0% found this document useful (0 votes)
14 views5 pages

Review These For 4th Quarter Summative Test

The document contains multiple-choice questions, true or false statements, scenario-based questions, and a concept map related to networking concepts. It covers topics such as network topologies, devices, protocols, and security measures. The scenarios require practical application of networking knowledge for setting up and troubleshooting networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

Review These For 4th Quarter Summative Test

The document contains multiple-choice questions, true or false statements, scenario-based questions, and a concept map related to networking concepts. It covers topics such as network topologies, devices, protocols, and security measures. The scenarios require practical application of networking knowledge for setting up and troubleshooting networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MULTIPLE CHOICES.

1. Why is a star topology more reliable than a bus topology?


A) It requires fewer cables
B) Failure of one device does not affect others
C) It provides faster data transmission
D) It is easier to configure
2. How does a switch differ from a hub in a network?
A) A hub can filter data packets
B) A switch can connect wireless devices
C) A switch forwards data based on MAC addresses
D) A hub is more secure than a switch
3. Which type of network cable is less susceptible to electromagnetic
interference?
A) Fiber optic cable B) Coaxial cable
C) Twisted pair cable D) Ethernet cable
4. What advantage does a wireless network have over a wired network?
A) Higher security B) Faster data transfer rates
C) Mobility and flexibility D) Lower cost
5. How does a router differ from a modem?
A) A modem connects multiple devices
B) A router manages data traffic within a network
C) A modem converts digital data to analog signals
D) A router connects devices to the Internet
6. If a computer cannot connect to a website using its domain name but can
access it via its IP address, what could be the issue?
A) DNS server misconfiguration B) Subnet mask misalignment
C) Default gateway failure D) Printer sharing conflict
7. How does subnetting help in organizing networks?
A) It increases network speed
B) It reduces network congestion
C) It divides a large network into smaller logical networks
D) It simplifies IP address assignment
8. What role does DHCP (Dynamic Host Configuration Protocol) play in IP
networks?
A) It assigns static IP addresses to devices
B) It automatically configures IP addresses for devices
C) It manages domain name registrations
D) It encrypts network traffic
9. Why is it important to secure file and printer sharing on a network?
A) To prevent unauthorized access to sensitive data
B) To increase network speed
C) To improve printer performance
D) To install software updates
10. Which network service is responsible for translating computer names to
IP addresses?
A) DHCP B) DNS
C) FTP D) SNMP
11. If a user cannot connect to a wireless network, what troubleshooting
steps should be taken first?
A) Restart the modem
B) Check the SSID and password
C) Replace the network cable
D) Update the firewall rules
12. How does network traffic analysis help identify potential security
threats?
A) By blocking all incoming traffic
B) By monitoring and detecting unusual patterns or behaviors
C) By increasing network bandwidth
D) By disabling DHCP
13. What impact does a misconfigured firewall rule have on network
performance?
A) Slower internet speed
B) Faster file transfers
C) Improved wireless signal strength
D) Increased printer sharing
14. Why is it important to conduct regular network connectivity tests?
A) To reduce printer maintenance costs
B) To identify and troubleshoot network issues proactively
C) To install software updates
D) To increase firewall security
15. Which wireless network parameter affects the speed and reliability of
data transmission?
A) Cable length
B) IP address range
C) Signal strength
D) Ethernet port speed

TRUE OR FALSE.
___F__ 1. Ethernet is an example of a network topology.
___T__ 2. VLANs (Virtual Local Area Networks) are used to segment a
physical network into multiple logical networks.
___F__ 3. FTP (File Transfer Protocol) encrypts data during transmission by
default.
___T__ 4. A crossover cable is used to connect two devices of the same
type directly.
___T__ 5. TCP (Transmission Control Protocol) is a connection-oriented
protocol that provides reliable, ordered delivery of data.
___T__ 6. UDP (User Datagram Protocol) provides reliable, connection-
oriented communication.
___T__ 7. DNS (Domain Name System) resolves domain names to IP
addresses.
___T__ 8. A subnet mask is used to determine the network portion of an IP
address.
___T__ 9. NAT (Network Address Translation) allows multiple devices on a
private network to share a single public IP address.
___T__ 10. DHCP (Dynamic Host Configuration Protocol) assigns IP
addresses to devices dynamically on a network.
___T__ 11. Bandwidth refers to the amount of data that can be transmitted
over a network in a given amount of time.
___T__ 12. A firewall is used to protect a network by controlling incoming
and outgoing network traffic based on predetermined security
rules.
___T__ 13. A broadcast domain is a logical division of a computer network,
in which all nodes can reach each other via broadcast at the data
link layer.
___T__ 14. A repeater is a network device used to amplify or regenerate
signals in order to extend the length of a network segment.
___T__ 15. QoS (Quality of Service) allows network traffic to be prioritized
based on criteria such as bandwidth, latency, and packet loss.

SCENARIO-BASED QUESTIONS.
1. Choosing the Right Network Setup
You are tasked with setting up a new computer lab in your school. The lab will
have 20 computers that need to be connected to each other for file sharing and
internet access. Based on your knowledge of network types and topologies,
which type of network setup (LAN, MAN, WAN) and topology (bus, star, ring)
would be most suitable for this computer lab? Justify your choice.
2. Selecting Network Cables for a Project
You are planning to connect several devices in your home network, including a
desktop computer, a printer, and a smart TV. Based on your understanding of
network cables, which types of cables (e.g., Ethernet, coaxial, fiber optic) would
you use to connect these devices? Explain the factors that influence your choice
of cables.
3. Setting Up File and Printer Sharing
You need to enable file and printer sharing between two computers in your
home network. Explain how you would configure file sharing permissions on
each computer to allow access to shared folders and printers. Describe the
steps involved in setting up shared resources and accessing them from another
computer on the network.
4. Home Network with Wi-Fi Connectivity Issues
Users complain of intermittent slow internet speeds and frequent disconnections
on their wireless devices (laptops, smartphones). Note that only a single
wireless router is used to provide internet access to multiple devices within the
home. Describe how you would troubleshoot the issues.

CREATING A CONCEPT MAP

Network Devices (5 points):


List and illustrate essential networking devices (e.g., router, switch, modem,
access point).
IP Addressing and Subnetting (5 points):
Illustrate the concept of IP addressing (IPv4 vs. IPv6) and subnetting.

Network Security (5 points):


Highlight key aspects of network security measures (e.g., firewalls,
encryption, VPN).

NETWORK DEVICES

ROUTER

SWITCH

MODEM ACCESS POINT

IP ADDRESSING AND
SUBNETTING

IPv4 vs. IPv6

32 bits

(192. ts
NETWORK SECURITY MEASURES

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy