Chapter 11: Networking Fundamentals and Devices (Set-8)
A network that connects multiple LANs across a university city campus is best described as
A PAN type
B MAN type
C LAN type
D Ring type
When several LANs are connected across a city-sized area, it is usually a MAN. Universities and large institutions often connect departments and campuses using high-speed metro links.
A key advantage of client-server design over peer-to-peer is
A No admin needed
B No backups needed
C Central access control
D No user accounts
Client-server networks manage users, permissions, and resources from a central server. This makes security, backups, updates, and monitoring easier compared to peer-to-peer where control is distributed.
If a network shows high bandwidth but slow “response”, the likely cause is
A Extra storage
B Dark screen
C More RAM
D High latency
Bandwidth controls how much data can move, but latency controls delay. High latency causes slow response in browsing and real-time apps, even if download speed appears high in tests.
A common example of WAN technology use is
A Internet backbone
B Bluetooth earbuds
C USB cable
D Printer cable
WAN connects networks over long distances. Internet backbone links carry traffic between cities and countries using high-capacity fiber and routing equipment, forming the core of global connectivity.
In bus topology, data collisions increase because devices share
A Many central switches
B Separate cables
C One main cable
D Two ring loops
Bus topology uses a single backbone. When multiple devices transmit, signals can collide on the shared medium. Collisions cause retransmissions, slowing network performance as devices increase.
In star topology, one benefit is that a single cable fault
A Affects one node
B Stops all nodes
C Breaks internet
D Deletes MAC table
Each device has its own cable to the central hub or switch. If one cable fails, only that connected device loses network, while others remain working, improving reliability and troubleshooting.
A ring topology network can reduce collisions mainly using
A MAC filtering
B Token passing
C DNS caching
D NAT translation
Token passing controls who can transmit at a time. Only the device holding the token sends data, reducing collisions. This can improve order but ring networks are less popular today.
Mesh topology is expensive mainly because it requires
A One backbone only
B One router only
C Many connections
D No switches
Mesh creates multiple links between nodes to provide redundancy. As devices increase, links rise sharply, requiring more cabling and ports, increasing cost and complexity.
Twisted pair cable is preferred in offices mainly because it is
A Uses light only
B Always wireless
C Has no copper
D Cheap and flexible
Twisted pair cables are low cost, easy to install, and support common Ethernet speeds. Their twisted design reduces interference, making them ideal for office LAN wiring.
Fiber optic is preferred for backbone links because it provides
A High speed distance
B High interference
C Low encryption
D Low reliability
Fiber supports high bandwidth over long distances with low attenuation and strong resistance to electromagnetic noise. These features make it ideal for network backbones and inter-building connections.
Wireless networks often slow down due to
A File formatting
B RAM upgrades
C Channel interference
D Screen scaling
Wi-Fi uses shared radio channels. Nearby routers and devices can interfere, causing retransmissions and reduced speed. Selecting a cleaner channel and using 5 GHz often improves performance.
A repeater improves a network by
A Assigning DNS
B Regenerating signal
C Routing packets
D Encrypting Wi-Fi
Repeaters boost and regenerate weak signals so they travel further. They help extend cable distances or wireless coverage, but they do not increase the internet plan bandwidth.
A hub is different from a switch because a hub
A Sends to all
B Learns MAC table
C Filters by MAC
D Routes by IP
A hub repeats incoming frames to all ports, creating more collisions and unnecessary traffic. Switches learn MAC addresses and forward only to the required port, improving LAN efficiency.
A switch mainly forwards frames using
A IP address
B DNS name
C MAC address
D SSID name
Switches operate at data link layer and forward frames based on destination MAC addresses. They maintain a MAC table to send frames only to the correct port, reducing collisions.
A router differs from a switch because a router uses
A IP routing
B MAC flooding
C Coax splitting
D Token passing
Routers forward packets between networks using IP addresses and routing tables. Switches forward within the same network using MAC addresses. Routing is needed to connect different subnets and WANs.
A modem is required mainly when an ISP uses
A LAN switch only
B USB hub only
C Cable/DSL line
D VGA cable
Modems convert signals between the ISP line medium and digital network devices. Cable and DSL services typically need modem functionality to communicate properly with the service provider.
A gateway is needed mainly to connect networks using
A Same VLAN only
B Same subnet only
C Same MAC only
D Different protocols
Gateways translate between different protocols or systems. They allow communication between dissimilar networks, often serving as the entry point to external networks or special services.
