[go: up one dir, main page]

0% found this document useful (0 votes)
32 views15 pages

اساسيات الشبكات

The document contains a series of self-assessment questions related to networking concepts, including physical topology, scalable networks, Quality of Service (QoS), and various networking protocols. It also covers topics such as the OSI model, IP addressing, and network security. The assessments are designed to test knowledge on network configuration, traffic management, and the characteristics of different network types.

Uploaded by

ahmed.malleswas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views15 pages

اساسيات الشبكات

The document contains a series of self-assessment questions related to networking concepts, including physical topology, scalable networks, Quality of Service (QoS), and various networking protocols. It also covers topics such as the OSI model, IP addressing, and network security. The assessments are designed to test knowledge on network configuration, traffic management, and the characteristics of different network types.

Uploaded by

ahmed.malleswas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Self assessment 1 ‫اساسيات الشبكات‬

Question 1- Physical topology diagrams illustrate devices, ports, and the addressing scheme
of the network.

A-True

B-False

Question 2 Which of the following is the characteristics of a scalable network.

A-a private connection of LANs and WANs that belongs to an organization

B-uses existing electrical wiring to connect devices for home networks

C-limits the number of affected devices during a failure

D-grows in size without impacting existing users

Question 3- Which term describes a policy that allows network devices to manage the flow of
data to give priority to voice and video?

A-extranet

B-internet

C-intranet

D-quality of service

Question 4- What term describes storing personal files on servers over the internet to provide
access anywhere, anytime, and on any device?

A-cloud

B-quality of service

C-converged network

D-BYOD

Question 5- A large corporation has modified its network to allow users to access network
resources from their personal laptops and smart phones.

Which networking trend does this describe?

A-Bring Your Own Device (BYOD)

B-video conferencing

C-online collaboration

D-cloud computing
Question 6- What type of network traffic requires QoS?

A-wiki

B-email

C-video conferencing

D-on-line purchasing

Self Assessment 2

Question 1- After making configuration changes on a Cisco switch, a network


administrator issues a copy running-config startup-config command.
What is the result of issuing this command?
A-The new configuration will be stored in flash memory.
B-The configuration changes will be removed and the original configuration will be
restored.
C-The new configuration will be loaded if the switch is restarted.
D-The current IOS file will be replaced with the newly configured file.
Question 2- What function does pressing the Tab key have when entering a command
in IOS?
A-It moves the cursor to the end of the line.
B-It completes the remainder of a partially typed word in a command.
C-It moves the cursor to the beginning of the line.
D-It is used to exit the configuration mode and returns to EXEC mode.
Question 3- Shell is the user interface that allows users to request specific tasks from
the computer through the CLI or GUI interfaces.
A-True
B-False
Question 4-Which command or key combination allows a user to return to the
previous level in the command hierarchy?
A-Ctrl-Z
B-Ctrl-C
C-end
D-exit
Question 5- Why would a Layer 2 switch need an IP address?
A-to enable the switch to function as a default gateway
B-to enable the switch to send broadcast frames to attached PCs
C-to enable the switch to be managed remotely
D-to enable the switch to receive frames from attached PCs

Self Assessments 4

Question 1- What is the purpose of the OSI physical layer?


A-transmitting bits across the local media
B-controlling access to media
C-performing error detection on received frames
D-exchanging frames between nodes over physical network media
Question 2-Refer to the graphic. What type of cabling is shown?

A-STP
B-UTP
C-coax
D-fiber
Question 3-What OSI physical layer term describes the amount of time, including
delays, for data to travel from one point to another?
A-latency
B-Crosstalk
C-Throughput
D-Goodput
Question 4-Which characteristic describes crosstalk?
A-the distortion of the network signal from fluorescent lighting
B-the weakening of the network signal over long cable lengths
C-the loss of wireless signal over excessive distance from the access point
D-the distortion of the transmitted messages from signals carried in adjacent wires
Question 5-Crosstalk describes the measure of the transfer of bits across a medium
over a given period of time.
A-True
B-False
Self Assessments 5

Question 1-Which is the hexadecimal equivalent of 254?


