Common Assessment - 10/28/2024

Common Assessment - 10/28/2024

33 Qs

quiz-placeholder

Similar activities

Mock test Workshop

Mock test Workshop

KG - University

34 Qs

Preparation: OneNote Textbook Module 1 & 2

Preparation: OneNote Textbook Module 1 & 2

KG - University

32 Qs

PENILAIAN SUMATIF AKHIR SEMESTER GANJIL

PENILAIAN SUMATIF AKHIR SEMESTER GANJIL

KG - University

32 Qs

Ujian Semester Genap Administrasi Sistem  Jaringan Kelas XII TKJ

Ujian Semester Genap Administrasi Sistem Jaringan Kelas XII TKJ

KG - University

37 Qs

Ôn tập 5

Ôn tập 5

KG - University

38 Qs

ITN Module 14 Multiple-Choice Quiz

ITN Module 14 Multiple-Choice Quiz

KG - University

35 Qs

Common Assessment - 10/28/2024

Common Assessment - 10/28/2024

Assessment

Quiz

others

Hard

Created by

William Tsang

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The ________ layer connects users via lower and switches and wireless access points in a three layered network design.

Network

Distribution

Access

Core

Answer explanation

The Access layer connects users through lower switches and wireless access points, facilitating direct user access to the network. This layer is essential for end-user connectivity, making 'Access' the correct choice.

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The encapsulation process is best described as

Packets, frames, bits, data, and segments.

Data, segments, packets, frames, and bits

Bits, packets, data, segments, and frames

Frames, bits, segments and packets

Answer explanation

The encapsulation process involves wrapping data with protocol information at each layer. The correct order is Data, segments, packets, frames, and bits, reflecting how data is structured and transmitted across networks.

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Firewall, password policies, and data encryptions are examples of _______ security.

Logical

Data

Physical

Network

Answer explanation

Firewall, password policies, and data encryptions are measures that protect information systems and data integrity, which fall under logical security. Logical security focuses on software and data protection, unlike physical or network security.

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Bluetooth communication would be appropriate in which of the following applications?

Internal hard drive to memory

Cell phone to storage area network

Cell phone to wireless headset

Nic to switch

Answer explanation

Bluetooth is ideal for short-range wireless communication, making it suitable for connecting a cell phone to a wireless headset. Other options involve longer-range or wired connections, which are not appropriate for Bluetooth.

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Media Image

The topology diagram below illustrate the various cities where a company's offices are located. What was best described the network this company has deployed?

MAN

CAN

LAN

WAN

Answer explanation

The network described is a MAN (Metropolitan Area Network) as it connects multiple offices across various cities, typically within a specific geographic area, unlike LAN (Local Area Network) or WAN (Wide Area Network) which cover smaller or larger areas respectively.

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Packet analyzers are used by network administrators and network security engineers

As an intrusion detection system

To send packets sniffers to security analysts

To allow closing of discovered open ports.

In order to display packets with very detailed information

Answer explanation

Packet analyzers are tools that capture and display network packets in detail, allowing administrators to analyze traffic and troubleshoot issues effectively. This makes 'In order to display packets with very detailed information' the correct choice.

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The network technician responsible for a LAN has determined that a network problem has occurred before the point of present or demarcation point technicians should contact the

Computer manufacturer

Federal Communications Commission

DHCP server manufacturer

Internet service provider

Answer explanation

The issue is before the demarcation point, indicating it's likely related to the service provider's network. Therefore, the technician should contact the Internet service provider for assistance.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?