Preview

11 - Final Test

 1. A standalone computer is a computer that is?

  None of the above

  connected to a central server

  connected to the internet directl

  not connected to a network

 2. Which of these statements is true?

  A client-server network has a central computer that provides services to the rest of the network

  A client-server network cannot be used to share files

  Each computer on a client-server network is maintain separately

  A client-server network is cheap and easy to set up

 3. Where are you most likely to find a peer-to-per network?

  In the home

  In a large organisation

  In a very large office

  None of the above

 4. Which of the following devices forwards packets across a network?

  ISP HUB

  MODEM

  Wireless access point

  Router

 5. Which type of tranmission media is the least expensive to manufacture?

  coaxial

  plastic

  fibre optic

  twisted pair cable

 6. A network interface card is usually external to a computer and is required to forward packets along a network.

  TRUE

  FALSE

 7. The amount of time data takes to travel from the source to the destination is referred to as:

  Bandwith

  Baudency

  Bit rate

  Latency

 8. Which of these terms refers to the maximum rate at which data is transferred

  Bit twisted rate

  Bandwidth

  Internet rate

  Packet rate

 9. A data packet is a unit of data that travels along a network

  TRUE

  FALSE

 10. A _____ transmits data between networks in units called packets. It can be used to connect a LAN to the internet

   WAP

  ISP

  ROUTER

  SWITCH

 11. A _______ connects devices in a local area network wirelessly / using radio waves / using Wi-Fi

   WAP

  ROUTER

  SWITCH

  ISP

 12. Client - Server: A group of devices connected to share data with each other in which all devices are equal /connected without a server.

  TRUE

  FALSE

 13. Peer to Peer: A group of devices connected to a central computer (server) which manages the network and stores files centrally.

  FALSE

  TRUE

 14. Disadvantage of peer to peer networks include:

  expensive to set up

  Dependence on the server

  The server failing will affect the rest of the network

  None of the above

 15. An advantage of a client-server network is that user files are stored centrally so resources are used more efficiently

  TRUE

  FALSE

 16. Generally speaking, a client-server network is more expensive to set up

  FALSE

  TRUE

 17. The following is an advantage of cloud computing: It can reduce costs for a company as they do not need to buy additional hardware to store data

  TRUE

  FALSE

 18. Local area networks are set up and created using software and virtual networks are created using physical cables and hardware.

  FALSE

  TRUE

 19. The advantages of a virtual network include:

  It can be flexible - easy to add or remove comptuers from the VLAN using software without cables

  Much easier to install software needed by specific groups of people

  All of the above are valid advantages

  There is less overall traffic because network traffic can be limited to each VN.

 20. One obvious disadvantage of a virtual network is hugely decreased security. If one VLAN is compromised with a VIRUS, the whole network is affected.

  TRUE

  FALSE

 21. Virtual networks on a bigger network are said to be _____________ so that when malware affects one VN the others aren't affected.

  partitioned

  falsified

  bitrated

  debugged

 22. It is possible to use virtual networks to connect devices to a LAN through a WAN

  TRUE

  FALSE

 23. A company like facebook may have HR offices in France, the US and India. They would require the HR offices across the world to share files and resources. This is known as a ?

  Server based Network

  Private Networked Client

  Cloud storage network

  Virtual Private Network

 24. VPN tunnelling is a type of ?

  encryption

  messaging

  server

  malware

 25. A VPN (Virtual Private Network) could allow external devices to connect to a private network over a public WAN (e.g the internet) without ?.

  any external devices or WAN being involved

  worrying about security

  any cables or connectiosn whatsoever

  All of the above are valid answers

 26. Once logged in to a virtual private network (VPN), the user ?

  None of the above

  would have access to the entire world's data (files and folders)

  sees the same network as if they had just logged in to an internal work station

  would not be able to see any files and folders except their own

 27. It is much __________to use a VPN to connect through the internet than to pay to maintain a WAN that the company sets up on their own.

  All of the above

  more expensive

  cheaper

  more secure

 28. There are two well known frequency bands available to use when setting up a WIFI network. 2.4 GHz and 5Ghz. 2.4GHz is?.

  not in use anymore

  the least popular frequency

  the most universally used frequency

  a type of frequency which is only used in African countries

 29. The waves in this radio frequency are about 5 inches long and can pass through walls, windows and others objects well and signals have a range up to about 100 metres

  2.4 GHz

  5 GHz

  None of the above

  1 GHz

 30. 5 GHz is less common. It has a wavelength of about 2.5 inches long and this suggests that it is?

  more capable of passing through walls than 2.4 GHz

  less capable of passing through objects and walls

  invalid and defunct

  no longer in use

 31. With 5 GHz ________ speeds can sometimes be achieved because it is less crowded/popular frequency.

  minimal

  stationary (non moving)

  higher

  lower

 32. When setting up a wireless network, 2.4 GHz is compatible with standards for building a wireless network known as 802.11b and 802.11g.

  TRUE

  FALSE

 33. Radio waves can be bounced around by many things, including walls, mirrors, water and metal surfaces. This can cause ?.

  higher frequencies

  a spontaneous internet connection to appear

  interference and signal direction change

  None of the above

 34. Each frequency _____ is divided up in to ____________.

  band / sound waves

  band / channels

  channel / bands

  signal / bands

 35. The 2.4 GHz band has ____ channels.

  14

  12

  13

  15

 36. All the channels available in a band are always available at any given time and in any given location.

  TRUE

  FALSE

 37. The 5GHz frequency offers additional bandwidth over the 2.4GHz frequency

  FALSE

  TRUE

 38. The 5GHz frequency is capable of carrying more non-overlapping channels which will result in less interference.

  FALSE

  TRUE

 39. Encryption is a method of _____________data with a key code - the data must be decrypted to be made sense of.

  allowing

  mixing

  deleting

  scrambling

 40. With encryption is the data is intercepted it will be vulnerable as if it is found, it will make sense, even without the key

  TRUE

  FALSE

 41. When you are using a secure site for example your bank, or purchasing on Amazon, encryption applied to keep your details safe:

  FALSE

  TRUE

 42. The encryption method used on secure sites is called:

   'SSL' (Secure Socket Layer

  HTTP

  FTP

  DNS

 43. Piracy and security issues are some of the concerns relating to cloud computing

  FALSE

  TRUE

 44. Twisted pair cable tranmission media is capable of having a much higher bandwidth than fibre optic.

  TRUE

  FALSE

 45. An ISP is an internet service that translates alphabetic names into IP addresses

  FALSE

  TRUE

 46. ________ is a service that allows individuals and organisations to make their website available on the world wide web

  Internet rating

  Bitting

  Bandwidth bedding

  Hosting

 47. Using the internet to store and access data and programs remotely is referred to as:

  sky storage

  unit storage

  remote bit storage

  cloud computing

 48. A bridge is used to connect two separate LAN networks. A computer can act as a bridge through the operating system

  FALSE

  TRUE

 49. There are different types of servers. For example a printer server will make it easy for various devices to connect to a printer

  FALSE

  TRUE

 50. What does a mail server do?

  A mail server acts as a central server that delivers data packets (called mail) to other servers

  There is no such thing

  It stores email messages. Your browser makes request to mail servers to retrieve the messages

  None of the above