10 - Final Quiz

 1. _____________ use IP addresses to direct data packets to the correct destination


  TCP/IP Protocols


  Packet Protocols

 2. IP addresses are used to ..

  label firewalls on the internet

  identify the names and locations of users on the internet

  identify devices on the internet

  identify cables and connections on the internet

 3. Packet switching is fool proof. Packets never arrive at the receicing device in the wrong order.



 4. A layer of network protocols is a group of protocols with….

  similar functions

  similar numbers

  similar Wi-Fi frequencies

  similar names

 5. Layers allow developers to…..

  break network communication into manageable and understandable pieces

  All of the above

  developers to focus on one area without worrying about others

  produce compatible, universal hardware and software

 6. "A set of rules that govern how devices communicate" is the definition of a …

  Internet Standard




 7. What does the term POP stand for?

  post old protocol

  proper ontological paper

  PEP OLE Protocol

  post office protocol

 8. What is the difference between HTTP and HTTPS?

  HTTP transmits data over the internet in a unsecure format whereas HTTPS uses encryption so that any data that is intercepted is meaningless.

  HTTP transmits data across cables where as HTTPS is wireless


  HTTPS is much slower and does not have any security inbuilt

 9. Data is transmitted across a network in packets. Items that each data packet will contain include:

  Error detection codes and payload

  Packet number /Sequence number

  All of the above

  Network address source and destination

 10. What is one of the disadvantages of the star network?

  None of the above

  If the server fails, the whole network will be down

  If one of the nodes fails, the entire network will be affected

  If the server fails, all the data will be transmitted to the other nodes much faster

 11. Which of the following topologies is likely to be the most expensive due to the cabling?




  All of them cost exactly the same.

 12. In a star network it is very difficult to add or remove a node as doing so will adversely affect the network



 13. The robustness of a mesh network allows for some interesting uses and applications including:

  Battlefield mesh networks to allow military solidiers to communicate with each other

  All of the above

  Music streaming devices around the home

  Mobile hot spots

 14. The advantage of using circuit switching is that it provides for …………………. associated with packets, making maximal use of available bandwidth for that communication

  super fast transfer with shared links and cables

  slow and steady transfer without the speed

  continuous transfer without the overhead

  limited transfer with overheads

 15. In circuit switching, a route and its associated bandwidth is reserved from source to destination, making circuit switching relatively ……

  inefficient as it far slower and provides low quality service

  efficient since capacity is never reserved even if the connection is not in use

   inefficient since capacity is reserved whether or not the connection is in continuous use

  None of the above

 16. Fill in the blanks for the following excerpt on packet switching
"In contrast, packet switching is the process of segmenting data to be transmitted into 
several smaller packets. Each packet is labeled with its .............................
........................ related packets, precluding the need for a dedicated path to
help the packet find its way to its destination. 
Each packet is dispatched independently and each may be routed via a different path"

  MAC and sequence number for routing

  circuit and cable

  IP address and MAC

  destination and a sequence number for ordering

 17. For sending data the IP rules or protocols include adding the destination address to each data packet and….

  Dividing the message into packets

  adding its own address to indicate the source / where it came from

  All of the above

  Adding extra error correction information so that errors can be spotted and fixed

 18. For receiving data packets IP protocols (rules) include accepting data packets that have its own address attached and…

  Adding extra error correction information so that errors can be spotted and fixed

  None of the above

  ignoring all data packets that do not contain its own address

  Dividing the message into packets

 19. Both TCP and UDP are both protocols used for sending bits of data — known as packets — over the Internet. TCP isn't the only protocol!



 20. UDP stands for User Datagram Protocol — a datagram is the same thing as a packet of information. It works…

  like the IP and FTP protocols combined together

  similarly to TCP, but it throws all the error-checking stuff out.

  exactly like TCP - there is no difference

  completely differently to TCP and is more like SMTP and FTP

 21. When using UDP, packets are just sent to the recipient. The sender will not wait to make sure the recipient received the packet — it will just continue sending the next packets.



 22. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)



 23. Wireless access technologies are commonly divided into categories, based on speed and distance



 24. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels





 25. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………

  wireless phone attachment

  wireless hotspot PIN

  wireless PIN

  wireless network interface controller.

 26. An example is: The TCP in layer 3 could only communicate with….

  layers 2 and 4

  layers 1,2,3,4

  layer 4

  layer 3

 27. Which of the following are the names of layers in the four layer model?
Names of layers in the four layer model?
1.Application layer
2.Cable Layer
3.Transport Layer
4.ISP Layer
5.Internet Layer
6.TCP/IP Layer
7.Network / Data Link Access Layer





 28. The protocols in this layer provide access to email files, and websites across an IP network

  Network / Data Access Link Layer

  Transport Layer

  Internet (also called the 'Network') Layer

  Application Layer

 29. The TCP part of the TCP/IP protocol resides in this layer.
Note: It is responsible for dividing messages into packets, 
adding sequence numbers and error correction information. 
It also checks and deals with errors of received data packets.

  Network / Data Access Link Layer

  Application Layer

  Transport Layer

  Internet (also called the 'Network') Layer

 30. The IP part of the TCP/IP protocol resides in this layer. It is responsible for managing the address of source and destination locations

  Transport Layer

  Application Layer

  Network / Data Access Link Layer

  Internet (also called the 'Network') Layer

 31. Protocols on this layer (1) are Ethernet and WI-FI.
Note: Protocols on this layer are responsible for actually
transmitting or receiving data via cables or wireless. This layer is responsible for handling the device's physical connection to the network.

  Application Layer

  Internet (also called the 'Network') Layer

  Network / Data Access Link Layer

  Transport Layer

 32. Protocols on this layer are FTP, HTTP, POP, IMAP and SMTP

  Internet (also called the 'Network') Layer

  Transport Layer

  Network / Data Access Link Layer

  Application Layer

 33. The benefits of using layers include:

  All of the above

  It is useful for manufacturers so that when they are developing new hardware, they can ensure it is compatible with protocols

  It can be difficult to conceptualise a complex system such as network communication

  It is useful to map how layers relate and interact with each other. New protocols can just be slotted in

 34. What does SMTP stand for?

  Server Map Transform Protocol

  Server Mail Transmission Protocol

  Simple Mail Transfer Protocol

  None of the above

 35. Which of the following is not a real IP address?

 36. Rules of Network Protocol include guidelines that regulate the following: network access method, allowed physical topologies and _____________

  acceptable users and setting passwords for all internet users

  None of the above

  types of modems and acceptable users (e.g. hackers are not allowed)

  types of cabling, and speed of data transfer

 37. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where …

  each computer is made into a hotspot so it receives the internet from itself

  each computer does not have to wait or listen to the cable and sends data directly to all nodes

  each computer is connected to the other via satellite waves

   each computer listens to the cable before sending anything through the network

 38. This protocol is used to retrieve emails





 39. 14. What difference us a user likely to experience when upgrading from a b series router to an n series router?

  The user is likely to experience difficulty in setup and maintanence

  The user is likely to experience a slower speed

   The user is likely to experience faster data transmission (accept a faster network speed).

  The user is likely to experience great heat

 40. The purpose of the HTTP protocol is to make the transfer of webpages from the servers to the user's device