Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

ITN 101 MODULE 1 TEST QUESTIONS WITH ACCURATE SOLUTIONS, Exams of Computer Networks

ITN 101 MODULE 1 TEST QUESTIONS WITH ACCURATE SOLUTIONS

Typology: Exams

2024/2025

Available from 06/08/2025

BetaTutors
BetaTutors ๐Ÿ‡บ๐Ÿ‡ธ

4.5

(4)

1.5K documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
ITN 101 MODULE 1 TEST QUESTIONS WITH ACCURATE
SOLUTIONS
1) What is the logical group of Windows Servers controlling the network access to a
group of computers also known by? -- Answer โœ”โœ” Domain
2) Which of the following statements is true?
a. Physical topologies mostly refer to how software controls access to
network resources.
b. In a peer-to-peer network model, each computer controls its own
administration, resources, and security.
c. In a general scenario, if a network supports fewer than 15 computers, a
client-server network model is the way to go.
d. Logical topologies mostly refer to how computers work together with
radio signals and other devices to form the physical network. -- Answer
โœ”โœ” In a peer-to-peer network model, each computer controls its own
administration, resources, and security.
3) Which of the following is a centralized directory database that contains user account
information and security for the entire group of computers?
a. Active Directory
pf3
pf4
pf5
pf8

Partial preview of the text

Download ITN 101 MODULE 1 TEST QUESTIONS WITH ACCURATE SOLUTIONS and more Exams Computer Networks in PDF only on Docsity!

ITN 101 MODULE 1 TEST QUESTIONS WITH ACCURATE

SOLUTIONS

  1. What is the logical group of Windows Servers controlling the network access to a group of computers also known by? -- Answer โœ”โœ” Domain
  2. Which of the following statements is true? a. Physical topologies mostly refer to how software controls access to network resources. b. In a peer-to-peer network model, each computer controls its own administration, resources, and security. c. In a general scenario, if a network supports fewer than 15 computers, a client-server network model is the way to go. d. Logical topologies mostly refer to how computers work together with radio signals and other devices to form the physical network. -- Answer โœ”โœ” In a peer-to-peer network model, each computer controls its own administration, resources, and security.
  3. Which of the following is a centralized directory database that contains user account information and security for the entire group of computers? a. Active Directory

b. Clients c. Workgroups d. RAID -- Answer โœ”โœ” Active Directory

  1. Which of the following statements is applicable for a peer-to-peer network and not for a client-server network model? a. User accounts and passwords to the networks are all assigned in one place. b. They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce. c. Problems on the network can be monitored, diagnosed, and fixed from one location. d. Access to multiple shared resources can be centrally granted to a single user or a group of users. -- Answer โœ”โœ” They are simple to configure and for this reason, they may be used in environments in which time or technical expertise is scarce.
  2. Pisces Ltd. is a small logistics firm operating out of Los Angeles. The organization has a small array of seven computers for the functioning of its administration. They have requested a network engineer from Softnet Solutions to suggest why they should opt for a P2P network model instead of a client-server network model. In this scenario, which of the following statements would be the appropriate reason for Pisces Ltd. to opt for a peer-to-peer network model according to you? -- Answer โœ”โœ” A network operating system is much more expensive than a desktop operating system.
  3. You are a senior programmer for Google Solutions Ltd. and you have been tasked with ensuring that in a scenario where a hard disk fails, the servers must have a backup to fill it in automatically. Which of the following would you apply to solve this issue at hand? -- Answer โœ”โœ” RAID
  1. Harry, a supporting technician at Urban Solutions, is tasked with sending a technical requirement document using the email service to Hill Industries Ltd. However, he also must ensure that there are no trails left behind on the server. What should Harry do in such a situation? -- Answer โœ”โœ” He should use POP3 to deliver the message.
  2. The University of Kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. Which of the following network models would be best suited for such an institution? -- Answer โœ”โœ” CAN
  3. Jungle Travels Ltd. has established a consumer forum office in Minneapolis, which consists of five computers and a couple of printers and scanners, all of which are connected by a single hub. Which of the following network topologies would you have applied in such a scenario? -- Answer โœ”โœ” A star topology
  4. Which of the following terms is also referred to as a "network of networks"? -- Answer โœ”โœ” Backbone
  5. Which of the following network devices does not fall under the category of "end devices" as certified by CISCO? -- Answer โœ”โœ” Router
  6. Which of the following consists of high capacity data storage devices in a distinctly defined network segment? -- Answer โœ”โœ” SAN
  7. A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection

is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose. -- Answer โœ”โœ” A star topology

