Chapter 11: Networking Fundamentals and Devices (Set-8)

A network that connects multiple LANs across a university city campus is best described as

A PAN type
B MAN type
C LAN type
D Ring type

A key advantage of client-server design over peer-to-peer is

A No admin needed
B No backups needed
C Central access control
D No user accounts

If a network shows high bandwidth but slow “response”, the likely cause is

A Extra storage
B Dark screen
C More RAM
D High latency

A common example of WAN technology use is

A Internet backbone
B Bluetooth earbuds
C USB cable
D Printer cable

In bus topology, data collisions increase because devices share

A Many central switches
B Separate cables
C One main cable
D Two ring loops

In star topology, one benefit is that a single cable fault

A Affects one node
B Stops all nodes
C Breaks internet
D Deletes MAC table

A ring topology network can reduce collisions mainly using

A MAC filtering
B Token passing
C DNS caching
D NAT translation

Mesh topology is expensive mainly because it requires

A One backbone only
B One router only
C Many connections
D No switches

Twisted pair cable is preferred in offices mainly because it is

A Uses light only
B Always wireless
C Has no copper
D Cheap and flexible

Fiber optic is preferred for backbone links because it provides

A High speed distance
B High interference
C Low encryption
D Low reliability

Wireless networks often slow down due to

A File formatting
B RAM upgrades
C Channel interference
D Screen scaling

A repeater improves a network by

A Assigning DNS
B Regenerating signal
C Routing packets
D Encrypting Wi-Fi

A hub is different from a switch because a hub

A Sends to all
B Learns MAC table
C Filters by MAC
D Routes by IP

A switch mainly forwards frames using

A IP address
B DNS name
C MAC address
D SSID name

A router differs from a switch because a router uses

A IP routing
B MAC flooding
C Coax splitting
D Token passing

A modem is required mainly when an ISP uses

A LAN switch only
B USB hub only
C Cable/DSL line
D VGA cable

A gateway is needed mainly to connect networks using

A Same VLAN only
B Same subnet only
C Same MAC only
D Different protocols

NIC is essential because it provides

A File compression
B Network interface
C Printer memory
D Monitor driver

IPv4 addresses are limited, so networks often use

A Token passing
B Bus topology
C NAT technique
D Coax cable

An IPv6 address is usually written in

A Hex groups
B Decimal dots
C Binary bytes
D Roman numbers

A subnet mask is mainly used to determine

A Wi-Fi channel
B Router password
C File permissions
D Network boundary

Default gateway is required when a destination is

A Same switch port
B Same MAC address
C Outside subnet
D Same folder

DNS server helps by converting

A Name to IP
B IP to MAC
C Cable to Wi-Fi
D SSID to key

DHCP reduces IP conflicts because it provides

A Same static IP
B Unique IP leases
C Same MAC address
D Same DNS name

A MAC address is used mainly within a

A Global WAN
B Internet DNS
C Local LAN
D VPN tunnel

Ping command mainly uses

A ICMP messages
B HTTP pages
C FTP files
D SMTP emails

Traceroute helps troubleshoot by showing

A RAM usage list
B File list view
C Hop-by-hop path
D Wi-Fi password

SSID is important because it identifies the

A Router firmware
B IP subnet mask
C MAC table
D Wi-Fi network

WPA2 and WPA3 are designed to provide

A Faster routing
B Wi-Fi security
C Better topology
D More bandwidth

WPS should be disabled mainly because it can

A Be attacked
B Improve privacy
C Reduce latency
D Stop NAT

A guest Wi-Fi network helps by

A Sharing admin login
B Disabling encryption
C Isolating visitors
D Stopping DHCP

Router admin password must be changed because defaults are

A Easily guessed
B Always encrypted
C Always unique
D Very private

Firmware updates on routers are important mainly to fix

A Screen contrast
B Security bugs
C File formats
D Printer speed

On public Wi-Fi, a safer practice is using

A WEP encryption
B Default passwords
C Open sharing
D VPN service

NAT is useful for security because it

A Shares MAC table
B Shows passwords
C Hides internal IPs
D Weakens encryption

A VLAN helps improve security by

A Separating departments
B Increasing collisions
C Disabling routing
D Removing DNS

A collision domain becomes larger when using a

A Switch device
B Router device
C Fiber link
D Hub device

Broadcast domains are separated mainly by

A Hub devices
B Repeaters only
C Router devices
D Coax splitters

A proxy server can help organizations by

A Changing MACs
B Filtering content
C Increasing ping
D Breaking DNS

Load balancing is used mainly to

A Boost SSID power
B Replace routers
C Distribute traffic
D Stop encryption

A cable tester is used to check

A Cable wiring faults
B DNS records
C Wi-Fi channels
D Router passwords

A common cause of “Wi-Fi connected, no internet” is wrong

A Mouse settings
B Screen size
C Font style
D Default gateway

An IP conflict happens when two devices share

A Same monitor
B Same IP
C Same keyboard
D Same printer

Throughput means the

A Cable color code
B IP address length
C Actual data speed
D Router heat level

Jitter mainly affects

A Voice/video calls
B File rename
C Printer ink
D Monitor size

A network documentation item is

A Wallpaper file
B Font size list
C IP address plan
D Game score list

A first troubleshooting step for “no link” on Ethernet is checking

A Browser history
B Link lights
C File explorer
D Office updates

If ping works to gateway but not to website names, problem is likely

A Cable break
B NIC failure
C VLAN trunk
D DNS settings

Using 5 GHz Wi-Fi often helps because it has

A Longer range
B No encryption
C Less channel crowd
D No router needed

A safe step to secure Wi-Fi is to

A Disable WPS
B Use open Wi-Fi
C Share admin login
D Use weak password

Leave a Reply

Your email address will not be published. Required fields are marked *