The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
This is a quiz on Cisco IT Essentials chapter 8 "Fundamental Networks". This quiz should help you test your knowledge and aid you in your preparation for the chapter exam.
Questions and Answers
1.
Choose 2 sentences that describe a LAN.
A.
A group of interconnected devices that are under the same administrative control.
B.
An example of a LAN is the internet.
C.
The word 'local' in LAN refers to local control rather than being physically close to each other
D.
LAN's transmit data by using radio waves.
E.
LAN's are connected networks in geographically separated locations.
Correct Answer(s)
A. A group of interconnected devices that are under the same administrative control. C. The word 'local' in LAN refers to local control rather than being pHysically close to each other
Explanation LAN stands for Local Area Network, which is a group of interconnected devices that are under the same administrative control. This means that the devices within a LAN are managed and controlled by the same organization or entity. Additionally, the word 'local' in LAN refers to local control rather than being physically close to each other. This means that even if the devices within a LAN are not physically close to each other, they can still be part of the same network as long as they are under the same administrative control.
Rate this question:
2.
Find the missing word in the following Peer-to-peer disadvantage:They have no centralised network ........., which makes it difficult to determine who contros resources on the network.
Explanation The missing word in the given sentence is "administration". The sentence is discussing the disadvantage of peer-to-peer networks, specifically that they lack a centralized network administration. This means that it is challenging to determine who controls the resources on the network. The word "administrator" is also mentioned as a possible missing word, which refers to the person or entity responsible for managing and overseeing the network. Similarly, the plural form "administrators" is also a valid answer as it refers to multiple individuals or entities responsible for network administration.
Rate this question:
3.
Bandwidth is the amount of data that can be transmitted within a fixed time period. When data is sent over a computer network, it is broken into small chunks called ...........
Correct Answer(s) packets, packet
Explanation When data is sent over a computer network, it is broken into small chunks called packets. These packets contain a portion of the data being transmitted, along with additional information such as the source and destination addresses. By breaking the data into packets, it becomes easier to transmit and manage the information across the network. Each packet is individually transmitted and can take different routes to reach its destination. Once all the packets have reached their destination, they are reassembled to recreate the original data.
Rate this question:
4.
What is bandwidth measured in?
A.
Bytes
B.
Bits
C.
Hertz
D.
Baud
Correct Answer
B. Bits
Explanation Bandwidth is a measure of the amount of data that can be transmitted over a network connection in a given amount of time. It is typically measured in bits per second (bps) or multiples of bits such as kilobits (Kbps) or megabits (Mbps). Bytes, hertz, and baud are not commonly used units to measure bandwidth. Therefore, the correct answer is bits.
Rate this question:
5.
A ......... is information added to each packet that contains the packets source and destination.
Correct Answer header
Explanation A header is a piece of information that is added to each packet and contains the source and destination of the packet. It is used to provide necessary information for the routing and delivery of the packet to its intended destination. The header is typically placed at the beginning of the packet and is used by network devices to determine the next hop for the packet. It helps in the efficient and accurate transmission of data across a network.
Rate this question:
6.
Which data transmission mode is this:The communications channel allows alternating transmission in two directions, but not simultaneously.
A.
Full duplex
B.
Simplex
C.
Half duplex
Correct Answer
C. Half duplex
Explanation In half duplex mode, data can be transmitted in both directions, but not at the same time. This means that communication can alternate between sending and receiving data, but only one direction can be active at any given time. It is different from full duplex where data can be transmitted simultaneously in both directions, and simplex where data can only be transmitted in one direction.
Rate this question:
7.
Which 2 statements are correct in reference to a MAC address
A.
It is "burned" on the the graphics card
B.
It is permanently programmed into the NIC
C.
You can set it to automatically obtain a MAC address
D.
The MAC address never changes
E.
You can swap the MAC address onto different NIC cards
Correct Answer(s)
B. It is permanently programmed into the NIC D. The MAC address never changes
Explanation The MAC address is permanently programmed into the NIC (Network Interface Card). This means that it is assigned during the manufacturing process and cannot be changed. Additionally, the MAC address never changes, regardless of any network or hardware changes. Therefore, the correct statements are that the MAC address is permanently programmed into the NIC and it never changes.
Rate this question:
8.
..... is a software utility used to dynamically assign ip addresses to network devices.
Correct Answer(s)
Explanation A DHCP (Dynamic Host Configuration Protocol) server is a software utility used to dynamically assign IP addresses to network devices. This allows devices to automatically obtain an IP address, subnet mask, default gateway, and other network configuration information without manual intervention. DHCP simplifies network administration by eliminating the need for manual IP address allocation and ensuring that devices have unique and valid IP addresses within the network.
Rate this question:
9.