A-FE
B-FA
C-EA
D-ED
Question 2-What is the decimal equivalent of the binary number 10010101?
A-168
B-192
C-149
D-153
Question 3-The hexadecimal equivalent of 202 is CA.
A-True
B-False
Question 4-The number of binary bits in an IPv4 address is 128.
A-True
B-False
Question 5-How many binary bits exist within an IPv6 address?
A-32
B-64
C-48
D-128
Quiz 1
Question 1-Which IOS made allows accesses to all commands and features?
A-Interface sub configuration mode
B-line console sub configuration mode
C-privileged exec mode
D-user exec mode
Question 2-Confidentiality, integrity, and availability are requirements of which of the
four basic characteristics of network architecture?
A-Fault tolerance
B-scalability
C-Qos
D-security
Question 3-During a routine inspection, a technician discovered that software that
was installed on a computer was secretly collecting data about websites that were
visited by users of the computer. Which type of threat is affecting this computer?
A-Dos attack
B-identity theft
C-spyware
D-zero-day attack
Question 4-An administrator uses the cnrl-shift-6 key combination on a switch after
issuing the ping command. What is the purpose of using these keystrokes?
A-to restart the ping process
B-to cancel the ping process
C-to exit to a difference configuration mode
D-to allow the user to compete the command
Question 5-Which of the following is the name for all computers connected to a
network that participated directly in network communication?
A-Switches
B-Intermediary devices
C-Hosts
D-Media
Question 6-Which option blocks unauthorized access to your network?
A-Firewall
B-Virus,worms, or Trojan horse
C-Zero-day or Zero-hour
D-Virtual Private Network (VPN)
Question 7- What term describes storing personal files on servers over the internet to
provide access anywhere, anytime, and on any device?
A-cloud
B-quality of service
C-converged network
D-BYOD

Question 8-What is the command to assign the name “Sw-Floor-2” to a switch?


A-hostname Sw-Floor-2
B-host name Sw-Floor-2
C-name Sw-Floor-2
D-host Sw-Floor-2

Question 9-Which two devices are intermediary devices?


A-Host
B-Routers
C-Servers
D-Switches

Question 10- Why would a Layer 2 switch need an Ip address?


A-to enable the switch to send broadcast frames to attached PCs.
B-to enable the switch to function as a default gateway.
C-to enable the switch to be managed remotely.
D-to enable the switch to receive frames from attached PCs

Question 11-Which secure access method would be the most appropriate in-band access to
the IOS over a network connection?
A-Console
B-Telnet
C-SSH
D-Aux

Question 12-Which command encrypts all plaintext passwords access on a switch?


A-secret
B-login
C-enable secret class
D-service password-encryption
Question 13-Which option describes malicious code running on user devices?
A-Firewall
B-Virus,worms, or Trojan horse
C-Zero-day or Zero-hour
D-Virtual Private Network (VPN)
Question 14-When data is encoded as pulses of light, which media is being used to
transmit the data?
A-Wireless
B-Fiber-optic cable
C-Copper cable
D-Coaxial cable
Question 15-What term describes a network where one computer can be both client
and server?
A-peer-to-peer
B-client/server
C-BYOD
D-quality of service

Quiz 2

Question 1-Which delivery method is used to transmit information to one or more end
devices, but not all devices on the network?
A-Unicast
B-Multicast
C-Broadcast
D-None of the above
Question 2-True or False. Standards organizations are usually vendor-neutral
A-True
B-False
Question 3-What type of communication will send a message to all devices on a local
area network?
A-Unicast
B-Multicast
C-Broadcast
D-None of the above
Question 4-This protocol is responsible for guaranteeing the reliable delivery of
information
A-TCP
B-IP
C-HTTP
D-Ethernet
Question 5- A web client is sending a request for a webpage to a web server. From the
perspective of the client, what is the correct order of the protocol stack that is used to
prepare the request for transmission?
A-HTTP,IP,TCP,Ethernet
B-HTTP,TCP,IP,Ethernet
C-IP,Ethernet,TCP,HTTP
D-Ethernet,TCP,IP,HTTP
Question 6-What is done to an IP packet before it is transmitted over the physical
medium?
A-It is tagged with information guaranteeing reliable delivery
B-It is encapsulated into a TCP segment
C-It is segmented into smaller individual pieces
D-it is encapsulated in a Layer 2 frame
Question 7-UDP and TCP belong to which layer of the TCP/IP protocol?
A-application
B-transport
C-internet
D-network access
Question 8-What is the name of the process of adding protocol information to data as
it moves down the protocol stack?
A- de-encapsulation
B-sequencing
C-segmentation
D-encapsulation
Question 9-What layer is responsible for routing messages through an internetworj in
the TCP/IP model?
A-Internet
B-transport
C-network access
D-session
Question 10- Which method allows a computer to react accordingly when it requests
data from a server and the server takes too long to respond?
A- encapsulation
B-flow control
C-access method
D-response timeout
Question 11- What method can be used by two computers to ensure that packets are
not dropped because too much data is being sent too quickly?
A-encapsulation
B-flow control
C-access method
D-response timeout
Question 12-What is the process of diving a large data stream into smaller pieces prior
to transmission?
A-Sequencing
B-duplexing
C-multiplexing
D-segmentation
Question 14-At which Osi layer is a source MAC address added to a PDU during the
encapsulation process?
A-data link layer
B-application layer
C-transport layer
D-presentation layer
Question 15-Which device performs the function of determining the path that
messages should take through internetworks?
A-router
B-a firewall
C- a web server
D-a DSL modem

