Preview

09 - Practice Test

 1. What is one advantage of using a star topology?

  If one connection fails, the rest of the network is unaffected

  All of the above

  There are few data collisions

  They tend to be very reliable

 2. "A set of rules that govern how devices communicate" is the definition of a …

  Protocol

  Device

  Modem

  Internet Standard

 3. What does the term POP stand for?

  proper ontological paper

  PEP OLE Protocol

  post office protocol

  post old protocol

 4. What is the difference between HTTP and HTTPS?

  HTTPS is much slower and does not have any security inbuilt

  Nothing

  HTTP transmits data over the internet in a unsecure format whereas HTTPS uses encryption so that any data that is intercepted is meaningless.

  HTTP transmits data across cables where as HTTPS is wireless

 5. Data is transmitted across a network in packets. Items that each data packet will contain include:

  Packet number /Sequence number

  Error detection codes and payload

  All of the above

  Network address source and destination

 6. What is one of the disadvantages of the star network?

  If the server fails, the whole network will be down

  None of the above

  If the server fails, all the data will be transmitted to the other nodes much faster

  If one of the nodes fails, the entire network will be affected

 7. Which of the following topologies is likely to be the most expensive due to the cabling?

  star

  bus

  All of them cost exactly the same.

  ring

 8. In a star network it is very difficult to add or remove a node as doing so will adversely affect the network

  FALSE

  TRUE

 9. The robustness of a mesh network allows for some interesting uses and applications including:

  All of the above

  Music streaming devices around the home

  Battlefield mesh networks to allow military solidiers to communicate with each other

  Mobile hot spots

 10. The advantage of using circuit switching is that it provides for …………………. associated with packets, making maximal use of available bandwidth for that communication

  slow and steady transfer without the speed

  limited transfer with overheads

  continuous transfer without the overhead

  super fast transfer with shared links and cables

 11. In circuit switching, a route and its associated bandwidth is reserved from source to destination, making circuit switching relatively ……

  None of the above

   inefficient since capacity is reserved whether or not the connection is in continuous use

  efficient since capacity is never reserved even if the connection is not in use

  inefficient as it far slower and provides low quality service

 12. Fill in the blanks for the following excerpt on packet switching
"In contrast, packet switching is the process of segmenting data to be transmitted into 
several smaller packets. Each packet is labeled with its .............................
........................ related packets, precluding the need for a dedicated path to
help the packet find its way to its destination. 
Each packet is dispatched independently and each may be routed via a different path"

  circuit and cable

  destination and a sequence number for ordering

  IP address and MAC

  MAC and sequence number for routing

 13. For sending data the IP rules or protocols include adding the destination address to each data packet and….

  adding its own address to indicate the source / where it came from

  All of the above

  Adding extra error correction information so that errors can be spotted and fixed

  Dividing the message into packets

 14. For receiving data packets IP protocols (rules) include accepting data packets that have its own address attached and…

  Adding extra error correction information so that errors can be spotted and fixed

  None of the above

  Dividing the message into packets

  ignoring all data packets that do not contain its own address

 15. Both TCP and UDP are both protocols used for sending bits of data — known as packets — over the Internet. TCP isn't the only protocol!

  FALSE

  TRUE

 16. UDP stands for User Datagram Protocol — a datagram is the same thing as a packet of information. It works…

  completely differently to TCP and is more like SMTP and FTP

  like the IP and FTP protocols combined together

  similarly to TCP, but it throws all the error-checking stuff out.

  exactly like TCP - there is no difference

 17. When using UDP, packets are just sent to the recipient. The sender will not wait to make sure the recipient received the packet — it will just continue sending the next packets.

  FALSE

  TRUE

 18. Wi-Fi Protected Access encryption (WPA2) is considered secure, even if a strong passphrase is not used (e.g. a single letter will suffice)

  FALSE

  TRUE

 19. Wireless access technologies are commonly divided into categories, based on speed and distance

  FALSE

  TRUE

 20. Wi-Fi most commonly uses the 2.4 gigahertz (12 cm) UHF and 5.8 gigahertz (5 cm) SHF ISM radio ______, these _____ are subdivided into multiple channels

  protocols

  bands

  channels

  apples

 21. To connect to a Wi-Fi LAN, a computer has to be equipped with a …………………

  wireless phone attachment

  wireless network interface controller.

  wireless PIN

  wireless hotspot PIN

 22. An example is: The TCP in layer 3 could only communicate with….

  layer 3

  layers 1,2,3,4

  layers 2 and 4

  layer 4

 23. Which of the following are the names of layers in the four layer model?
Names of layers in the four layer model?
===============================
1.Application layer
2.Cable Layer
3.Transport Layer
4.ISP Layer
5.Internet Layer
6.TCP/IP Layer
7.Network / Data Link Access Layer

  1,2,3,4

  1,3,5,7

  1,3,6,7

  1,2,3,6

 24. The protocols in this layer provide access to email files, and websites across an IP network

  Network / Data Access Link Layer

  Application Layer

  Transport Layer

  Internet (also called the 'Network') Layer

 25. The TCP part of the TCP/IP protocol resides in this layer.
Note: It is responsible for dividing messages into packets, 
adding sequence numbers and error correction information. 
It also checks and deals with errors of received data packets.

  Internet (also called the 'Network') Layer

  Network / Data Access Link Layer

  Transport Layer

  Application Layer

 26. The IP part of the TCP/IP protocol resides in this layer. It is responsible for managing the address of source and destination locations

  Internet (also called the 'Network') Layer

  Network / Data Access Link Layer

  Transport Layer

  Application Layer

 27. Protocols on this layer (1) are Ethernet and WI-FI.
Note: Protocols on this layer are responsible for actually
transmitting or receiving data via cables or wireless. This layer is responsible for handling the device's physical connection to the network.

  Application Layer

  Network / Data Access Link Layer

  Internet (also called the 'Network') Layer

  Transport Layer

 28. Protocols on this layer are FTP, HTTP, POP, IMAP and SMTP

  Network / Data Access Link Layer

  Transport Layer

  Application Layer

  Internet (also called the 'Network') Layer

 29. The benefits of using layers include:

  It is useful to map how layers relate and interact with each other. New protocols can just be slotted in

  It can be difficult to conceptualise a complex system such as network communication

  All of the above

  It is useful for manufacturers so that when they are developing new hardware, they can ensure it is compatible with protocols

 30. What does SMTP stand for?

  Server Map Transform Protocol

  None of the above

  Simple Mail Transfer Protocol

  Server Mail Transmission Protocol

 31. Which of the following is not a real IP address?

  192.168.2.138

  192.168.2.3

  192.168.2.338

  192.168.2.156

 32. Rules of Network Protocol include guidelines that regulate the following: network access method, allowed physical topologies and _____________

  acceptable users and setting passwords for all internet users

  types of modems and acceptable users (e.g. hackers are not allowed)

  types of cabling, and speed of data transfer

  None of the above

 33. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). This is a system where …

   each computer listens to the cable before sending anything through the network

  each computer is made into a hotspot so it receives the internet from itself

  each computer does not have to wait or listen to the cable and sends data directly to all nodes

  each computer is connected to the other via satellite waves

 34. This protocol is used to retrieve emails

  POP

  TCP

  SMTP

  IMAP

 35. 14. What difference us a user likely to experience when upgrading from a b series router to an n series router?

   The user is likely to experience faster data transmission (accept a faster network speed).

  The user is likely to experience a slower speed

  The user is likely to experience great heat

  The user is likely to experience difficulty in setup and maintanence