NIC is essential because it provides
A File compression
B Network interface
C Printer memory
D Monitor driver
A NIC connects a device to the network and handles communication signals. It has a MAC address and can be wired or wireless, enabling data sending and receiving.
IPv4 addresses are limited, so networks often use
A Token passing
B Bus topology
C NAT technique
D Coax cable
NAT allows many private devices to share one public IPv4 address, reducing demand for public IPv4 space. It is widely used in home and office routers for internet sharing.
An IPv6 address is usually written in
A Hex groups
B Decimal dots
C Binary bytes
D Roman numbers
IPv6 uses hexadecimal groups separated by colons. It provides huge address space compared to IPv4, supporting modern growth of devices without heavy reliance on NAT.
A subnet mask is mainly used to determine
A Wi-Fi channel
B Router password
C File permissions
D Network boundary
Subnet masks separate network and host portions of an IP address. They help devices decide whether a destination is on the local subnet or should be sent to the default gateway.
Default gateway is required when a destination is
A Same switch port
B Same MAC address
C Outside subnet
D Same folder
To reach another network like the internet, a device sends traffic to the default gateway (router). Without a gateway, the device can usually communicate only within its own subnet.
DNS server helps by converting
A Name to IP
B IP to MAC
C Cable to Wi-Fi
D SSID to key
DNS resolves domain names into IP addresses. This allows users to access websites by name. Wrong DNS settings can cause “website not found” issues even when connectivity exists.
DHCP reduces IP conflicts because it provides
A Same static IP
B Unique IP leases
C Same MAC address
D Same DNS name
DHCP assigns IP addresses dynamically and tracks them using leases. This helps prevent multiple devices getting the same IP. Conflicts usually occur when static IP overlaps DHCP range.
A MAC address is used mainly within a
A Global WAN
B Internet DNS
C Local LAN
D VPN tunnel
MAC addresses work at the data link layer for local delivery. Switches use MAC addresses to forward frames inside a LAN. Across networks, routers use IP addresses for routing.
Ping command mainly uses
A ICMP messages
B HTTP pages
C FTP files
D SMTP emails
Ping sends ICMP echo requests and receives replies to test reachability. It measures response time and packet loss, helping identify connectivity issues between a device and a destination.
Traceroute helps troubleshoot by showing
A RAM usage list
B File list view
C Hop-by-hop path
D Wi-Fi password
Traceroute displays routers (hops) along the route to a destination. It helps locate where delays or failures start, useful for diagnosing routing problems or network congestion.
SSID is important because it identifies the
A Router firmware
B IP subnet mask
C MAC table
D Wi-Fi network
SSID is the wireless network name shown to users. Devices select an SSID to connect. Security depends on WPA2/WPA3 encryption and strong passwords, not just SSID visibility.
WPA2 and WPA3 are designed to provide
A Faster routing
B Wi-Fi security
C Better topology
D More bandwidth
WPA2/WPA3 encrypt wireless traffic and help prevent unauthorized access. WPA3 improves protections against password guessing. Strong passwords and firmware updates further strengthen Wi-Fi security.
WPS should be disabled mainly because it can
A Be attacked
B Improve privacy
C Reduce latency
D Stop NAT
WPS can be exploited, especially PIN-based methods. Disabling WPS reduces risk. Using WPA2/WPA3 with strong passwords is safer for protecting Wi-Fi from unauthorized connections.
A guest Wi-Fi network helps by
A Sharing admin login
B Disabling encryption
C Isolating visitors
D Stopping DHCP
Guest networks keep visitors separated from main devices like PCs and smart TVs. Visitors can use internet without accessing internal resources, improving privacy and reducing security risks.
Router admin password must be changed because defaults are
A Easily guessed
B Always encrypted
C Always unique
D Very private
Default router admin credentials are widely known. Attackers can take control and change settings if defaults remain. Changing admin password and updating firmware are basic router security steps.
Firmware updates on routers are important mainly to fix
A Screen contrast
B Security bugs
C File formats
D Printer speed
Router firmware updates patch vulnerabilities and improve stability. Outdated firmware may allow attackers to exploit known issues. Regular updates plus strong admin password help keep the network secure.
On public Wi-Fi, a safer practice is using
A WEP encryption
B Default passwords
C Open sharing
D VPN service
A VPN encrypts traffic between your device and VPN server, reducing eavesdropping risk on public Wi-Fi. It is especially useful for sensitive browsing, logins, and preventing data interception.