Quiz 3
Question 1-Which of the following wireless standards is used for Personal Area
Networks (PANs) and allows devices to communicate over distances of 1 to 100
meters?
A-Zigbee
B-WiMAX
C-Wi-Fi
D-Bluetooth
Question 2-True or False. Wireless LANs operate in full-duplex allowing all devices to
send or receive data at the same time so the number of users does not impact
performance
A-True
B-False
Question 3-What is the binary equivalent of the decimal number 70?
A-01000111
B-00011000
C-01110010
D-01000110
Question 4-What is the decimal equivalent of C9?
A-185
B-201
C-200
D-199
Question 5-Which of the following terminates with BNC, N type and F type
connectors?
A-UTP
B-STP
C-Coaxial
D-Fiber-Optic
Question 6-What type of cable is used to connect a workstation serial port to a Cisco
router console port?
A-Rollover
B-crossover
C-coaxial
D-straight-through
Question 7-True or False? The physical layer is only concerned with wired network
connections.
A-True
B-False
Question 8-What is the decimal equivalent of the hex number 3F?
A-93
B-77
C-63
D-87
Question 9-What is the binary representation of AB?
A-10101011
B-11011010
C-10111010
D-11010101
Question 10-Which of the following is the decimal equivalent of 7D?
A-124
B-125
C-126
D-127
Question 11-Which media uses patterns of light to represent bits?
A-Copper
B-Wireless
C-Fiber-Optic
D-Wired
Question 12-How many bits are in an IPv4 address?
A-128
B-48
C-32
D-64
Question 13-Which of these is a measure of the transfer of bits across the media?
A-Bandwidth
B-Throughput
C-Goodput
D-All of the above
Question 14- Refer to the graphic. What type of cabling is shown?

A-STP
B-UTP
C-coax
D-fiber
Question 15-What is one advantage of using fiber optic cabling rather than copper
cabling?
A-It is easier to terminate and install than copper cabling.
B-It is usually cheaper than copper cabling.
C-It is able to be installed around sharp bends.
D-It is able to carry signals much farther than copper cabling.
Question 15-Which of these is the name for the capacity of a medium to carry data?
A-Bandwidth
B-Throughput
C-Goodput
D-All of the above
Question 16-What is the decimal equivalent of A9?
A-168
B-169
C-170
D-171
Question 17-What is the binary representation of CA?
A-11001010
B-11011010
C-10111010
D-11010101
Question 18-What is the binary representation of EF?
A-11001010
B-11101111
C-11110111
D-11010101
Question 19-Which of the following counters EMI and RFI by using shielding
techniques and special connectors?
A-UTT
B-STP
C-MAC
D-TCP
Question 20-Which procedure is used to reduce the effect of crosstalk in copper
cables?
A-designing a cable infrastructure to avoid crosstalk interference
B-avoiding sharp bends during installation
C-twisting opposing circuit wire pairs together
D-requiring proper grounding connections
Question 21- How many binary bits exist within an IPv6 address?
A-32
B-64
C-48
D-128
Question 22-Which type of UTP cable is used to connect a PC to a switch port?
A-straight-through
B-Console
C-crossover
D-rollover

You might also like