This is the quiz about the computer networking topic. All 40 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology in computer networking that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: c: A collection of two or more devices that can communicate with each other by physical or wireless connections.
Option A is incorrect. A protocol is a set of rules that determine how electronic devices communicate with each other and transfer data. A network is not a group of internet protocols. It is a group of devices. These devices use protocols to communicate with each other over the network, but Option A does not correctly describe a network.
Option B is incorrect as that is an ISP.
Option D is incorrect as that is a file storage service.
Question 2
The correct answer is: d: A router
A router would be most suitable for his needs as it can exchange data outside of his own network to his ISP. A hub and switch would be unsuitable as they are unable to exchange data from one network to another and read IP addresses. A wireless adapter is plugged into the USB port of a computer and is only used to enable a device to connect to the internet wirelessly.
Question 3
The correct answer is: a: POP3
POP3 (Post Office Protocol Version 3) establishes an internet connection with the server host, downloading the email message to the device over the internet, and then deleting the message from the server. IMAP (Internet Message Access Protocol) works in a different way as it stores the email message on a server and mail is synchronised across multiple devices.
SMTP (Simple Mail Transfer Protocol) is never used for receiving mail. It is used for transferring outgoing mail from one server to another.
MIME (Multipurpose Internet Mail Extensions) is a completely different protocol that extends the original SMTP and enables users to use text in character sets other than ASCII, layouts, fonts, and colours that are categorised as rich text, supports unlimited message length, and add attachments of images, audio, videos, documents, and more in an email message.
Question 4
The correct answer is: b: WEP, WPA, WPA2
WEP (Wired Equivalent Privacy) is the oldest and least secure Wi-Fi security standard. Any systems that still use WEP should be upgraded or replaced. However, WEP is still used with systems that do not support WPA.
WPA (Wi-Fi Protected Access) is more secure than WEP as it provides better encryption and authentication than WEP. WPA was introduced in 2003 in response to the Wi-Fi Alliance's definition of WPA as having critical weaknesses and vulnerabilities in WEP. WPA2, the second version of WPA was introduced later on for enhanced security and prevention of unauthorised access to Wi-Fi networks.
Question 5
The correct answer is: b: Star topology
Every node in a star topology always has its own cable that connects to a central connection point, such as a router or a network switch. Point-to-point, bus, and ring topologies do not consist of a central connection point.
Question 6
The correct answer is: d: computerhelp4all
The second-level domain (SLD) is the custom name that appears before the top-level domain (TLD). Option C is incorrect as that is the TLD, the extension that appears after the custom name.
Question 7
The correct answer is: a: The sharing of the internet connection of a mobile phone to a connected computer.
Option B is incorrect as that is known as a public network.
Option D is incorrect as that is known as bridging.
Question 8
The correct answer is: c: Wide area network
Question 9
The correct answer is: a: The IP address
DNS (Domain Name System) acts as the phonebook of the internet, since its role is to translate domain names to IP addresses and eliminate the need for people to remember numeric IP addresses when visiting websites. Reverse DNS lookups are performed in the opposite way. Instead of looking up the domain name and returning the IP address, reverse DNS lookups query the IP address first and return the domain name that is mapped to that IP address.
Options B and C are completely incorrect as DNS never uses MAC addresses or subnet masks in the resolution process.
Question 10
The correct answer is: b: False
Every network or server has a unique IP address. Two different networks cannot have the same IP address.
Question 11
The correct answer is: a: 404
The HTTP status code 404 is the most well-known error code on the World Wide Web, meaning that the requested page cannot be found on the server.
The HTTP status code 403 means that the server understood the request, but access is denied to the requested page due to permission errors.
The HTTP status code 300 indicates that the request has multiple responses and the client must choose one. It is a link list where the user can select a link and go to that location.
The HTTP status code 503 indicates that the request was not completed due to the server being temporarily down, usually due to it being overloaded or maintenance.
Question 12
The correct answer is: d: Fibre To The Premises
FTTP is the fastest type of broadband available, since all of the cables are fibre optic and are directly connected to a home or office. It does not use any slow copper cables, like Digital Subscriber Line, Cable Internet, and Fibre To The Cabinet.
Question 13
The correct answer is: c: A proxy server
Question 14
The correct answer is: d: ICANN
All domain registrars must be accredited by ICANN. Every time a domain name is registered, that domain registrar pays a small fee to ICANN, which is part of the domain registration process as ICANN additionally manages a registry of domain registrars.
Question 15
The correct answer is: c: Users can share their electricity over a network.
Question 16
The correct answer is: d: 127
All IP addresses beginning with '127' are reserved for loopback purposes, meaning that no network or server can have an IP address that starts with '127'. Any traffic that a computer system sends on the loopback address is addressed to the same computer. It is not used for communicating with any other devices on a network.
