This is the 2nd quiz about the computer networking topic. All 40 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology in computer networking that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: c: Would not exist
Without any type of network, including the internet, and PAN (Personal Area Networks), most companies at this time would not exist. Large companies, such as Amazon, Google, and PayPal would not be able to exist. Credit transactions for purchases and bank-to-bank transactions would completely stop and stock markets around the world would close without the internet.
Option A is incorrect as companies would be much less productive without any type of network.
Option B is incorrect as they would have much less ways of providing customer service without any type of network.
Option D is incorrect as even though there are security issues associated with networks, companies would not overall be more secure without a network.
Question 2
The correct answer is: a: A PAN (Personal Area Network)
A PAN is a small network designed to connect devices, such as desktop computers, laptops, smartphones, tablets, and printers to each other within a short span, usually ranging from a few centimetres to a few metres
Question 3
The correct answer is: b: 100 Mb/s
Question 4
The correct answer is: d: A single storage device that connects to a LAN.
Option B is incorrect as that is a SAN (Storage Area Network)
Question 5
The correct answer is: b: False
It is not possible to register a domain name forever. All domain names have an expiration date and can be registered for up to 10 years before requiring the registrant to renew it.
Question 6
The correct answer is: c: 300-3300 Hz
Question 7
The correct answer is: d: Whether it allows a standalone computer to work by itself.
When choosing a network, considering whether it allows a standalone computer to work by itself is not a relevant factor. A network requires at least two devices to work.
Options A, B, and C are all relevant factors.
Question 8
The correct answer is: a: RTSP (Real-Time Streaming Protocol)
Option B is incorrect as that is the Real-Time Transport Protocol, which is used for delivering live media over the internet, not controlling the streaming of media.
Option C is incorrect as that stands for Session Initiation Protocol and is used to initiate, maintain, and terminate real-time communication sessions with network devices.
Option D is incorrect as that stands for Network Time Protocol and is used to synchronise computer clocks between multiple computer systems across variable-latency networks.
Question 9
The correct answer is: c: Media streaming
Media streaming is a time-sensitive communication as if there was a lot of latency, frequent pauses would occur, disrupting the normal flow of the streaming media.
Options A, B, and D are incorrect as these are not time-sensitive communications. Latency would delay these processes, but not disrupt the normal flow as they can be delivered a few seconds later.
Question 10
The correct answer is: b: The domain name
The domain name is always at the end of an email address (e.g. [email protected].)
Option A is incorrect as that is what appears at the start of the email address.
Options C and D are incorrect as an email address never contains an SSID or a MAC address.
Question 11
The correct answer is: b: There is a higher risk of the data being intercepted by unauthorised users.
Wireless technologies, such as Wi-Fi make it much easier for the data to be intercepted by unauthorised users as unlike wired technologies, devices do not need to be physically connected to get any data. The solution to this issue is encryption.
Question 12
The correct answer is: a: More secure than WEP
WPA was introduced in 2003 in response to the Wi-Fi Alliance's definition of WPA as having critical weaknesses and vulnerabilities in WEP.
Question 13
The correct answer is: a: A 32-bit address
Question 14
The correct answer is: a: True
Fibre To The Cabinet (FTTC) is faster than Digital Subscriber Line (DSL) because FTTC uses fibre optic cables from the distribution point or telephone exchange to the street cabinets and then copper cables to a home or office. DSL only uses slow copper cables.
Question 15
The correct answer is: d: Increased greatly
As the number of devices connected to a network has increased over time, it has greatly increased the number of unique IP addresses required. This has caused a lack of IPv4 addresses, since the total number of IPv4 addresses available is 4,294,967,296 as 256 x 256 x 256 x 256 is equal to this number. With over 7 billion people in the world and a lot of people having more than one connected device, approximately 4.2 billion addresses are not enough. It became evident that much more IP addresses would be required to connect devices to each other than the available IPv4 address space. Up to 340,282,366,920,938,000,000,000,000,000,000,000,000 unique IP addresses can be assigned by IPv6.
Question 16
The correct answer is: c: RSS feeds
Question 17
The correct answer is: b: To allow multiple devices to share the same internet connection.
Option A is incorrect as that is the role of DNS.
Option D is incorrect as that is the role of a firewall.
Question 18
The correct answer is: a: Before transferring a domain name to a new registrar.
EPP codes help prevent unauthorised domain transfers by requiring a unique 6-16 character code to be entered before the domain name is transferred to a new registrar. Without an EPP code, unauthorised transfers are much more likely to occur.
Question 19
The correct answer is: d: GoDaddy
Option A is incorrect as the W3C is the organisation responsible for developing standards, guidelines, and protocols for the World Wide Web in order to ensure the long-term growth of the web and lead it to its full potential.
Option B is incorrect as IANA is the organisation owned by ICANN that is responsible for the assignment of internet numbers.
