Preview

10 - Practice Test

 1. All the networks in the world are wireless as radio signals are sent via satellite

  TRUE

  FALSE

 2. Wired networks will often use coaxial cable. This is ?

  a type of aluminum wire that is unprotected

  glass fibre wire that lets data travel like light

  a type of stainless steel wire that is entirely secure

  a type of copper cable that consists of a central wire protected by a metal shield

 3. CAT5e cable contains twisted pairs of copper wires

  TRUE

  FALSE

 4. A type of cable that uses light to carry signals is called:

  fibre optic

  CAT5

  light enabled copper

  coaxial

 5. The following device connects devices in a LAN by transmitting frames of data between them. Data is received by this device and set to the device with the correct MAC address

  ISP

  SWITCH

  CPU ROUTER

  ETHERNET ROUTER

 6. A _____ transmits data between networks in units called packets. It can be used to connect a LAN to the internet

  SWITCH

   WAP

  ROUTER

  ISP

 7. A _______ connects devices in a local area network wirelessly / using radio waves / using Wi-Fi

   WAP

  SWITCH

  ROUTER

  ISP

 8. Client - Server: A group of devices connected to share data with each other in which all devices are equal /connected without a server.

  FALSE

  TRUE

 9. Peer to Peer: A group of devices connected to a central computer (server) which manages the network and stores files centrally.

  FALSE

  TRUE

 10. Disadvantage of peer to peer networks include:

  The server failing will affect the rest of the network

  None of the above

  expensive to set up

  Dependence on the server

 11. An advantage of a client-server network is that user files are stored centrally so resources are used more efficiently

  FALSE

  TRUE

 12. Generally speaking, a client-server network is more expensive to set up

  FALSE

  TRUE

 13. The following is an advantage of cloud computing: It can reduce costs for a company as they do not need to buy additional hardware to store data

  TRUE

  FALSE

 14. Local area networks are set up and created using software and virtual networks are created using physical cables and hardware.

  FALSE

  TRUE

 15. The advantages of a virtual network include:

  It can be flexible - easy to add or remove comptuers from the VLAN using software without cables

  All of the above are valid advantages

  Much easier to install software needed by specific groups of people

  There is less overall traffic because network traffic can be limited to each VN.

 16. One obvious disadvantage of a virtual network is hugely decreased security. If one VLAN is compromised with a VIRUS, the whole network is affected.

  FALSE

  TRUE

 17. Virtual networks on a bigger network are said to be _____________ so that when malware affects one VN the others aren't affected.

  partitioned

  debugged

  bitrated

  falsified

 18. It is possible to use virtual networks to connect devices to a LAN through a WAN

  TRUE

  FALSE

 19. A company like facebook may have HR offices in France, the US and India. They would require the HR offices across the world to share files and resources. This is known as a ?

  Private Networked Client

  Cloud storage network

  Server based Network

  Virtual Private Network

 20. VPN tunnelling is a type of ?

  encryption

  server

  messaging

  malware

 21. A VPN (Virtual Private Network) could allow external devices to connect to a private network over a public WAN (e.g the internet) without ?.

  any external devices or WAN being involved

  any cables or connectiosn whatsoever

  All of the above are valid answers

  worrying about security

 22. Once logged in to a virtual private network (VPN), the user ?

  would not be able to see any files and folders except their own

  sees the same network as if they had just logged in to an internal work station

  would have access to the entire world's data (files and folders)

  None of the above

 23. It is much __________to use a VPN to connect through the internet than to pay to maintain a WAN that the company sets up on their own.

  All of the above

  more secure

  cheaper

  more expensive

 24. There are two well known frequency bands available to use when setting up a WIFI network. 2.4 GHz and 5Ghz. 2.4GHz is?.

  the least popular frequency

  the most universally used frequency

  not in use anymore

  a type of frequency which is only used in African countries

 25. The waves in this radio frequency are about 5 inches long and can pass through walls, windows and others objects well and signals have a range up to about 100 metres

  5 GHz

  None of the above

  1 GHz

  2.4 GHz

 26. 5 GHz is less common. It has a wavelength of about 2.5 inches long and this suggests that it is?

  no longer in use

  more capable of passing through walls than 2.4 GHz

  invalid and defunct

  less capable of passing through objects and walls

 27. With 5 GHz ________ speeds can sometimes be achieved because it is less crowded/popular frequency.

  stationary (non moving)

  higher

  lower

  minimal

 28. When setting up a wireless network, 2.4 GHz is compatible with standards for building a wireless network known as 802.11b and 802.11g.

  FALSE

  TRUE

 29. Radio waves can be bounced around by many things, including walls, mirrors, water and metal surfaces. This can cause ?.

  higher frequencies

  interference and signal direction change

  None of the above

  a spontaneous internet connection to appear

 30. Each frequency _____ is divided up in to ____________.

  band / channels

  band / sound waves

  channel / bands

  signal / bands

 31. The 2.4 GHz band has ____ channels.

  15

  12

  14

  13

 32. All the channels available in a band are always available at any given time and in any given location.

  FALSE

  TRUE

 33. The 5GHz frequency offers additional bandwidth over the 2.4GHz frequency

  FALSE

  TRUE

 34. The 5GHz frequency is capable of carrying more non-overlapping channels which will result in less interference.

  FALSE

  TRUE

 35. Encryption is a method of _____________data with a key code - the data must be decrypted to be made sense of.

  mixing

  allowing

  scrambling

  deleting

 36. With encryption is the data is intercepted it will be vulnerable as if it is found, it will make sense, even without the key

  FALSE

  TRUE

 37. When you are using a secure site for example your bank, or purchasing on Amazon, encryption applied to keep your details safe:

  TRUE

  FALSE

 38. The encryption method used on secure sites is called:

  HTTP

   'SSL' (Secure Socket Layer

  FTP

  DNS

 39. Piracy and security issues are some of the concerns relating to cloud computing

  TRUE

  FALSE

 40. Twisted pair cable tranmission media is capable of having a much higher bandwidth than fibre optic.

  TRUE

  FALSE