

C) 23

D) 32

Q2) ____ is the standard for connecting home computers to an ISP via DSL or broadband cable.

A) SLIP

B) SLIPoE

C) PPP

D) PPPoE

Q3) ____ is the preferred communications protocol for remote access communications.

A) SLIP

B) IP

C) PPP

D) TCP/IP

Q4) Define a fractional T1 and explain why an organization might implement it.

Q5) Explain how ATM relies on virtual circuits.

Q6) Describe the fundamental properties WANs and LANs have in common.

Q7) Describe the most important advantage of SONET.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7595

Sample Questions

Q1) In ____ wireless systems,the result is a point-to-point link.

A) mobile

B) variable

C) fixed

D) open

Q2) The creation of a communications channel for a transmission from an Earth-based transmitter to an orbiting satellite.

Q3) Describe the FHSS and DSSS spread spectrum technologies.

Q4) Places where wireless Internet access is available to the public are called

Q5) Wireless networks are laid out using the same topologies as wired networks. A)True

B)False

Q6) Describe the use of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)to access a shared medium.

Q7) The locations of the transmitter and receiver do not move.

Q8) WiMAX is defined by the IEEE 802.11 standard.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Operating Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7596

Sample Questions

Q1) Briefly explain Active Directory two-way transitive trusts.

Q2) Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.

A) doc

B) library

C) man

D) command

Q3) ____ memory may be logically carved out of space on the hard drive for temporary use.

A) Virtual

B) Logical

C) Physical

D) Hierarchical

Q4) ____ is one of the most important functions an NOS provides.

A) Client support

B) Printer sharing

C) Authentication

D) Memory management

Q5) A licensing mode that limits access to an application to specific users or workstations.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: In-Depth TCP/IP Networking

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7597

Sample Questions

Q1) ____________________ separates a network into multiple logically defined segments,or subnets.

Q2) The ____ utility allows you to view a host's routing table.

A) nbstat

B) pathping

C) dig

D) route

Q3) POP3 (Post Office Protocol,version 3)relies on TCP and operates over port ____.

A) 25

B) 11

C) 110

D) 250

Q4) Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another,identifying all intermediate hops between the two nodes.

Q5) Describe what PAT is and how it works.

Q6) Explain why SNAT is considered static and describe why it useful.

Q7) Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system,a Windows-based system,and a Cisco-brand router.

Page 12

To view all questions and flashcards with answers, click on the resource link above.

Chapter 11: Voice and Video Over IP

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7598

Sample Questions

Q1) SIP and H.323 account for communication between media gateways.

A)True

B)False

Q2) ____ describes the use of any network to carry voice signals using the TCP/IP protocol.

A) Telephony

B) Internet telephony

C) IP telephony

D) Voice telephony

Q3) Besides being extremely mobile,describe another advantage to softphones.

Q4) All VoIP calls are carried over the Internet.

A)True

B)False

Q5) Explain why UDP is preferred over TCP for real-time applications such as telephone conversations and videoconferences.

Q6) A(n)____ is a computer that manages multiple media gateways.

A) MPLS

B) MGCP

C) MEGACO

D) MGC

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Chapter 12: Network Security

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7599

Sample Questions

Q1) RADIUS and TACACS belong to a category of protocols known as AAA (____).

A) access, authorization, and accounting

B) authentication, authorization, and accounting

C) authentication, authorization, and authority

D) authentication, authorization, and access

Q2) In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.

Q3) Describe the three-way handshake used in CHAP.

Q4) A ____ firewall is a router (or a computer installed with software that enables it to act as a router)that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

A) packet-filtering

B) gateway

C) proxy

D) selective

Q5) A(n)____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Troubleshooting Network Problems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7600

Sample Questions

Q1) A ____ is a document (preferably online)that lists every service and software package supported within an organization,plus the names of first- and second-level support contacts for those services or software packages.

A) call tracking list

B) help desk program list

C) supported services list

D) change management list

Q2) ____ are often considered third-level support.

A) Help desk coordinators

B) Help desk analysts

C) Administrators

D) Technical specialists

Q3) A sophisticated ____________________ will include a TDR (time domain reflectometer)that issues a signal on a cable and then measures the way the signal bounces back (or reflects)to the TDR.

Q4) Network engineers today might call any protocol analyzer tool a sniffer or ____________________.

Q5) Describe five causes of unreliable network connectivity.

Q6) Used to verify the location of a wire termination.

15

To view all questions and flashcards with answers, click on the resource link above.

Chapter 14: Ensuring Integrity and Availability

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7601

Sample Questions

Q1) ____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.

A) Integrity checking

B) Polymorphic

C) Signature

D) Heuristic

Q2) A complete power loss.

Q3) A(n)____ virus changes its characteristics every time it is transferred to a new system.

A) stealth

B) encrypted

C) time dependent

D) polymorphic

Q4) A momentary increase in voltage due to lightning strikes,solar flares,or electrical problems.

Q5) Generators provide surge protection.

A)True

B)False

Q6) Refers to the soundness of a network's programs,data,services,devices,and connections.

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Chapter 15: Network Management

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/7602

Sample Questions

Q1) Changes to ____________________ applications affect all users at once.

Q2) Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.

Q3) One of the most common free network management tools.

Q4) Stores results from devices monitoring conditions in UNIX or Linux-based networks.

Q5) ____ management refers to the detection and signaling of device,link,or component faults.

A) Performance

B) Fault

C) Network

D) Configuration

Q6) Because backbone upgrades are expensive and time consuming,the first step in approaching such a project is to ____ it.

A) research

B) justify

C) plan

D) document

Q7) A(n)____________________ is a report of the network's current state of operation.

Q8) Addresses the security and privacy of medical records.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Turn static files into dynamic content formats.

Create a flipbook