0% found this document useful (0 votes)
6 views17 pages

Enterprise Networking MCQ PDF

The Enterprise Networking MCQ PDF provides a comprehensive overview of principles, architectures, and technologies for designing and managing large-scale organizational networks. It includes 15 chapters with 1182 verified questions and flashcards covering topics such as network topologies, routing protocols, security, and wireless networking. The resource is designed to prepare students for real-world IT challenges through practical labs and case studies.

Uploaded by

5yxouscqd5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views17 pages

Enterprise Networking MCQ PDF

The Enterprise Networking MCQ PDF provides a comprehensive overview of principles, architectures, and technologies for designing and managing large-scale organizational networks. It includes 15 chapters with 1182 verified questions and flashcards covering topics such as network topologies, routing protocols, security, and wireless networking. The resource is designed to prepare students for real-world IT challenges through practical labs and case studies.

Uploaded by

5yxouscqd5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Enterprise Networking MCQ PDF

https://quizplus.com/study-set/1451
15 Chapters
1182 Verified Questions
Enterprise Networking
MCQ PDF
Cou
Enterprise Networking explores the principles, architectures, and technologies used to

design, implement, and manage large-scale organizational networks. The course covers

key topics such as network topologies, routing and switching protocols, network security,

wireless networking, and virtualization. Students learn how to plan and deploy scalable,

reliable, and secure network infrastructures that support business operations and

services. Practical labs and case studies are included to give hands-on experience with

enterprise-grade networking hardware and software, preparing students to address

real-world challenges in corporate IT environments.

Recommended Textbook
Business Data Networks and Security 9th Edition by Raymond R. Panko

Available Study Resources on Quizplus


15 Chapters
1182 Verified Questions
1182 Flashcards
Source URL: https://quizplus.com/study-set/1451

Page 2
Chapter 1: Welcome to the Cloud
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/28793

Sample Questions
Q1) Spelling internet with a lowercase i indicates that you are talking about the global
internet.
A)True
B)False
Answer: False

Q2) Your ISP gives your home a single IP address.What in the access router allows you to
have multiple devices share a single IP address?
A)DNS
B)NAT
C)multiplexing
D)none of the above
Answer: B

Q3) Social media applications facilitate the creation of group relationships.


A)True
B)False
Answer: True

Q4) A switch knows a packet's entire path through a switched network.


A)True
B)False
Answer: False

To view all questions and flashcards with Page 3 click on the resource link above.
answers,
Chapter 2: Network Standards
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/28800

Sample Questions
Q1) Nearly all application standards are simple like HTTP.
A)True
B)False
Answer: False

Q2) In HTTP,a server may initiate an interaction with the client.


A)True
B)False
Answer: False

Q3) ________ is placing a message in the data field of another message.


A)Nesting
B)Vertical communication
C)Layering
D)Encapsulation
Answer: D

Q4) Ethernet does ________.


A)error detection
B)error correction
C)both A and B
D)neither A nor B
Answer: A

To view all questions and flashcards with Page 4 click on the resource link above.
answers,
Chapter 3: Network Security
Available Study Resources on Quizplus for this Chatper
152 Verified Questions
152 Flashcards
Source URL: https://quizplus.com/quiz/28801

Sample Questions
Q1) A specific encryption method is called a ________.
A)code
B)schema
C)key method
D)cipher
Answer: D

Q2) What type of attacker can do the most damage?


A)criminal attackers
B)hackers driven by curiosity
C)employees and ex-employees
D)national governments
Answer: D

Q3) Scripts normally are bad.


A)True
B)False
Answer: False

Q4) An attack that occurs before a patch is available is called a zero-day attack.
A)True
B)False
Answer: True

To view all questions and flashcards with Page 5 click on the resource link above.
answers,
Chapter 4: Network Management
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/28802

Sample Questions
Q1) In the ________ topology,there are many possible paths between two end nodes.
A)mesh
B)hierarchial
C)both A and B
D)neither A nor B

Q2) If a carrier does not meet its SLA guarantees,it generally must pay a penalty to its
customers.
A)True
B)False

Q3) Priority restricts traffic entering the network at access points.