Which of the following is a class B subnet mask?
A.
255.255.255.0
B.
255.255.0.0
C.
255.0.0.0
Correct Answer
B. 255.255.0.0
Explanation The correct answer is 255.255.0.0. This is a class B subnet mask because it has the first two octets set to 255, indicating that the network portion of the IP address is 16 bits long. Class B addresses have a range of 128.0.0.0 to 191.255.255.255 and are typically used for medium-sized networks.
Rate this question:
10.
What are the 3 main areas of IP address information that a DHCP server can assign to hosts?
A.
MAC
B.
IP Address
C.
Default Gateway
D.
FTP
E.
Subnet Mask
Correct Answer(s)
B. IP Address C. Default Gateway E. Subnet Mask
Explanation A DHCP server can assign three main areas of IP address information to hosts: IP Address, Default Gateway, and Subnet Mask. The IP Address is the unique identifier assigned to each device on a network. The Default Gateway is the IP address of the router that connects the local network to the internet. The Subnet Mask determines the network portion and the host portion of an IP address.
Rate this question:
11.
Which protocol downloads email messages from an e-mail server? (pick 2)
A.
Telnet
B.
SSH
C.
POP3
D.
IMAP
E.
SMTP
Correct Answer(s)
C. POP3 D. IMAP
Explanation POP3 (Post Office Protocol version 3) and IMAP (Internet Message Access Protocol) are both protocols used to download email messages from an email server. POP3 is a simple protocol that downloads emails from the server to the client device, deleting them from the server in the process. IMAP, on the other hand, allows the client device to access and manage emails directly on the server, giving the user more flexibility and the ability to access their emails from multiple devices. Both protocols are commonly used in email clients to retrieve emails from the server.
Rate this question:
12.
Which command line utility is commonly used to test connections between computers?
A.
HTTP
B.
IPX/SPX
C.
PING
D.
IMAP
E.
Apple Talk
Correct Answer
C. PING
Explanation The command line utility commonly used to test connections between computers is PING. PING sends a small packet of data to a specified IP address or domain name and waits for a response. If a response is received, it indicates that the connection is working properly. PING is often used to troubleshoot network connectivity issues and measure the latency or delay in the network.
Rate this question:
13.
A ...... has several ports, depending on how many network segments are to be linked.
Correct Answer switch
Explanation A switch is a networking device that has several ports, allowing it to connect multiple network segments together. The number of ports on a switch can vary depending on the number of network segments that need to be linked. Each port on the switch can be used to connect a separate network segment, enabling communication and data transfer between the connected segments.
Rate this question:
14.
...... use IP addresses to forward frames to other networks, and they contain tables of IP addresses along with optimal destination routes to other networks.
Correct Answer Routers
Explanation Routers are networking devices that use IP addresses to forward frames to other networks. They contain tables of IP addresses along with optimal destination routes to other networks. This means that routers are responsible for directing network traffic between different networks by determining the most efficient path for data packets to reach their intended destination. Routers play a crucial role in ensuring that data is correctly routed and delivered across the internet.
Rate this question:
15.
Which sentence is a true statement of shielded twisted pair?
A.
It is a copper cored cable surrounded by heavy shielding.
B.
Has one or more optical fibres enclosed in a sheath or jacket
C.
Each pair of wires is wrapped in a metallic foil to better shield the wires from noise.
D.
It has 2 types, multimode and single mode.
Correct Answer
C. Each pair of wires is wrapped in a metallic foil to better shield the wires from noise.
Explanation Shielded twisted pair is a type of cable where each pair of wires is wrapped in a metallic foil to provide better protection against external interference or noise. This shielding helps in reducing electromagnetic interference and crosstalk between the wires, resulting in improved signal quality and transmission.
Rate this question:
16.
Which of the following topolgies has a central connection point, which normally is a device such as a hub, switch, or router.
A.
Bus
B.
Star
C.
Ring
D.
Mesh
Correct Answer
B. Star
Explanation The star topology has a central connection point, usually a device like a hub, switch, or router. In this topology, all devices are connected directly to this central point. This central point acts as a central hub for communication between all the devices in the network. Any data that needs to be transmitted from one device to another must pass through the central connection point. This topology is commonly used in Ethernet networks and provides a centralized and organized network structure.
Rate this question:
17.
Ethernet uses ......... to access the network using a first come, first served broadcast topology method to transmit data.
Correct Answer CSMA/CD
Explanation Ethernet uses CSMA/CD (Carrier Sense Multiple Access with Collision Detection) to access the network. CSMA/CD is a protocol that allows multiple devices to share the same network medium by sensing the carrier (checking if the network is busy) before transmitting data. If two devices attempt to transmit simultaneously and a collision occurs, CSMA/CD detects the collision and initiates a backoff algorithm to retransmit the data at a later time. This ensures fair access to the network and minimizes collisions, allowing for efficient data transmission in a first come, first served broadcast topology.
