

![]()


Networking Concepts introduces the foundational principles and technologies that enable computers and devices to communicate over local and wide area networks. The course covers key topics such as network topologies, protocols, models (including the OSI and TCP/IP models), addressing schemes, hardware components, and network security basics. Students will explore how data is transmitted, routed, and managed across modern networks, and will gain practical experience in configuring network devices and troubleshooting common connectivity issues. This course provides a crucial understanding for anyone pursuing further studies or careers in information technology, cybersecurity, or systems administration.
Recommended Textbook Network+ Guide to Networks 5th Edition by Tamara Dean
Available Study Resources on Quizplus
15 Chapters
748 Verified Questions
748 Flashcards
Source URL: https://quizplus.com/study-set/430 Page 2
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7588
Sample Questions
Q1) The part of a network to which segments and significant shared devices connect. Answer: B
Q2) Which type of service supports e-mail?
A) management
B) communications
C) access
D) file
Answer: B
Q3) ____ are the distinct units of data that are exchanged between nodes on a network.
A) Segments
B) Data packets
C) Topologies
D) Protocols
Answer: B
Q4) The distinct units of data that are exchanged between nodes on a network.
Answer: H
Q5) In a(n)____________________ network,every computer can communicate directly with every other computer.
Answer: peer-to-peer

Page 3
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7589
Sample Questions
Q1) Coordinates and maintains communications between two nodes on the network. Answer: F
Q2) The ____ is a fixed number associated with a device's NIC.
A) LLC address
B) frame address
C) logical address
D) physical address Answer: D
Q3) ____ oversees the IAB (Internet Architecture Board).
A) EIA
B) ISOC
C) ICANN
D) ISO
Answer: B
Q4) IEEE has divided the Transport layer into two sublayers.
A)True
B)False
Answer: False
Q5) Manages end-to-end delivery of data.
Answer: G

Page 4
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7590
Sample Questions
Q1) A common source of noise.
Answer: D
Q2) In a ____ cable,the usual wire positions are exactly reversed in one of the two RJ-45 terminations.
A) crossover
B) cross-through C) straight-through D) rollover
Answer: D
Q3) Modulation can be used to make a signal conform to a specific pathway.
A)True
B)False
Answer: True
Q4) Transmission that issues signals to multiple,defined recipients.
Answer: I
Q5) Transmission that involves one transmitter and multiple,undefined receivers.
Answer: E
Q6) Every pulse in a digital signal.
Answer: A

Page 5
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7591
Sample Questions
Q1) In the domain name www.google.com,____ is the top-level domain (TLD).
A) http
B) www
C) google
D) com
Q2) A UDP header contains ____ fields.
A) four
B) six
C) eight
D) ten
Q3) Ports ranging from 0 to 1023; assigned to processes that only the operating system or an administrator of the system can access.
Q4) In IPv4 addressing,explain what is special about an address containing 127 in the first octet and how this address is used in troubleshooting.
Q5) Describe the size differences in IPv4 and IPv6 IP addresses.
Q6) Any hosts on the Internet that need to look up domain name information.
Q7) If a device does not know its own IP address,it can still use ARP.
A)True
B)False

6
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
48 Verified Questions
48 Flashcards
Source URL: https://quizplus.com/quiz/7592
Sample Questions
Q1) The most common 1-Gigabit Ethernet.
Q2) IEEE standard for fiber-optic Ethernet networks transmitting data at 10 Gbps.
Q3) As part of CSMA/CD,a process known as ____________________ allows the NIC issue a special 32-bit sequence that indicates to the rest of the network nodes that its previous transmission was faulty and that those data frames are invalid.
Q4) Briefly explain how CSMA/CD works.
Q5) On an Ethernet network,a(n)____ is the portion of a network in which collisions occur if two nodes transmit data at the same time.
A) collision domain
B) crash domain
C) interference domain
D) duplicate domain
Q6) A network backbone is the ____________________ that connects the hubs,switches,and routers on a network.
Q7) Without ____,a bus network would suffer from signal bounce.
A) hubs
B) repeaters
C) terminators
D) jamming

