Lesson 1: Understanding Local Area Networking

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Lauraborkent
L
Lauraborkent
Community Contributor
Quizzes Created: 9 | Total Attempts: 3,578
Questions: 17 | Attempts: 543

SettingsSettingsSettings
Networking Quizzes & Trivia

Questions and Answers
  • 1. 

    You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?

    • A.

      The user’s password

    • B.

      Active Directory

    • C.

      Master network switch

    • D.

      Network documentation

    Correct Answer
    D. Network documentation
    Explanation
    : To understand your LAN better, it helps to write down what its structure is—in other words, to document it. Network documentation is any information that helps describe, define, and otherwise explain how the network computers are connected physically and logically.

    Rate this question:

  • 2. 

    What is the most common central device used today to connect computers to a network?

    • A.

      Hub

    • B.

      Switch

    • C.

      SOHO router

    • D.

      VPN router

    Correct Answer
    B. Switch
    Explanation
    A switch is the most common central device used today to connect computers to a network. Unlike a hub, a switch can intelligently direct network traffic to specific devices, making it more efficient and secure. A switch operates at the data link layer of the OSI model, allowing it to read the MAC addresses of connected devices and send data only to the intended recipient. This improves network performance and reduces the likelihood of data collisions. Switches are widely used in both home and enterprise networks due to their ability to handle high volumes of traffic and provide better network management capabilities.

    Rate this question:

  • 3. 

    What is the most common adapter or connector used to connect a computer to a wired network?

    • A.

      RG6

    • B.

      RG58

    • C.

      RJ45

    • D.

      RJ8

    Correct Answer
    C. RJ45
    Explanation
    The most common adapter or connector used to connect a computer to a wired network is the RJ45. RJ45 is a standard connector used for Ethernet connections. It has eight pins and is commonly used for connecting computers, routers, switches, and other networking devices to a local area network (LAN). RJ45 connectors are easy to use, widely available, and provide a reliable and secure connection for data transmission over a wired network.

    Rate this question:

  • 4. 

    Which of the following does a switch use for increased performance?

    • A.

      Simplex

    • B.

      Half duplex

    • C.

      Full duplex

    • D.

      Sliding duplex

    Correct Answer
    C. Full duplex
    Explanation
    A switch uses full duplex for increased performance. Full duplex allows for simultaneous communication in both directions, allowing for faster and more efficient data transfer. This means that the switch can send and receive data at the same time, reducing latency and improving overall network performance.

    Rate this question:

  • 5. 

    What do you use to isolate a group of computers within your organization?

    • A.

      WLAN

    • B.

      WAN

    • C.

      VLAN

    • D.

      Internet

    Correct Answer
    C. VLAN
    Explanation
    A VLAN (Virtual Local Area Network) is used to isolate a group of computers within an organization. It allows for the segmentation of a network into smaller, separate networks, even if the computers are physically connected to the same network switch. This isolation helps to improve security, manage network traffic, and organize resources within the organization. WLAN (Wireless Local Area Network) and WAN (Wide Area Network) are different types of networks, while the Internet is a global network that connects multiple organizations and individuals.

    Rate this question:

  • 6. 

    What do you use to create VLANs

    • A.

      Router

    • B.

      Switch

    • C.

      Firewall

    • D.

      Proxy server

    Correct Answer
    B. Switch
    Explanation
    Switches are used to create VLANs. A VLAN (Virtual Local Area Network) is a logical grouping of devices on a network, allowing them to communicate as if they were on the same physical network, even if they are located in different physical locations. Switches have the capability to create and manage VLANs by assigning ports to specific VLANs, allowing for segmentation and improved network security. Routers, firewalls, and proxy servers are not typically used to create VLANs, as their primary functions are related to routing traffic, filtering network traffic, and providing network services, respectively.

    Rate this question:

  • 7. 

    What zone is used to publish external websites for an organization?

    • A.

      Intranet

    • B.

      Extranet

    • C.

      Internetwork

    • D.

      DMZ

    Correct Answer
    D. DMZ
    Explanation
    A DMZ (Demilitarized Zone) is a network segment that is used to securely host external-facing services, such as websites, for an organization. It acts as a buffer zone between the internal network (intranet) and the external network (internet). By placing external websites in the DMZ, organizations can provide access to these sites without compromising the security of their internal network. The DMZ allows external users to access the websites while providing an additional layer of protection against potential threats from the internet.

    Rate this question:

  • 8. 

    Which topology is the most redundant and the most expensive?

    • A.

      Star

    • B.

      Ring

    • C.

      Mesh

    • D.

      Bus

    Correct Answer
    C. Mesh
    Explanation
    A network topology defines the physical connections of hosts in a computer network. With the mesh topology, every computer connects to every other computer. No central connecting device is needed. Since every computer connects to every other computer, it requires the most cabling, which increases the cost.

    Rate this question:

  • 9. 

    What standard describes CSMA/CD?

    • A.

      801.2

    • B.

      802.3

    • C.

      802.5

    • D.