Rate this question:
18.
Which standard is the ethernet architecture based on?
A.
802.11a
B.
802.11g
C.
802.3
D.
1394
Correct Answer
C. 802.3
Explanation The correct answer is 802.3. The Ethernet architecture is based on the 802.3 standard. This standard defines the physical and data link layer specifications for wired Ethernet networks. It outlines the protocols and technologies used for transmitting data over Ethernet cables, such as the Ethernet frame format and the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) media access control method.
Rate this question:
19.
Which is a true statement of a client/server network?
A.
They are maintained by network users and request information from a server.
B.
They are maintained by your manager and you ask him/her to send you information and services.
C.
They are maintained by a network administrator and a network user controls information and services
D.
They are maintained by network administrators and the client requests information or services from the server
E.
All of the above
Correct Answer
D. They are maintained by network administrators and the client requests information or services from the server
Explanation A client/server network is a network architecture where network administrators are responsible for maintaining the network infrastructure, while clients (network users) request information or services from a server. This means that the correct statement is that client/server networks are maintained by network administrators and the client requests information or services from the server.
Rate this question:
20.
An ........... is a number that is used to identify a device on the network. Each device on a network must have a unique ....... to communicate with other network devices.
Correct Answer
Explanation An IP address is a number that is used to identify a device on the network. Each device on a network must have a unique IP address to communicate with other network devices.
Rate this question:
21.
What method carries telephone calls over the data networksand internet, by converting the analog signals of our voices into digital information that is transported in IP packets. It can also use an existing IP network to provide access to the public switched telephone network (PSTN)
A.
Satellite
B.
VoIP
C.
ISDN
D.
Power Line Communication (PLC)
E.
DSL
Correct Answer
B. VoIP
Explanation VoIP (Voice over Internet Protocol) is the correct answer because it is a method that carries telephone calls over data networks and the internet. It converts analog signals of our voices into digital information that is transported in IP packets. Additionally, VoIP can utilize an existing IP network to provide access to the public switched telephone network (PSTN).
Rate this question:
22.
What are the most common physical components of a network?
Correct Answer
E. Routers, Computers, Wireless Access Points, Switches, Hubs
Explanation The correct answer is Routers, Computers, Wireless Access Points, Switches, Hubs. These are the most common physical components of a network. Routers are responsible for directing data packets between different networks. Computers are the devices used by users to access the network. Wireless Access Points provide wireless connectivity to devices. Switches are used to connect multiple devices within a network. Hubs are used to connect multiple devices together in a network.
Rate this question:
23.
Which topology povides the most redundancy?
A.
Bus
B.
Mesh
C.
Ring
D.
Star
E.
Extended star
Correct Answer
B. Mesh
Explanation A mesh topology provides the most redundancy because it connects each device in the network to every other device, creating multiple paths for data to travel. This means that if one link or device fails, there are alternative routes available for data transmission. This redundancy helps to ensure high network availability and reliability, as well as minimizing the impact of failures on the overall network performance.
Rate this question:
24.
What is the maximum length of ethernet cable?
A.
150ft (45.7m)
B.
300ft (91m)
C.
328ft (100m)
D.
185m
E.
500m
Correct Answer
C. 328ft (100m)
Explanation The maximum length of an Ethernet cable is 328ft (100m). This is because Ethernet cables have a maximum distance limitation due to signal degradation over longer distances. Beyond 328ft, the signal strength decreases, leading to data loss and network performance issues. Therefore, it is recommended to use repeaters or switches to extend the network beyond this distance.
Rate this question:
25.
An IP address consists of ....... binary bits (1s and 0s). It is very difficult for humans to read a binary IP address. For this reason the .... bits are grouped into four 8-bit bytes called octets.
Correct Answer 32 thirty two
Explanation An IP address consists of 32 binary bits (1s and 0s). It is very difficult for humans to read a binary IP address. For this reason, the 32 bits are grouped into four 8-bit bytes called octets.
Rate this question:
26.
Which of the following best describes a default gateway?
A.
A device that segments a network
B.
A router on a network that provides access to another network or the internet
C.
A device that dynamically assigns I/P adresses
D.
A device that converts I/P addresses to domain names
Correct Answer
B. A router on a network that provides access to another network or the internet
Explanation A default gateway is a router on a network that provides access to another network or the internet. It acts as an intermediary between devices on a local network and devices on other networks, allowing them to communicate and access resources outside of their own network. The default gateway is responsible for routing network traffic between different networks, ensuring that data packets are sent to the correct destination. It is an essential component in connecting a local network to the wider internet.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.