A)True
B)False

Q4) The Public Switched Telephone Network is designed to be available 99.999% of the
time.
A)True
B)False

Q5) Overprovisioning is adding much more switching and transmission line capacity
than will be needed most of the time.
A)True
B)False
Page 6
To view all questions and flashcards with answers, click on the resource link above.
Chapter 5: Wired Ethernet Lans
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/28803

Sample Questions
Q1) A purpose of the LLC subheader is to describe the type of packet contained in the
data field.
A)True
B)False

Q2) Carrier fiber can carry signals farther than LAN fiber.
A)True
B)False

Q3) Light will travel farther in 50 micron fiber than in 62.5 micron fiber.
A)True
B)False

Q4) Cat 5e and Cat 6 wiring can carry Ethernet traffic 100 meters up to ________.
A)10 Mbps
B)100 Mbps
C)1 Gbps
D)10 Gbps

Q5) The general name for a company that is given rights of way to lay wires through
public areas is carrier.
A)True
B)False

To view all questions and flashcards with Page


answers,
7 click on the resource link above.
Chapter 6: Wireless Lans I
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/28804

Sample Questions
Q1) Wireless radio transmission usually is expressed in terms of ________.
A)wavelength
B)frequency
C)both A and B
D)neither A nor B

Q2) The frequency spectrum extends ________.


A)into the gigahertz range
B)into the visible light range
C)into the ultraviolet range
D)to infinity

Q3) Attenuation increases with distance faster with ________.


A)UTP transmission
B)radio transmission
C)both A and B about equally

Q4) A single access point and the set of hosts it serves is called a(n)________.
A)BSS
B)BSSID
C)ESS
D)none of the above

To view all questions and flashcards with answers, click on the resource link above.
Page 8
Chapter 7: Wireless Lans 2
Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/28805

Sample Questions
Q1) An 8/1 decrease in power corresponds to approximately ________ decibels.
A)3
B)6
C)9
D)none of the above

Q2) Which of the following can be used to centrally manage remote access points?
A)smart access points
B)WLAN switches
C)both A and B
D)neither A nor B

Q3) A central authentication server is used in 802.11i PSK mode.


A)True
B)False

Q4) Breaking into WLANs is ________.


A)drive-by hacking
B)war driving

Q5) WEP is so strong that it cannot be cracked with readily available software.
A)True
B)False

To view all questions and flashcards with Page


answers,
9 click on the resource link above.
Chapter 8: Tcpip Internetworking I
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/28806

Sample Questions
Q1) Converting networks to support IPv6 is relatively simple and inexpensive.
A)True
B)False

Q2) In IPv6,routers usually only have to consider the hop-by-hop options extension
header.
A)True
B)False

Q3) The main version of Internet Protocol in use today is IP version ________.
A)1
B)4
C)5
D)6

Q4) For human reading,in IPv6 addresses,letters should be written in ________.


A)uppercase
B)lowercase
C)both A and B
D)neither A nor B

Q5) TCP is reliable.


A)True
B)False
Page 10
To view all questions and flashcards with answers, click on the resource link above.
Chapter 9: Tcpip Internetworking 2
Available Study Resources on Quizplus for this Chatper
104 Verified Questions
104 Flashcards
Source URL: https://quizplus.com/quiz/28807

Sample Questions
Q1) ".com" is a ________.
A)root domain
B)top-level domain
C)second-level domain
D)none of the above

Q2) IPsec operates at the data link layer.


A)True
B)False

Q3) In IP subnet planning,you need to have at least 130 subnets.How large should your
subnet part be?
A)6
B)7
C)8
D)none of the above

Q4) IPsec protects ________ layer messages.


A)data link
B)application
C)both A and B
D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above.
Page 11
Chapter 10: Wide Area Networks
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/28794

Sample Questions
Q1) By regulation,cellular systems must give almost the same throughput at different
places in their service areas.
A)True
B)False

Q2) E1 leased lines run at a speed of about ________.


