placeholder image to represent content

Networking Overview

Quiz by Candice Mallory

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
30 questions
Show answers
  • Q1

    You need to find out what kind of laws might apply to the design and operation of your network.Which type of document would you consult?

    Baseline

    Regulation

    Procedure

    Policy

    30s
  • Q2

    You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

    Resource allocation

    SLA

    Acceptable use

    Change management

    30s
  • Q3

    A code of ethics accomplishes all but which of the following?

    Clearly defines courses of action to take when a complex issue is encountered.

    Serves as a reference for the creation of acceptable use policies.

    Establishes a baseline for managing complex situations.

    Improves the professionalism of your organization as well as your profession.

    30s
  • Q4

    Which of the following defines an acceptable use agreement?

    An agreement that prohibits an employee from working for a competing organization for a specified time after the employee leaves the organization.

    An agreement that is a legal contract between the organization and the employee that specifies that the employee is not to disclose the organization's confidential information.

    An agreement that identifies the employee's rights to use company property, such as internet access and computer equipment, for personal use. 

    An agreement that outlines the organization's monitoring activities.

    30s
  • Q5

    What is the primary goal of business continuity planning?

    Minimizing decision-making during the development process

    Maintaining business operations with reduced or restricted infrastructure capabilities or resources.

    Minimizing the risk of delays and interruptions in services

    Protecting an organization from major computer services failure

    30s
  • Q6

    When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet.

    Which type of document would most likely have this information?

    Procedure

    Policy

    Writing schematic

    Network diagram

    30s
  • Q7

    Which of the following geographic network types is made up of an interconnection of LANs?

    Wireless Local Area Network (WLAN)

    Campus Area Network (CAN)

    Wide Area Network (WAN)

    Metropolitan Area Network (MAN)

    30s
  • Q8

    Which of the following geographic network types are typically managed by a city as a public utility?

    Local area network (LAN)

    Personal area network (PAN)

    Wide area network (WAN)

    Metropolitan area network (MAN)

    30s
  • Q9

    Convert the decimal value 72 into binary.

    01101000

    01001000

    0101000

    1000100

    30s
  • Q10

    What is the basic purpose of the OSI Physical layer?

    Defines basic physical structures, such as disks.

    Coordinates rules for transmitting bits.

    Coordinates rules for managing network servers.

    Coordinates rules for routing packets.

    30s
  • Q11

    In the OSI model, what is the primary function of the Network layer?

    Routes messages between networks

    Ensures that packets are delivered with no loss or duplication

    Allows applications to establish, use, and end a connection

    Transmits data frames

    30s
  • Q12

    What is the dotted decimal representation of an 18-bit netmask?

    255.255.255.0

    255.192.0.0

    255.0.0.0

    255.255.192.0

    45s
  • Q13

    What is the greatest threat to theft of data in most secure organizations?

    Malware

    Hacker intrusion

    USB devices

    Operator error

    45s
  • Q14

    An eight-port switch receives a frame on port number 1. The frame is addressed to an unknown device. What will the switch do?

    Send the frame out ports two through eight.

    Send the frame out all eight ports.

    Send the frame out the destination port.

    Drop the frame.

    30s
  • Q15

    Which of the following connectors is used with Ethernet 100BaseT networks?

    RJ45

    ST

    RJ11

    BNC

    30s

Teachers give this quiz to your class