      802.11

    Correct Answer
    B. 802.3
    Explanation
    The correct answer is 802.3. This standard describes CSMA/CD, which stands for Carrier Sense Multiple Access with Collision Detection. CSMA/CD is a protocol used in Ethernet networks to avoid collisions when multiple devices attempt to transmit data simultaneously. The 802.3 standard specifies the physical and data link layer specifications for Ethernet networks, including the CSMA/CD protocol.

    Rate this question:

  • 10. 

    What mechanism do wireless networks use to access the network?

    • A.

      CSMA/CD

    • B.

      CSMA/CA

    • C.

      Token passing

    • D.

      Polling

    Correct Answer
    B. CSMA/CA
    Explanation
    Wireless networks use CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism to access the network. CSMA/CA is a protocol that helps avoid collisions in wireless networks by having devices listen for traffic on the network before transmitting data. If the network is clear, the device can transmit its data. If it detects traffic, it waits for a random period of time before attempting to transmit again. This helps prevent collisions and ensures efficient access to the network for multiple devices.

    Rate this question:

  • 11. 

    What model promises the most processing power?

    • A.

      Centralized computing

    • B.

      Distributive computing

    • C.

      Switching computing

    • D.

      Dumb computing

    Correct Answer
    B. Distributive computing
    Explanation
    Distributive computing promises the most processing power because it involves dividing a task among multiple computers or processors, allowing them to work simultaneously. This parallel processing capability increases the overall processing power and enables faster execution of complex tasks. In contrast, centralized computing relies on a single computer or server, limiting the processing power to that specific device. Switching computing refers to network switching and does not directly relate to processing power. Dumb computing is not a recognized term in the context of computing power.

    Rate this question:

  • 12. 

    Which model users a central database for authentication?

    • A.

      Peer-to-peer

    • B.

      Workgroup

    • C.

      Client/server

    • D.

      Distributive

    Correct Answer
    C. Client/server
    Explanation
    The client/server model is an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7 or Windows Vista machines. It also distributes the necessary processing power. This is extremely common in today’s LANs and with most applications an average user would utilize when connecting to the Internet.

    Rate this question:

  • 13. 

    What type of server does Active Director run on?

    • A.

      File server

    • B.

      Print server

    • C.

      Database server

    • D.

      Network controller

    Correct Answer
    D. Network controller
    Explanation
    Active Directory is a directory service developed by Microsoft that is used to manage and organize network resources. It is designed to run on a network controller server, which is responsible for managing and controlling various network services and devices. Active Directory relies on the network controller server to authenticate and authorize users, manage network policies, and provide directory services. Therefore, the correct answer is network controller.

    Rate this question:

  • 14. 

    Which model has each host have their own security database?

    • A.

      Peer-to-peer

    • B.

      Client/server

    • C.

      Distributive

    • D.

      Sliding

    Correct Answer
    A. Peer-to-peer
    Explanation
    In a peer-to-peer model, each host has its own security database. This means that each individual device in the network is responsible for managing its own security measures, such as authentication and access control. Unlike a client/server model where a central server manages the security database for all connected clients, a peer-to-peer model distributes this responsibility to each individual host, allowing for a more decentralized and independent network structure.

    Rate this question:

  • 15. 

    What type of communication is sent to a single designated host?

    • A.

      Unicast

    • B.

      Broadcast

    • C.

      Multicast

    • D.

      Anycast

    Correct Answer
    A. Unicast
    Explanation
    Unicast communication is sent to a single designated host. In this type of communication, a message is sent from one sender to one specific recipient. It is a point-to-point communication where the sender and receiver have a one-to-one relationship. Unicast is commonly used in most network communication scenarios, such as sending emails, browsing websites, or making a phone call to a specific person. Unlike broadcast or multicast communication, unicast ensures that the message is only delivered to the intended recipient, providing a more targeted and efficient form of communication.

    Rate this question:

  • 16. 

    What is used to uniquely identify a host on a TCP/IP network?

    • A.

      IP address

    • B.

      MAC address

    • C.

      Bit pattern

    • D.

      Router name

    Correct Answer
    A. IP address
    Explanation
    An IP address is used to uniquely identify a host on a TCP/IP network. This address is a numerical label assigned to each device connected to the network, allowing it to be identified and communicate with other devices. The IP address consists of a series of numbers separated by periods, such as 192.168.0.1, and it serves as the host's identifier on the network. The MAC address, on the other hand, is a unique identifier assigned to the network interface card of a device, while a bit pattern refers to a sequence of 0s and 1s. A router name is not used for identification purposes on a TCP/IP network.

    Rate this question:

  • 17. 

    A ________ is a single computer or device that connects to a TCP/IP network.

    Correct Answer
    Host
    host
    host
    Explanation
    A host is a single computer or device that connects to a TCP/IP network. It serves as a source or destination of data transmission within the network. The repetition of the word "host" in the answer options emphasizes that a host is the correct term to fill in the blank.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 07, 2017
    Quiz Created by
    Lauraborkent
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.