  1. Zero Travels, a transport company, has just set up two offices within a range of eight kilometers apart from each other for smoother transactions. Lee, a senior technician at Informatics Ltd., has been hired to set up a network connection between these two branches. Which of the following network models should Lee set up keeping in mind that budget is also a factor to be considered? -- Answer โœ”โœ” CAN
  2. Sundareshan has been working as a senior technician at Reifenhauser Corporation. The managing director has requested Sundareshan to establish a similar network connection at his personal property. Which of the following categories of routers should Sundareshan prefer in such a scenario? -- Answer โœ”โœ” A combo device
  3. Which of the following will guide an individual to properly handle substances such as chemical solvents and how to dispose of them? -- Answer โœ”โœ” SDS
  4. What should be the ideal procedure after implementing the solution to a network troubleshooting problem? -- Answer โœ”โœ” Verify functionality and implement preventive measures.
  5. What is a collection of accumulated insights and solutions to problems encountered in a particular network known as? -- Answer โœ”โœ” Knowledge base
  6. Which of the following is the third step in a network troubleshooting methodology? -- Answer โœ”โœ” Test your theory to determine the cause.
  1. What should you do once you have tested your theory to determine the cause of the problem at hand? a. Establish a plan for resolving the problem. b. Implement the solution or escalate the problem. c. Verify the functionality and implement preventive measures. d. Document findings, actions, and outcomes. -- Answer โœ”โœ” Before you implement a fix, one should consider the scope of your change and especially how it will affect users, their applications, and their data.
  2. JK Group of Industries is planning a complete revamp of the office infrastructure, and so it has hired Infrared Solutions to upgrade its network connections. It has also requested Infrared Solutions to ensure that this upgrade should not affect the day- to-day functionality within the office premises. Analyze what would be a proper option to carry out this upgrade. -- Answer โœ”โœ” Roll out changes in stages.
  3. What other technical name or PDU can be used to represent the session presentation and application layer? -- Answer โœ”โœ” L7PDU
  4. What is the data passed between utility programs or applications and the operating system known as? -- Answer โœ”โœ” Payload
  5. You are a network engineer at Star Fisheries Ltd., Chicago. They want you to send an encrypted email to their branch office at Michigan. In doing so, which of the OSI layers would you apply? -- Answer โœ”โœ” Presentation layer
  6. Kyle is a property consultant, and he has hired you as a programmer to make an application that sends data regarding property sites to his client's base. He has also asked you to ensure that the application should check whether the data has been

received and if not, it should resend the data. Which of the following protocols would you apply in such a scenario? -- Answer โœ”โœ” Transmission Control Protocol

  1. White Heavens Entertainment Ltd. has set up a new website for informing people in detail about events that are being planned across the city of Los Angeles. However, when a user tries to gain access to its website to purchase tickets, there seems to be an IP error as a result of which the site crashes. Analyze which of the layers of the OSI model must be checked to fix this error. -- Answer โœ”โœ” Network layer
  2. Xhang Pho, a senior network engineer, has been tasked with developing an application to channel live music festivals across the world with the help of the web. Given such a situation, which of the following protocols should he opt for? -- Answer โœ”โœ” UDP
  3. James, a supporting technician, is trying to resolve an issue pertaining to the router. On inspecting the issue, he figured that the router was unable to move packages from one node to another. As a resolution to this problem, he intends to follow the OSI model for troubleshooting. What layer of the OSI model should he inspect to understand the issue relating to the router? -- Answer โœ”โœ” The network layer