Preview

10 - Final Quiz

 1. _____________ use IP addresses to direct data packets to the correct destination

  Routers

  Packet Protocols

  Firewalls

  TCP/IP Protocols

 2. IP addresses are used to ..

  label firewalls on the internet

  identify devices on the internet

  identify cables and connections on the internet

  identify the names and locations of users on the internet

 3. Packet switching is fool proof. Packets never arrive at the receicing device in the wrong order.

  FALSE

  TRUE

 4. A layer of network protocols is a group of protocols with….

  similar names

  similar functions

  similar Wi-Fi frequencies

  similar numbers

 5. Layers allow developers to…..

  produce compatible, universal hardware and software

  developers to focus on one area without worrying about others

  break network communication into manageable and understandable pieces

  All of the above

 6. "A set of rules that govern how devices communicate" is the definition of a …

  Modem

  Device

  Protocol

  Internet Standard

 7. What does the term POP stand for?

  post old protocol

  proper ontological paper

  PEP OLE Protocol

  post office protocol

 8. What is the difference between HTTP and HTTPS?

  HTTP transmits data over the internet in a unsecure format whereas HTTPS uses encryption so that any data that is intercepted is meaningless.

  HTTPS is much slower and does not have any security inbuilt

  HTTP transmits data across cables where as HTTPS is wireless

  Nothing

 9. Data is transmitted across a network in packets. Items that each data packet will contain include:

  Network address source and destination

  All of the above

  Packet number /Sequence number

  Error detection codes and payload

 10. What is one of the disadvantages of the star network?

  If the server fails, the whole network will be down

  None of the above

  If one of the nodes fails, the entire network will be affected

  If the server fails, all the data will be transmitted to the other nodes much faster

 11. Which of the following topologies is likely to be the most expensive due to the cabling?

  ring

  All of them cost exactly the same.

  bus

  star

 12. In a star network it is very difficult to add or remove a node as doing so will adversely affect the network

  FALSE

  TRUE

 13. The robustness of a mesh network allows for some interesting uses and applications including:

  Music streaming devices around the home

  Mobile hot spots

  All of the above

  Battlefield mesh networks to allow military solidiers to communicate with each other

 14. The advantage of using circuit switching is that it provides for …………………. associated with packets, making maximal use of available bandwidth for that communication

  limited transfer with overheads

  super fast transfer with shared links and cables

  slow and steady transfer without the speed

  continuous transfer without the overhead

 15. In circuit switching, a route and its associated bandwidth is reserved from source to destination, making circuit switching relatively ……

   inefficient since capacity is reserved whether or not the connection is in continuous use

  None of the above

  inefficient as it far slower and provides low quality service

  efficient since capacity is never reserved even if the connection is not in use

 16. Fill in the blanks for the following excerpt on packet switching
"In contrast, packet switching is the process of segmenting data to be transmitted into 
several smaller packets. Each packet is labeled with its .............................
........................ related packets, precluding the need for a dedicated path to
help the packet find its way to its destination. 
Each packet is dispatched independently and each may be routed via a different path"

  circuit and cable

  MAC and sequence number for routing

  destination and a sequence number for ordering

  IP address and MAC

 17. For sending data the IP rules or protocols include adding the destination address to each data packet and….

  All of the above

  adding its own address to indicate the source / where it came from

  Dividing the message into packets

  Adding extra error correction information so that errors can be spotted and fixed

 18. For receiving data packets IP protocols (rules) include accepting data packets that have its own address attached and…

  Adding extra error correction information so that errors can be spotted and fixed

  Dividing the message into packets

  None of the above

  ignoring all data packets that do not contain its own address

 19. Both TCP and UDP are both protocols used for sending bits of data — known as packets — over the Internet. TCP isn't the only protocol!

  FALSE

  TRUE

 20. UDP stands for User Datagram Protocol — a datagram is the same thing as a packet of information. It works…

  like the IP and FTP protocols combined together

  completely differently to TCP and is more like SMTP and FTP

  exactly like TCP - there is no difference

  similarly to TCP, but it throws all the error-checking stuff out.