Option C is incorrect as ICANN is the organisation responsible for the allocation of IP address space, TLD system management, protocol identifier assignment, root domain name server system management, assignment of IP addresses to ISPs through its IANA (Internet Assigned Numbers Authority) group, and namespaces of the internet. It does not provide domain registration services and it is not possible to directly register a domain on ICANN.
Question 20
The correct answer is: c: 56 Kb/s
Question 21
The correct answer is: b: It depends on the broadband provider.
Options A and D are incorrect as there is no single cost to cancel a broadband contract early.
Option C is incorrect as cancelling a broadband contract early almost always costs money.
Question 22
The correct answer is: d: TCP
Option A is incorrect as that stands for IMAP and is the protocol used to store email messages on a server and synchronise them across multiple devices.
Option B is incorrect as that stands for SMTP and is the protocol used to transfer outgoing mail from one server to another.
Option C is incorrect as that stands for Explicit Congestion Notification and is the protocol used to enable end-to-end notification of network congestion without discarding data packets.
Question 23
The correct answer is: b: An application-layer protocol
Question 24
The correct answer is: a: Jitter
Option B is incorrect as latency is the period of time that it takes for a data packet to be processed or transferred to its destination, not the irregular time delays in the transferring of data packets from one host to another.
Option C is incorrect as tunnelling is a technology that enables data to be moved from one network to another.
Option D is incorrect as routing is the process of selecting a path for a data packet to be transported from source to destination.
Question 25
The correct answer is: b: Telecommunications technology
Options A, C, and D are incorrect as broadband is not limited to wireless, radio wave, and satellite communications.
Question 26
The correct answer is: b: ICANN
Question 27
The correct answer is: c: 92.30 Mb/s
15 ÷ 1.3 = 11.53846153846154
In order to get that in megabits, it needs to be multiplied by 8.
11.53846153846154 x 8 = 92.30 Mb/s
Data transfer rate = 92.30 Mb/s (Rounded to two decimal places)
Question 28
The correct answer is: b: Mesh topology
Question 29
The correct answer is: b: DDoS attacks
DDoS attacks are designed to flood a network or server with so much malicious traffic that they can't operate properly. This would cause downtime.
Options A and D are incorrect as they are consequences of downtime, not causes.
Question 30
The correct answer is: d: 99.60%
17,462 active hours ÷ 17,532 available hours = 99.60% uptime
Option B is incorrect as that is the downtime percentage.
Question 31
The correct answer is: c: The portion of IPv4 addresses that are available in a network.
Option B is incorrect as IPv6 does not have subnet masks. Instead, it has a prefix-length. The prefix-length defines how many bits of the address are available in the network.
Question 32
The correct answer is: c: DNS hijacking
Option B is incorrect as DNS propagation is the period of time that it takes for DNS changes to take effect across the entire web.
Option D is incorrect as domain hijacking is an unauthorised attempt to take over the ownership of a domain name without the registrant’s permission. It is not related to DNS hijacking.
Question 33
The correct answer is: a: Computer systems, web servers, mail servers, file servers, networking equipment, storage systems, etc.
Options B, C, and D are incorrect as data centres are not limited to those things.
Question 34
The correct answer is: d: A series of prerecorded digital audio files that can be downloaded from the internet.
Option B is incorrect and is a common misconception. A common misconception with podcasts is that a standard audio file is a podcast. For example, when recording a video and uploading that file to a website, it is commonly thought that it is a podcast. A podcast is different from a single audio file in the way that it allows subscriptions. A podcast refers to a series of audio files, such as a TV show, and a podcast episode refers to a single episode of that podcast. A single audio file would be one episode of that podcast.
Option C is incorrect as that is a broadcast.
Question 35
The correct answer is: b: Hybrid topology
Option A is incorrect as even though tree topologies are complex, hybrid topologies are even more complex as they combine the features of two or more topologies, whilst a tree topology can only combine the features of a star and a bus topology.
Question 36
The correct answer is: b: False
Network switches do not have the capability to route data to other networks. That is the capability of a router.
Question 37
The correct answer is: c: 4
Question 38
The correct answer is: c: Both
Modems are both considered input and output devices because they both send (upload/input) and receive (download/output) data. They modulate (convert) an analogue carrier signal from a telephone or cable wire to digital data, which include 1s and 0s that a computer is able to recognise and convert digital data from another device into an analogue signal that can be transferred over standard telephone lines.
Question 39
The correct answer is: a: Transparent proxy
Transparent proxies offer no added privacy or security and web servers will receive people’s real IP addresses when using these types of proxies. Transparent proxies are often for the purposes of content filtering or caching.
Question 40
The correct answer is: d: It prevents the reduction of available IP addresses since private IP addresses are used.
Network address translation (NAT) translates the IP address of computers on a local network to a single IP address. NAT is most commonly used by organisations and companies to limit the number of public IP addresses that are necessary to be used for the purposes of security and the economy.
Your like or dislike has been added successfully. To see the changes, reload the page.