Page 7
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7593
Sample Questions
Q1) ____ hubs possess internal processing capabilities.
A) Passive
B) Intelligent
C) Stand-alone hubs
D) Workgroup
Q2) The primary difference between the two USB standards is ____.
A) connector pin organization
B) security limitations
C) speed
D) transceiver placement
Q3) A ____ is a multiport connectivity device that directs data between nodes on a network.
A) switch
B) bridge
C) router
D) gateway
Q4) Supports up to 16 lanes.
Q5) Describe advantages of VLAN trunking.
Q6) Explain hybrid routing protocols.Describe an example.
Q7) Uses the IEEE 1394 standard.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7594
Sample Questions
Q1) ISDN PRI uses ____ B channels and one 64-Kbps D channel.
A) 10
B) 12
C) 23
D) 32
Q2) ____ is the standard for connecting home computers to an ISP via DSL or broadband cable.
A) SLIP
B) SLIPoE
C) PPP
D) PPPoE
Q3) ____ is the preferred communications protocol for remote access communications.
A) SLIP
B) IP
C) PPP
D) TCP/IP
Q4) Define a fractional T1 and explain why an organization might implement it.
Q5) Explain how ATM relies on virtual circuits.
Q6) Describe the fundamental properties WANs and LANs have in common.
Q7) Describe the most important advantage of SONET.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7595
Sample Questions
Q1) In ____ wireless systems,the result is a point-to-point link.
A) mobile
B) variable
C) fixed
D) open
Q2) The creation of a communications channel for a transmission from an Earth-based transmitter to an orbiting satellite.
Q3) Describe the FHSS and DSSS spread spectrum technologies.
Q4) Places where wireless Internet access is available to the public are called
Q5) Wireless networks are laid out using the same topologies as wired networks. A)True
B)False
Q6) Describe the use of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)to access a shared medium.
Q7) The locations of the transmitter and receiver do not move.
Q8) WiMAX is defined by the IEEE 802.11 standard.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7596
Sample Questions
Q1) Briefly explain Active Directory two-way transitive trusts.
Q2) Every UNIX and Linux system contains full documentation of UNIX commands in the ____ pages.
A) doc
B) library
C) man
D) command
Q3) ____ memory may be logically carved out of space on the hard drive for temporary use.
A) Virtual
B) Logical
C) Physical
D) Hierarchical
Q4) ____ is one of the most important functions an NOS provides.
A) Client support
B) Printer sharing
C) Authentication
D) Memory management
Q5) A licensing mode that limits access to an application to specific users or workstations.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7597
Sample Questions
Q1) ____________________ separates a network into multiple logically defined segments,or subnets.
Q2) The ____ utility allows you to view a host's routing table.
A) nbstat
B) pathping
C) dig
D) route
Q3) POP3 (Post Office Protocol,version 3)relies on TCP and operates over port ____.
A) 25
B) 11
C) 110
D) 250
Q4) Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another,identifying all intermediate hops between the two nodes.
Q5) Describe what PAT is and how it works.
Q6) Explain why SNAT is considered static and describe why it useful.
Q7) Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system,a Windows-based system,and a Cisco-brand router.
Page 12
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7598
Sample Questions
Q1) SIP and H.323 account for communication between media gateways.
A)True
B)False
Q2) ____ describes the use of any network to carry voice signals using the TCP/IP protocol.
A) Telephony
B) Internet telephony
C) IP telephony
D) Voice telephony
Q3) Besides being extremely mobile,describe another advantage to softphones.
Q4) All VoIP calls are carried over the Internet.
A)True
B)False
Q5) Explain why UDP is preferred over TCP for real-time applications such as telephone conversations and videoconferences.
Q6) A(n)____ is a computer that manages multiple media gateways.
A) MPLS
B) MGCP
C) MEGACO
D) MGC

Page 13
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7599
Sample Questions
Q1) RADIUS and TACACS belong to a category of protocols known as AAA (____).
A) access, authorization, and accounting
B) authentication, authorization, and accounting
C) authentication, authorization, and authority
D) authentication, authorization, and access
Q2) In general,information is ____________________ if it could be used by other parties to impair an organization's functioning,decrease customers' confidence,cause a financial loss,damage an organization's status,or give a significant advantage to a competitor.
Q3) Describe the three-way handshake used in CHAP.
Q4) A ____ firewall is a router (or a computer installed with software that enables it to act as a router)that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
A) packet-filtering
B) gateway
C) proxy
D) selective
Q5) A(n)____________________ is a thorough examination of each aspect of the network to determine how it might be compromised.
To view all questions and flashcards with answers, click on the resource link above. Page 14

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7600
Sample Questions
Q1) A ____ is a document (preferably online)that lists every service and software package supported within an organization,plus the names of first- and second-level support contacts for those services or software packages.
A) call tracking list
B) help desk program list
C) supported services list
D) change management list
Q2) ____ are often considered third-level support.
A) Help desk coordinators
B) Help desk analysts
C) Administrators
D) Technical specialists
Q3) A sophisticated ____________________ will include a TDR (time domain reflectometer)that issues a signal on a cable and then measures the way the signal bounces back (or reflects)to the TDR.
Q4) Network engineers today might call any protocol analyzer tool a sniffer or ____________________.
Q5) Describe five causes of unreliable network connectivity.
Q6) Used to verify the location of a wire termination.
15
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7601
Sample Questions
Q1) ____ scanning detects malware by comparing a file's content with known malware signatures in a signature database.
A) Integrity checking
B) Polymorphic
C) Signature
D) Heuristic
Q2) A complete power loss.
Q3) A(n)____ virus changes its characteristics every time it is transferred to a new system.
A) stealth
B) encrypted
C) time dependent
D) polymorphic
Q4) A momentary increase in voltage due to lightning strikes,solar flares,or electrical problems.
Q5) Generators provide surge protection.
A)True
B)False
Q6) Refers to the soundness of a network's programs,data,services,devices,and connections.
Page 16
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/7602
Sample Questions
Q1) Changes to ____________________ applications affect all users at once.
Q2) Part of the TCP/IP suite of protocols and typically runs over UDP on port 161.
Q3) One of the most common free network management tools.
Q4) Stores results from devices monitoring conditions in UNIX or Linux-based networks.
Q5) ____ management refers to the detection and signaling of device,link,or component faults.
A) Performance
B) Fault
C) Network
D) Configuration
Q6) Because backbone upgrades are expensive and time consuming,the first step in approaching such a project is to ____ it.
A) research
B) justify
C) plan
D) document
Q7) A(n)____________________ is a report of the network's current state of operation.
Q8) Addresses the security and privacy of medical records.
To view all questions and flashcards with answers, click on the resource link above. Page 17