Question 17
The correct answer is: a: Any device that is connected to a network.
Question 18
The correct answer is: b: Multihoming.
Multicasting is the sending of data across a network to multiple recipients or hosts at the same time across a LAN or WAN.
Multiplexing is used to combine the multiple data streams together and send them over a single medium.
Multimedia is the combination of multiple forms of media.
Question 19
The correct answer is: a: 7
The OSI model defines 7 layers that devices use for communicating over a network. These include:
- Application layer
- Presentation layer
- Session layer
- Transport layer
- Network layer
- Datalink layer
- Physical layer
Question 20
The correct answer is: d: The number of the interface standard.
Question 21
The correct answer is: b: ARPANET
ARPANET (Advanced Research Project Agency Network) was the first network that was developed by the ARPA, led by the DOD (US Department of Defence) in 1969. It was the predecessor to the internet.
Question 22
The correct answer is: c: 99.80%
In order to calculate uptime, the number of active hours must be divided by the number of available hours. 26,230 ÷ 26,280 = 0.9980. As a percentage, this would be 99.80%.
Option D is incorrect as that is the downtime percentage.
Question 23
The correct answer is: d: 73.33 Mb/s
In order to calculate data transfer rate, the amount of data needs to be divided by the number of seconds it took to transfer that data. 11 MB ÷ 1.2 = 9.166666666666667. However, that needs to be converted into megabits, which can be accomplished by multiplying the number by 8. 9.166666666666667 x 8 = 73.33 Mb/s.
Question 24
The correct answer is: c: Allowing large numbers of users to connect to the network at once.
Question 25
The correct answer is: c: HTTPS is the secure version of HTTP.
Question 26
The correct answer is: d: Seeder
A tracker is a server that keeps track of all of the seeds and peers in the swarm.
A leecher is a user that has downloaded the file shared by the seeders without seeding them to other users.
A peer is a user who has a BitTorrent client running on their computer. They may be downloading or uploading the file, but they do not have 100% of the file. It does not have the same meaning as a seeder.
Question 27
The correct answer is: b: SSH
SSH (Secure Shell) is much more secure than Telnet because it uses public-key encryption for the purpose of encrypting messages into ciphertext (encrypted text). If an attacker tried to intercept the sent information, such as the credentials, they would only see random text, which is unreadable by humans.
Telnet should not be used as it is insecure.
Options C and D are incorrect as they are completely different protocols.
Question 28
The correct answer is: a: The period of time that it takes for data to be transferred or processed to its destination.
Option B is incorrect as this refers to a timeout.
Option C is incorrect as this refers to jitter.
Question 29
The correct answer is: c: Bus topology
Bus topologies require terminators at each end of the cable to prevent the signals from reflecting back down the bus topology. Mesh, star, and ring topologies do not require terminators at each end.
Question 30
The correct answer is: b: User Datagram Protocol
Although it is less reliable than the Transmission Control Protocol, the User Datagram Protocol is recommended for time-sensitive transmissions, such as video playing, media streaming, and gaming as it does not implement a three-way handshake. In other words, it enables the transmission of data before an agreement is provided by the receiving party, allowing data to be transmitted much more quickly. If there was a slow transmission process in time-sensitive communications, it would cause noticeable delays and pauses in voice communications.
Question 31
The correct answer is: a: World Wide Web
Question 32
The correct answer is: d: Peer-to-peer communication
Question 33
The correct answer is: a: The upload speed is much slower than the download speed.
Question 34
The correct answer is: c: It enables network traffic to travel a shorter distance without travelling through unnecessary routers to reach its final destination.
Question 35
The correct answer is: a: True
Question 36
The correct answer is: b: 56,000 bits ÷ 7
In order to calculate baud rate, the data transfer rate, measured in bits must be divided by the number of bits per signal transmission. 56 kilobits in bits is 56,000. Dividing it by 7 will give the correct baud rate of 8000 baud.
Question 37
The correct answer is: a: It is difficult for webmasters to track subscribers.
Although RSS feeds do not require subscribers to give away any of their personal contact details to subscribe, such as their email address and users can stay updated with the latest news from a website, it is much harder for webmasters to track subscribers than newsletters.
Question 38
The correct answer is: c: Resources
Question 39
The correct answer is: c: 128-bit
IPv6 is the more recent and advanced version of an IP address. An IPv6 address looks like: ‘1234:0fb8:0000:0000:0000:ff00:0012:1234’. Instead of a 32-bit address consisting of decimals up to 255, IPv6 is a 128-bit alphanumeric address that is separated with colons and contains hexadecimal.
Question 40
The correct answer is: d: A system designed to block and allow certain types of network traffic to prevent threats.
Your like or dislike has been added successfully. To see the changes, reload the page.