Preview

09 - Practice Test

 1. What is one advantage of using a star topology?

  All of the above

  There are few data collisions

  If one connection fails, the rest of the network is unaffected

  They tend to be very reliable

 2. "A set of rules that govern how devices communicate" is the definition of a …

  Protocol

  Modem

  Device

  Internet Standard

 3. What does the term POP stand for?

  post old protocol

  post office protocol

  proper ontological paper

  PEP OLE Protocol

 4. What is the difference between HTTP and HTTPS?

  HTTP transmits data over the internet in a unsecure format whereas HTTPS uses encryption so that any data that is intercepted is meaningless.

  HTTP transmits data across cables where as HTTPS is wireless

  Nothing

  HTTPS is much slower and does not have any security inbuilt

 5. Data is transmitted across a network in packets. Items that each data packet will contain include:

  Network address source and destination

  Packet number /Sequence number

  Error detection codes and payload

  All of the above

 6. What is one of the disadvantages of the star network?

  None of the above

  If the server fails, all the data will be transmitted to the other nodes much faster

  If one of the nodes fails, the entire network will be affected

  If the server fails, the whole network will be down

 7. Which of the following topologies is likely to be the most expensive due to the cabling?

  All of them cost exactly the same.

  star

  ring

  bus

 8. In a star network it is very difficult to add or remove a node as doing so will adversely affect the network

  FALSE

  TRUE

 9. The robustness of a mesh network allows for some interesting uses and applications including:

  All of the above

  Music streaming devices around the home

  Mobile hot spots

  Battlefield mesh networks to allow military solidiers to communicate with each other

 10. The advantage of using circuit switching is that it provides for …………………. associated with packets, making maximal use of available bandwidth for that communication

  continuous transfer without the overhead

  slow and steady transfer without the speed

  limited transfer with overheads

  super fast transfer with shared links and cables

 11. In circuit switching, a route and its associated bandwidth is reserved from source to destination, making circuit switching relatively ……

  inefficient as it far slower and provides low quality service

  efficient since capacity is never reserved even if the connection is not in use

  None of the above

   inefficient since capacity is reserved whether or not the connection is in continuous use

 12. Fill in the blanks for the following excerpt on packet switching
"In contrast, packet switching is the process of segmenting data to be transmitted into 
several smaller packets. Each packet is labeled with its .............................
........................ related packets, precluding the need for a dedicated path to
help the packet find its way to its destination. 
Each packet is dispatched independently and each may be routed via a different path"

  circuit and cable

  IP address and MAC

  destination and a sequence number for ordering

  MAC and sequence number for routing

 13. For sending data the IP rules or protocols include adding the destination address to each data packet and….

  adding its own address to indicate the source / where it came from

  Dividing the message into packets

  All of the above

  Adding extra error correction information so that errors can be spotted and fixed

 14. For receiving data packets IP protocols (rules) include accepting data packets that have its own address attached and…

  Adding extra error correction information so that errors can be spotted and fixed

  None of the above

  ignoring all data packets that do not contain its own address

  Dividing the message into packets

 15. Both TCP and UDP are both protocols used for sending bits of data — known as packets — over the Internet. TCP isn't the only protocol!

  TRUE

  FALSE

 16. UDP stands for User Datagram Protocol — a datagram is the same thing as a packet of information. It works…

  like the IP and FTP protocols combined together

  exactly like TCP - there is no difference

  completely differently to TCP and is more like SMTP and FTP

  similarly to TCP, but it throws all the error-checking stuff out.

 17. When using UDP, packets are just sent to the recipient. The sender will not wait to make sure the recipient received the packet — it will just continue sending the next packets.

  FALSE

  TRUE

 18. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)

  TRUE

  FALSE

 19. Wireless access technologies are commonly divided into categories, based on speed and distance

  TRUE

  FALSE

 20. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels

  bands

  apples

  channels

  protocols

 21. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………

  wireless phone attachment

  wireless hotspot PIN

  wireless network interface controller.

  wireless PIN

 22. An example is: The TCP in layer 3 could only communicate with….

  layers 2 and 4

  layers 1,2,3,4

  layer 3

  layer 4

 23. Which of the following are the names of layers in the four layer model?
Names of layers in the four layer model?
===============================
1.Application layer
2.Cable Layer
3.Transport Layer
4.ISP Layer
5.Internet Layer
6.TCP/IP Layer
7.Network / Data Link Access Layer

  1,3,5,7

  1,2,3,4

  1,3,6,7

  1,2,3,6

 24. The protocols in this layer provide access to email files, and websites across an IP network

  Application Layer

  Network / Data Access Link Layer

  Internet (also called the 'Network') Layer

  Transport Layer

 25. The TCP part of the TCP/IP protocol resides in this layer.
Note: It is responsible for dividing messages into packets, 
adding sequence numbers and error correction information. 
It also checks and deals with errors of received data packets.

  Network / Data Access Link Layer

  Transport Layer

  Application Layer

  Internet (also called the 'Network') Layer

 26. The IP part of the TCP/IP protocol resides in this layer. It is responsible for managing the address of source and destination locations

  Transport Layer

  Network / Data Access Link Layer

  Internet (also called the 'Network') Layer

  Application Layer

 27. Protocols on this layer (1) are Ethernet and WI-FI.
Note: Protocols on this layer are responsible for actually
transmitting or receiving data via cables or wireless. This layer is responsible for handling the device's physical connection to the network.

  Transport Layer

  Application Layer

  Network / Data Access Link Layer

  Internet (also called the 'Network') Layer

 28. Protocols on this layer are FTP, HTTP, POP, IMAP and SMTP

  Application Layer

  Network / Data Access Link Layer

  Internet (also called the 'Network') Layer

  Transport Layer

 29. The benefits of using layers include:

  It is useful for manufacturers so that when they are developing new hardware, they can ensure it is compatible with protocols

  It can be difficult to conceptualise a complex system such as network communication

  All of the above

  It is useful to map how layers relate and interact with each other. New protocols can just be slotted in

 30. What does SMTP stand for?

  Server Mail Transmission Protocol

  Server Map Transform Protocol

  Simple Mail Transfer Protocol

  None of the above

 31. Which of the following is not a real IP address?

  192.168.2.3

  192.168.2.138

  192.168.2.156

  192.168.2.338

 32. Rules of Network Protocol include guidelines that regulate the following: network access method, allowed physical topologies and _____________

  None of the above

  types of cabling, and speed of data transfer

  acceptable users and setting passwords for all internet users

  types of modems and acceptable users (e.g. hackers are not allowed)

 33. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where …

   each computer listens to the cable before sending anything through the network

  each computer is made into a hotspot so it receives the internet from itself

  each computer does not have to wait or listen to the cable and sends data directly to all nodes

  each computer is connected to the other via satellite waves

 34. This protocol is used to retrieve emails

  IMAP

  TCP

  SMTP

  POP

 35. 14. What difference us a user likely to experience when upgrading from a b series router to an n series router?

   The user is likely to experience faster data transmission (accept a faster network speed).

  The user is likely to experience great heat

  The user is likely to experience difficulty in setup and maintanence

  The user is likely to experience a slower speed