Chapter 11: Networking Fundamentals and Devices (Set-9)

In a client-server office setup, the server is most responsible for

A Random file sharing
B Changing cable type
C Central resource control
D Blocking all traffic

A peer-to-peer network becomes difficult mainly when the number of PCs

A Increases a lot
B Decreases slowly
C Stays constant
D Uses fiber only

A metro network connecting multiple campuses across one city is best called

A LAN network
B PAN network
C WAN network
D MAN network

Network “throughput” is best defined as the

A Router brand name
B Cable outer color
C Actual transfer rate
D IP address size

High “jitter” causes problems mainly in

A Offline typing
B Voice/video calls
C File copying local
D Screen brightness

In bus topology, a terminator is used mainly to

A Stop signal reflection
B Increase collision rate
C Assign IP address
D Encrypt data frames

In star topology, using a switch instead of hub improves

A Signal reflection control
B Token passing
C Collision reduction
D DNS caching

A full mesh between 6 devices requires many links, so it is mainly used for

A Cheap home LAN
B Critical connections
C Single printer sharing
D Small PAN setup

Coaxial cable is better than basic UTP mainly for

A Noise shielding
B DNS resolution
C IP routing
D VLAN tagging

A common reason fiber is used in backbone networks is

A High interference
B Low bandwidth
C Weak security
D Low attenuation

A repeater cannot fix

A Wrong IP settings
B Weak signals
C Long cable run
D Low signal strength

A hub forwards frames based on

A MAC address table
B Routing table
C No address logic
D DNS cache table

A switch mainly uses a MAC table to

A Assign DNS names
B Forward correct port
C Encrypt Wi-Fi signals
D Convert analog signals

A router is needed when traffic must go

A Between USB ports
B Between keyboards
C Between monitors
D Between subnets

A default route on a router is used for

A Local VLAN only
B MAC learning
C Unknown destinations
D DHCP leasing

If a PC can ping its gateway but not open websites by name, suspect

A DNS problem
B Cable break
C NIC failure
D VLAN mismatch

DHCP “reservation” is used to

A Block Wi-Fi users
B Increase bandwidth
C Give same IP
D Hide SSID name

An APIPA address 169.254.x.x indicates

A DHCP not reachable
B NAT is disabled
C DNS is perfect
D VLAN is working

NAT is required mainly because private IP ranges are

A Too fast to route
B Too encrypted always
C Only for IPv6
D Not internet routable

VLANs reduce broadcast traffic by

A Increasing collision size
B Removing subnet masks
C Limiting broadcast scope
D Disabling routing

A trunk port between switches is used to carry

A Only one VLAN
B Multiple VLANs
C Only IPv6 packets
D Only DNS replies

A broadcast domain is separated by

A Routers typically
B Hubs typically
C Repeaters typically
D Coax typically

A collision domain is reduced by using

A Hub device
B Bus backbone
C Switch ports
D Ring terminator

A proxy server is often used to

A Enforce browsing rules
B Assign IP addresses
C Replace subnet mask
D Increase Wi-Fi power

Load balancing improves performance by

A Increasing collisions
B Disabling DNS
C Spreading requests
D Removing VLANs

A common Wi-Fi attack risk is using weak

A Monitor cable
B Wi-Fi password
C Mouse battery
D Printer ink

WPS is a security risk mainly due to

A PIN brute force
B DNS caching
C VLAN tagging
D Fiber attenuation

MAC filtering is limited security because MAC can be

A Encrypted strongly
B Removed by DNS
C Blocked by NAT
D Spoofed easily

A guest Wi-Fi network is recommended mainly to

A Share admin login
B Isolate visitors
C Disable encryption
D Increase collisions

“Signal strength” affects Wi-Fi mainly by changing

A DNS response time
B IP address format
C Speed and stability
D VLAN tagging

A speed test result includes upload, download and usually

A Latency ping
B MAC address
C VLAN ID
D Subnet mask

A cable tester can detect wrong

A DNS server name
B IP gateway value
C Pin wiring order
D Wi-Fi channel

Network documentation helps future troubleshooting by providing

A Wallpaper history
B Device IP map
C Keyboard settings
D Font style list

Throughput can be much lower than bandwidth due to

A Packet loss
B Bigger screen
C More RAM
D New mouse

In wireless networks, interference is reduced by

A Using weak password
B Enabling WPS
C Changing Wi-Fi channel
D Lowering encryption

A switch flooding broadcast frames can be reduced by

A VLAN segmentation
B Hub expansion
C Coax cable use
D WEP enabling

A secure router practice is to

A Enable open Wi-Fi
B Keep default login
C Use WEP only
D Disable remote admin

WPA3 is preferred over WPA2 mainly due to

A Longer SSID
B Faster LAN cables
C Stronger protection
D More IP ranges

A hotspot should be secured mainly by

A Strong password
B Open access
C WEP only
D Shared PIN

A wrong default gateway often causes

A Faster Wi-Fi speed
B No internet access
C More IP addresses
D Better DNS cache

If ping fails to gateway, first check

A Website coding
B Browser cache
C Cable/Wi-Fi link
D File permissions

A router connects LAN to internet and also performs

A NAT and routing
B Token passing
C Signal reflection
D Cable crimping

A switch does not typically separate

A Collision domains
B Broadcast domains
C Switch ports
D Frame forwarding

Using wired Ethernet instead of Wi-Fi usually improves

A Higher jitter
B More interference
C More collisions
D Lower latency

Coaxial cable signal quality is improved by its

A Shielding layer
B Token system
C MAC table
D DHCP lease

Fiber optic is more secure against eavesdropping because it

A Uses public IP
B Uses WPS PIN
C Doesn’t radiate EMI
D Uses weak keys

A bridge differs from a router because a bridge uses

A IP addresses
B MAC addresses
C DNS names
D SSID names

A MAC table is maintained mainly by a

A Network switch
B Router only
C Hub only
D Modem only

A practical sign of broadcast overload is

A Monitor gets bright
B Mouse moves fast
C Network becomes slow
D Printer prints more

Best first step before changing settings in troubleshooting is to

A Reinstall OS now
B Delete router logs
C Disable firewall always
D Verify physical layer

Leave a Reply

Your email address will not be published. Required fields are marked *