A)250 kbps
B)2 Mbps
C)34 Mbps
D)45 Mbps

Q3) UTP transmission in WANs is normally limited to about 100 meters.


A)True
B)False

Q4) Which of the following go from one customer site to another customer site?
A)leased lines
B)access lines
C)both A and B

Q5) If I use Channel3 in a cell,I can reuse that same channel in an adjacent cell with
traditional cellular technology.
A)True
B)False
Page 12
To view all questions and flashcards with answers, click on the resource link above.
Chapter 11: Networked Applications
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/28795

Sample Questions
Q1) RTP supports ________.
A)faster transmission speed
B)jitter control
C)both A and B
D)neither A nor B

Q2) When deciding whether to use cloud computing,a company must consider security
risk.
A)True
B)False

Q3) In SOA,calls are placed to ________.


A)programs
B)subprograms
C)subroutines
D)service objects

Q4) How many HTTP request-response cycles are needed to transfer a webpage
containing three graphics images?
A)1
B)2
C)3
D)none of the above

To view all questions and flashcards withPage 13 click on the resource link above.
answers,
Chapter 12: Module a More on Tcp
Available Study Resources on Quizplus for this Chatper
4 Verified Questions
4 Flashcards
Source URL: https://quizplus.com/quiz/28796

Sample Questions
Q1) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does
the receiving host put in the acknowledgment number field of the TCP segment that
acknowledges this TCP segment?
A)8,658
B)8,659
C)12,783
D)12,784

Q2) Flow control in TCP depends on the ________ field.


A)acknowledgement number
B)window size
C)both A and B
D)neither A nor B

Q3) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number
does the sending host put in the sequence number field?
A)8,658
B)8,659
C)12,783
D)12,784

To view all questions and flashcards with answers, click on the resource link above.

Page 14
Chapter 13: Module B More on Modulation
Available Study Resources on Quizplus for this Chatper
12 Verified Questions
12 Flashcards
Source URL: https://quizplus.com/quiz/28797

Sample Questions
Q1) QPSK sends ________ bit(s)per clock cycle.
A)1
B)2
C)4
D)16

Q2) Frequency modulation uses two loudness levels.


A)True
B)False

Q3) QPSK modulation uses ________ phases.


A)2
B)4
C)8
D)15

Q4) Amplitude modulation uses two ________ levels.


A)loudness
B)frequency
C)both A and B

To view all questions and flashcards with answers, click on the resource link above.

Page 15
Chapter 14: Module C More on Telecommunications
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/28798

Sample Questions
Q1) In TDM,there are more frames than slots.
A)True
B)False

Q2) In the United States,IXCs provide telephone transmission service ________.


A)within a LATA
B)between LATs
C)between the United States and another country
D)all of the above

Q3) Which of the following is packet-switched?


A)ATM
B)TDM
C)both A and B
D)neither A nor B

Q4) Which of the following regulates intrastate telephony in the United States?
A)the FCC
B)PUCs
C)neither A nor B

Q5) ATM provides quality-of-service for voice.


A)True
B)False
Page 16
To view all questions and flashcards with answers, click on the resource link above.
Chapter 15: Module D Directory Servers
Available Study Resources on Quizplus for this Chatper
11 Verified Questions
11 Flashcards
Source URL: https://quizplus.com/quiz/28799

Sample Questions
Q1) If a company has multiple authentication servers,which devices are likely to hold the
authentication data?
A)authenticators
B)authentication servers individually
C)authentication servers doing replication
D)directory servers

Q2) An AD domain ________.


A)has only a single domain controller
B)makes all servers domain controllers
C)must have its servers organized as a tree
D)none of the above

Q3) Which of the following is used to query a directory server to get someone's e-mail
address?
A)LDAP
B)IMAP
C)SNMP
D)HTTP

Q4) A company may have many AD domains.


A)True
B)False

To view all questions and flashcards withPage 17 click on the resource link above.
answers,

You might also like