 21. When using UDP, packets are just sent to the recipient. The sender will not wait to make sure the recipient received the packet — it will just continue sending the next packets.

  TRUE

  FALSE

 22. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)

  FALSE

  TRUE

 23. Wireless access technologies are commonly divided into categories, based on speed and distance

  TRUE

  FALSE

 24. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels

  bands

  apples

  channels

  protocols

 25. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………

  wireless phone attachment

  wireless hotspot PIN

  wireless PIN

  wireless network interface controller.

 26. An example is: The TCP in layer 3 could only communicate with….

  layers 2 and 4

  layer 3

  layer 4

  layers 1,2,3,4

 27. Which of the following are the names of layers in the four layer model?
Names of layers in the four layer model?
===============================
1.Application layer
2.Cable Layer
3.Transport Layer
4.ISP Layer
5.Internet Layer
6.TCP/IP Layer
7.Network / Data Link Access Layer

  1,3,5,7

  1,2,3,6

  1,2,3,4

  1,3,6,7

 28. The protocols in this layer provide access to email files, and websites across an IP network

  Application Layer

  Transport Layer

  Internet (also called the 'Network') Layer

  Network / Data Access Link Layer

 29. The TCP part of the TCP/IP protocol resides in this layer.
Note: It is responsible for dividing messages into packets, 
adding sequence numbers and error correction information. 
It also checks and deals with errors of received data packets.

  Network / Data Access Link Layer

  Application Layer

  Transport Layer

  Internet (also called the 'Network') Layer

 30. The IP part of the TCP/IP protocol resides in this layer. It is responsible for managing the address of source and destination locations

  Network / Data Access Link Layer

  Transport Layer

  Application Layer

  Internet (also called the 'Network') Layer

 31. Protocols on this layer (1) are Ethernet and WI-FI.
Note: Protocols on this layer are responsible for actually
transmitting or receiving data via cables or wireless. This layer is responsible for handling the device's physical connection to the network.

  Internet (also called the 'Network') Layer

  Transport Layer

  Network / Data Access Link Layer

  Application Layer

 32. Protocols on this layer are FTP, HTTP, POP, IMAP and SMTP

  Internet (also called the 'Network') Layer

  Network / Data Access Link Layer

  Application Layer

  Transport Layer

 33. The benefits of using layers include:

  It can be difficult to conceptualise a complex system such as network communication

  It is useful for manufacturers so that when they are developing new hardware, they can ensure it is compatible with protocols

  It is useful to map how layers relate and interact with each other. New protocols can just be slotted in

  All of the above

 34. What does SMTP stand for?

  Simple Mail Transfer Protocol

  Server Mail Transmission Protocol

  None of the above

  Server Map Transform Protocol

 35. Which of the following is not a real IP address?

  192.168.2.138

  192.168.2.338

  192.168.2.156

  192.168.2.3

 36. Rules of Network Protocol include guidelines that regulate the following: network access method, allowed physical topologies and _____________

  types of modems and acceptable users (e.g. hackers are not allowed)

  acceptable users and setting passwords for all internet users

  None of the above

  types of cabling, and speed of data transfer

 37. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where …

  each computer is made into a hotspot so it receives the internet from itself

   each computer listens to the cable before sending anything through the network

  each computer is connected to the other via satellite waves

  each computer does not have to wait or listen to the cable and sends data directly to all nodes

 38. This protocol is used to retrieve emails

  POP

  SMTP

  IMAP

  TCP

 39. 14. What difference us a user likely to experience when upgrading from a b series router to an n series router?

  The user is likely to experience difficulty in setup and maintanence

  The user is likely to experience a slower speed

  The user is likely to experience great heat

   The user is likely to experience faster data transmission (accept a faster network speed).

 40. The purpose of the HTTP protocol is to make the transfer of webpages from the servers to the user's device

  FALSE

  TRUE