NAT is useful for security because it
A Shares MAC table
B Shows passwords
C Hides internal IPs
D Weakens encryption
NAT prevents direct inbound access to private IP devices by default, hiding internal addresses. While not a full firewall, it reduces exposure and is commonly combined with router firewall features.
A VLAN helps improve security by
A Separating departments
B Increasing collisions
C Disabling routing
D Removing DNS
VLANs isolate traffic between groups like HR and Accounts. This reduces unauthorized access and limits broadcast spread. Inter-VLAN communication can be controlled through routing and firewall rules.
A collision domain becomes larger when using a
A Switch device
B Router device
C Fiber link
D Hub device
Hubs broadcast to all ports, creating one large collision domain. Switches create separate collision domains per port, improving performance and reducing collisions in modern Ethernet networks.
Broadcast domains are separated mainly by
A Hub devices
B Repeaters only
C Router devices
D Coax splitters
Routers separate broadcast domains by not forwarding broadcasts across interfaces. VLANs also separate broadcast domains within switches. This reduces broadcast traffic and improves network performance.
A proxy server can help organizations by
A Changing MACs
B Filtering content
C Increasing ping
D Breaking DNS
Proxy servers can block unwanted sites, log usage, and enforce browsing policies. They can also cache content for speed. This helps improve security and control internet use in offices.
Load balancing is used mainly to
A Boost SSID power
B Replace routers
C Distribute traffic
D Stop encryption
Load balancing spreads requests across multiple servers or links. This improves speed, handles peak loads, and increases uptime. If one server fails, traffic can shift to other servers.
A cable tester is used to check
A Cable wiring faults
B DNS records
C Wi-Fi channels
D Router passwords
Cable testers check continuity, pin order, and faults like open or short circuits. They help find damaged Ethernet cables, wrong crimping, and wiring errors that cause slow or unstable links.
A common cause of “Wi-Fi connected, no internet” is wrong
A Mouse settings
B Screen size
C Font style
D Default gateway
If gateway settings are incorrect, a device may connect to Wi-Fi but cannot reach internet networks. Correct IP, subnet mask, and gateway settings are necessary for external connectivity.
An IP conflict happens when two devices share
A Same monitor
B Same IP
C Same keyboard
D Same printer
When two devices use the same IP in one subnet, communication breaks and errors appear. Fix by using DHCP correctly or assigning unique static IPs outside the DHCP range.
Throughput means the
A Cable color code
B IP address length
C Actual data speed
D Router heat level
Throughput is the real achieved transfer rate after overhead, interference, and retransmissions. It can be lower than bandwidth. Measuring throughput shows practical network performance for users.
Jitter mainly affects
A Voice/video calls
B File rename
C Printer ink
D Monitor size
Jitter is variation in packet delay. Real-time voice and video need steady packet timing. High jitter causes choppy audio, frozen video, and poor call quality even if bandwidth is good.
A network documentation item is
A Wallpaper file
B Font size list
C IP address plan
D Game score list
Documentation includes IP plans, VLAN IDs, device maps, and configurations. It helps troubleshooting and expansion. Without documentation, fixing issues and maintaining consistency becomes difficult.
A first troubleshooting step for “no link” on Ethernet is checking
A Browser history
B Link lights
C File explorer
D Office updates
Link lights show physical connectivity. If lights are off, the issue may be cable, port, or device power. This quick check helps diagnose problems before deeper IP or DNS troubleshooting.
If ping works to gateway but not to website names, problem is likely
A Cable break
B NIC failure
C VLAN trunk
D DNS settings
Working gateway ping shows local network is fine. If websites fail by name, DNS resolution is likely wrong or DNS server unreachable. Fixing DNS server settings usually resolves the issue.
Using 5 GHz Wi-Fi often helps because it has
A Longer range
B No encryption
C Less channel crowd
D No router needed
5 GHz offers more channels and less interference than 2.4 GHz in many areas, improving speed and stability. Its range may be shorter, but performance is often better near the router.
A safe step to secure Wi-Fi is to
A Disable WPS
B Use open Wi-Fi
C Share admin login
D Use weak password
Disabling WPS reduces easy-connection attack risks. Combine this with WPA2/WPA3, strong Wi-Fi password, changed admin password, and firmware updates to keep the wireless network secure.