0% found this document useful (0 votes)
142 views3 pages

Quiz 1 MST

This document is a quiz for a computer networks course. It contains 15 multiple choice questions that assess knowledge of key networking concepts like network threats, network types, networking devices, internet connection options, and network functions. The questions cover topics such as intranets, extranets, ISPs, routers, firewalls, BYOD, VPNs, and the functions of end devices.

Uploaded by

MARK GIL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views3 pages

Quiz 1 MST

This document is a quiz for a computer networks course. It contains 15 multiple choice questions that assess knowledge of key networking concepts like network threats, network types, networking devices, internet connection options, and network functions. The questions cover topics such as intranets, extranets, ISPs, routers, firewalls, BYOD, VPNs, and the functions of end devices.

Uploaded by

MARK GIL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

ICT211-COMPUTER NETWORKS

QUIZ I

College of Technology D. video conferencing

4. What is an ISP?

A. It is a standards body that


NAME: Ferdinand Anist develops cabling and wiring
YR/ SECTION: 4th - Ct_ES201 standards for networking.
B. It is a protocol that establishes
how computers in a local
1. During a routine inspection, a network communicate.
technician discovered that software C. It is an organization that
that was installed on a computer was enables individuals and
secretly collecting data about websites businesses to connect to the
that were visited by users of the internet.
computer. Which type of threat is D. It is a networking device that
affecting this computer? combines the functionality of
several different networking
A. DoS attack devices in one.
B. identity theft
C. spyware 5. For which of the following would
D. zero-day attack the use of a WISP be
recommended?
2. Which term refers to a network that
provides secure access to the corporate A. an internet café in a city
offices for suppliers, customers, and B. a farm in a rural area without
collaborators? wired broadband access
C. any home with multiple
A. internet wireless devices
B. intranet D. an apartment in a building with
C. extranet cable access to the internet
D. extended net
6. What characteristic of a network
3. A large corporation has modified its enables it to quickly grow to
network to allow users to access support new users and applications
network resources from their personal without impacting the performance
laptops and smartphones. Which of the service being delivered to
networking trend does this describe? existing users?

A. cloud computing A. reliability


B. online collaboration B. scalability
C. bring your own device C. quality of service
ICT211-COMPUTER NETWORKS
QUIZ I

D. accessibility run to a building? (Choose two.)

7. A college is building a new dormitory on its A. DSL


campus. Workers are digging in the ground to B. cellular
install a new water pipe for the dormitory. A C. satellite
worker accidentally damages a fiber-optic D. dialup
cable that connects two of the existing
E. dedicated leased line
dormitories to the campus data center.
Although the cable has been cut, students in
11. What type of network must a home
the dormitories experience only a very short
user access in order to do online
interruption of network services. What
shopping?
characteristic of the network is described here?

A. an intranet
A. quality of service
B. the internet
B. scalability
C. an extranet
C. security
D. a local area network
D. fault tolerance
E. integrity
12. How does BYOD change the way
businesses implement networks?
8. What are two characteristics of a scalable
network? (Choose two.)
A. BYOD requires organizations to
purchase laptops rather than
A. easily overloaded with increased traffic
desktops.
B. grows in size without impacting existing
B. BYOD users are responsible for
users
their own network security,
C. is not as reliable as a small network thus reducing the need for
D. suitable for modular devices that allow for organizational security policies.
expansion C. BYOD devices are more
E. offers limited number of applications expensive than devices that are
purchased by an organization.
9. Which device performs the function of D. BYOD provides flexibility in
determining the path that messages should where and how users can
take through internetworks? access network resources.

A. a router 13. An employee wants to access the


B. a firewall network of an organization
C. a web server remotely, in the safest possible
D. a DSL modem way. What network feature would
allow an employee to
10. Which two internet connection options do not gain secure remote access to a
require that physical cables be company network?
ICT211-COMPUTER NETWORKS
QUIZ I

A. ACL
B. IPS
C. VPN
D. BYOD
14. What is the internet?

A. It is a network based on Ethernet


technology.
B. It provides network access for mobile
devices.
C. It provides connections through
interconnected global networks.
D. It is a private network for an organization
with LAN and WAN connections.

15. What are two functions of end devices on a


network? (Choose two.)

A. They originate the data that flows through


the network.
B. They direct data over alternate paths in the
event of a link failure.
C. They filter the flow of data to enhance
security.
D. They are the interface between humans
and the communications network.
E. They provide the channel over which the
network message travels.

You might also like