You are on page 1of 6

LONDON WESTMINSTER COLLEGE – BATTICALA

Advance Diploma in Computer Systems Technology

Unit ID MIT 143 Assessment Quiz one Total marks (100%)


Unit Name NETWORKING I Date
Assessor Vijaykumar. R Time One hour

Student No / Name
Covering CLO

Course Learning Outcomes(CLO) Embedded Knowledge and Skills(EKS) Question’s


No
1.1. Explain how networks impact our daily lives
1. Explain the importance
1.2. Explain various types of networks and their The 25
and functionality of data
services multiple
networks and the
choice
Internet in supporting 1.3. List the key components of a data network
Questions
business 1.4. List and explain the characteristics of network covering
communications and architectures and services entire CLO
everyday activities
1.5. Describe and explain various network trends

Assessor Feedback /Comments

Student Agreement: I understand the feedback given to me and agree to carry out the actions in future
works as required and indicated.

Student Signature: Date:

Assessor Signature : Date:


Instructions:

 Answer the all questions.


 Select appropriate answer from given options.
 Multiple answers questions leads to minus marks when selection an inappropriate answer.
 Each questions carry four and equal marks

1. Which form of communication is a real-time, text-based communication type used between two or
more people who use mostly text to communicate?
A. Weblogs
B. Wikis
C. Instant messaging
D. Podcasting

2. Which type of network provides customers with limited access to corporate data such as inventory,
parts lists, and orders?
A. Intranet
B. Extranet
C. Internetwork
D. Internet

3. What prioritizes traffic and its characteristics to manage data?


A. Network administration
B. Network traffic
C. QoS strategy
D. Network evaluation

4. What network traffic processes must be in place for quality of service strategies to work correctly?
(Choose two.)
A. Traffic is classified based on quality of service requirements.
B. Priorities are assigned to each classification of application data.
C. Web traffic is always assigned to a high-priority queue for processing.
D. Digital movies are always assigned to the high-priority queue for processing.
E. E-mail traffic is always assigned to the low-priority queue.

5. What are two components of network architecture? (Choose two.)


A. People that comprise the human network
B. Built-in growth potential
C. Data transfer across the network
D. Redundant technologies
E. Corporations that operate and maintain the data network
6. For which three reasons were circuit-switched, connection-oriented technologies rejected when the
Internet was being developed? (Choose three.)

A. Circuit-switched technologies required that a single message be broken up into multiple


message blocks that contain addressing information.
B. Early circuit-switched networks did not automatically establish alternative circuits in the
event of circuit failure.
C. Circuit-switched technologies required that an open circuit between network endpoints be
established even if data was not being actively transferred between locations.
D. The quality and consistency of messages transmitted across a connection-oriented, circuit-
switched network cannot be guaranteed.
E. The establishment of simultaneous open circuits for fault tolerance is costly

7. For which three reasons was a packet-switched, connectionless data communications technology
used when developing the Internet? (Choose three.)
A. It can rapidly adapt to the loss of data transmission facilities.
B. It efficiently utilizes the network infrastructure to transfer data.
C. Data packets can travel multiple paths through the network simultaneously.
D. It allows billing of network use by the amount of time a connection is established.
E. It requires that a data circuit between the source and destination be established before data can
be transferred.

8. What is the role of QoS in a converged network?


A. Ensures that all traffic above available bandwidth levels is dropped
B. Establishes delivery priorities for different types of communication in a network
C. Determines precise priorities for all types of network communication
D. Allows unused bandwidth to be shared by other organizations within the network

9. Which term describes a common platform for diverse communication types?


A. Scalability
B. Convergence
C. Fault tolerance
D. Quality of service

10. Which of the following pertains to network infrastructure security?


A. A competitor accesses sensitive information through an unsecured wireless network.
B. Builders accidentally cut a network cable while digging.
C. A disgruntled employee alters information in a customer database.
D. A secretary sends confidential information in a reply to an e-mail that falsely appears to come
from her boss.
11. A worker is assigned to work on a project with another employee from a different city. During online
meetings, there are periods of sketchy video and garbled voice communications. Which combination
of the following conditions could cause this? (Choose two)
A. Poor scalability in network design
B. Poor security, allowing someone to download music and video files at work
C. Lack of redundant links to the firewall
D. Poor QoS

12. Which pair of terms describes a network communication in which a bank has 24-hour exclusive
access to an ATM? (Choose one.)
A. Connectionless and packet-switched
B. Packet-switched and connection-oriented
C. Circuit-switched and connection-oriented
D. Circuit-switched and connectionless

13. What is a group of web pages that groups of individuals can edit and view together called?
A. Podcasting
B. Wiki
C. Weblog (blog)
D. Instant messaging

14. Which of the following are disadvantages of peer-to-peer networking? (Choose two.)
A. Expensive to set up and maintain
B. No centralized administration
C. Complex configuration
D. Scalability

15. Which devices would be considered end devices on a network? (Choose four.)
A. Switch
B. Printer
C. IP phone
D. Server
E. Tablet computer
F. Wireless access point

16. What type of information would be found on a logical topology diagram?


A. Location of departmental printer
B. Length and type of all cable runs
C. IP addressing scheme
D. Location of departmental switch
17. What is a network infrastructure that provides access to other networks over a wide geographic
area?
A. LAN
B. WLAN
C. MAN
D. WAN
E. SAN

18. Which of the following are business-class Internet connection technologies normally supplied
by a service provider? (Choose two.)
A. Leased lines
B. Broadband cable
C. Metro Ethernet
D. Mobile services
E. Cellular

19. Which technology would be best to provide a home user with a high-speed, always-on Internet
connection?
A. Dialup
B. DSL
C. Satellite
D. Cellular

20. What is a converged network?


A. A network that makes use of both fiber-optic and copper connections
B. A network where voice, video, and data move over the same infrastructure
C. A network that makes use of both wired and wireless technology
D. A network that makes use of both satellite and terrestrial connections to move data

21. What is a fault-tolerant network?


A. A network that can provide priority treatment of voice and video traffic
B. A network that offers secure transactions
C. A network that can reroute traffic in case of device failure
D. A network that is incapable of failing

22. What is true of Tier 3 ISPs?


A. They act as local providers of service directly to end users.
B. They connect directly to Tier 1 ISPs.
C. They interconnect with other Tier 1 ISPs.
D. They provide high-speed redundant services to other ISPs.
23. Which type of traffic must receive the highest priority from QoS?
A. Web traffic
B. Email
C. VoIP
D. Order processing

24. What are the primary requirements of information security? (Choose three.)
A. Confidentiality
B. Integrity
C. Availability
D. QoS
E. Scalability

25. You need to provide network connectivity to 150 client computers that will reside in the same sub
network, and each client computer must be allocated dedicated bandwidth. Which device should
you use to accomplish the task?
A. Hub
B. Switch
C. Router
D. Bridge

You might also like