ITN 263 QUIZ 3 NETWORKING & CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
Which network device concentrates communications signals, accepts only basic commands, and
provides statistics such as throughput measures and uptime percentages? - (ANSWER)Active hub
Which network device differentiates network traffic using Layer 2 of the OSI model? - (ANSWER)Switch
A first-year student in a computer networking class is studying different addressing types and
attempting to identify them. Which of the following does she determine is a Media Access Control
(MAC) address? - (ANSWER)00-14-22-01-23-45
Isaac is designing a network infrastructure as a class project. He determines that one device he requires
must have the capacity to act as a repeater, operate at the Data Link Layer of the OSI model, be able to
filter packets based on their MAC address, and allow communication between two local area networks
(LANs). Which device will fulfill these specifications? - (ANSWER)Bridge
A networking instructor is demonstrating the use of a device that, when making a connection to the
Internet, issues a series of alternating tones, and is used to translate the digital signals from computers
to the analog signals used on traditional telephone lines. Although the name is familiar to the students,
this particular device is no longer in common use. What is the instructor demonstrating? - (ANSWER)A
modem
Fatima has been hired as a contractor to decommission a network topology that has been employed by
a small company since the 1990s. In studying the project specifications, she reads that this physical
topology uses a special packet called tokens, and can be unidirectional or bidirectional. Although it has
fewer collisions than other types of networks, this topology is rarely seen in the twenty-first century.
Baffled as to what type of network this is, she goes on the Internet and researches the technology. What
sort of topology does she find? - (ANSWER)Ring
Logical topologies are primarily about: - (ANSWER)connections.
Norman is a network engineer. He is creating a series of logical networks based on different
departments for a new branch office. Although the physical locations of the computers for a particular
department may be in different areas or on different floors of the building, they have to operate as if
they are on a single physical network. Norman's solution involves putting the accounting, engineering,
and marketing computer nodes on different subnets. What sort of network topology does Norman
create? - (ANSWER)Virtual local area network (VLAN)
, ITN 263 QUIZ 3 NETWORKING & CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
Which form of addressing uses 32 bits and subnetting, but suffers from a lack of integrated security? -
(ANSWER)Internet Protocol version 4 (IPv4)
Tonya is a student. She is working through a network addressing scheme example for a class. She has
read that the 128-bit address 2001:0f58:0000:0000:0000:0000:1986:62af can be shortened but is trying
to understand how. What is the correct solution? - (ANSWER)2001:0f58::1986:62af
Mohammad is presenting IPv6 cryptographic security features to his networking class. A student asks
him to explain data origin authentication. How does he answer this question? - (ANSWER)It uses a
checksum that incorporates a shared encryption key so that the receiver can verify that the data was
actually sent by the apparent sender.
While there is no single rule as to the size of this network type, which network is usually made up of
fewer than 10 computers and rarely more than 20? - (ANSWER)Workgroup
Vivienne has been commissioned to design a workgroup network infrastructure for a small office that
includes five workstations, three laptops, and a printer. Given that some of the nodes are stationary and
others are mobile, what is the best solution for interconnectivity? - (ANSWER)Wireless access point
(WAP) and wired switch
Miles is an IT consultant. He is given the specifications of a networking project for the new campus of a
multinational corporation. Among the requirements, switches and wireless access points (WAPs) must
interconnect all nodes, the network must use hardware firewalls, and it must support single sign-on
(SSO). Which network infrastructure does he select that fulfills these requirements? -
(ANSWER)Client/server
The chief information officer (CIO) is negotiating lease prices with several telecommunications
providers. She wants a service that offers circuits that will link to various physical buildings and
branches, including a connection to the physical demarcation point. For what network infrastructure will
this service be used? - (ANSWER)Wide area network (WAN)
Samantha is a network engineer. She is writing a proposal to her company's chief information office
(CIO) about the deployment of a group of end-user nodes to replace the office's aging workstations. Her
solution is to use PCs with only display screens, keyboards, and mice, with all of the computing work and
storage hosted on servers. What is her solution? - (ANSWER)Thin client
Which network device concentrates communications signals, accepts only basic commands, and
provides statistics such as throughput measures and uptime percentages? - (ANSWER)Active hub
Which network device differentiates network traffic using Layer 2 of the OSI model? - (ANSWER)Switch
A first-year student in a computer networking class is studying different addressing types and
attempting to identify them. Which of the following does she determine is a Media Access Control
(MAC) address? - (ANSWER)00-14-22-01-23-45
Isaac is designing a network infrastructure as a class project. He determines that one device he requires
must have the capacity to act as a repeater, operate at the Data Link Layer of the OSI model, be able to
filter packets based on their MAC address, and allow communication between two local area networks
(LANs). Which device will fulfill these specifications? - (ANSWER)Bridge
A networking instructor is demonstrating the use of a device that, when making a connection to the
Internet, issues a series of alternating tones, and is used to translate the digital signals from computers
to the analog signals used on traditional telephone lines. Although the name is familiar to the students,
this particular device is no longer in common use. What is the instructor demonstrating? - (ANSWER)A
modem
Fatima has been hired as a contractor to decommission a network topology that has been employed by
a small company since the 1990s. In studying the project specifications, she reads that this physical
topology uses a special packet called tokens, and can be unidirectional or bidirectional. Although it has
fewer collisions than other types of networks, this topology is rarely seen in the twenty-first century.
Baffled as to what type of network this is, she goes on the Internet and researches the technology. What
sort of topology does she find? - (ANSWER)Ring
Logical topologies are primarily about: - (ANSWER)connections.
Norman is a network engineer. He is creating a series of logical networks based on different
departments for a new branch office. Although the physical locations of the computers for a particular
department may be in different areas or on different floors of the building, they have to operate as if
they are on a single physical network. Norman's solution involves putting the accounting, engineering,
and marketing computer nodes on different subnets. What sort of network topology does Norman
create? - (ANSWER)Virtual local area network (VLAN)
, ITN 263 QUIZ 3 NETWORKING & CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
Which form of addressing uses 32 bits and subnetting, but suffers from a lack of integrated security? -
(ANSWER)Internet Protocol version 4 (IPv4)
Tonya is a student. She is working through a network addressing scheme example for a class. She has
read that the 128-bit address 2001:0f58:0000:0000:0000:0000:1986:62af can be shortened but is trying
to understand how. What is the correct solution? - (ANSWER)2001:0f58::1986:62af
Mohammad is presenting IPv6 cryptographic security features to his networking class. A student asks
him to explain data origin authentication. How does he answer this question? - (ANSWER)It uses a
checksum that incorporates a shared encryption key so that the receiver can verify that the data was
actually sent by the apparent sender.
While there is no single rule as to the size of this network type, which network is usually made up of
fewer than 10 computers and rarely more than 20? - (ANSWER)Workgroup
Vivienne has been commissioned to design a workgroup network infrastructure for a small office that
includes five workstations, three laptops, and a printer. Given that some of the nodes are stationary and
others are mobile, what is the best solution for interconnectivity? - (ANSWER)Wireless access point
(WAP) and wired switch
Miles is an IT consultant. He is given the specifications of a networking project for the new campus of a
multinational corporation. Among the requirements, switches and wireless access points (WAPs) must
interconnect all nodes, the network must use hardware firewalls, and it must support single sign-on
(SSO). Which network infrastructure does he select that fulfills these requirements? -
(ANSWER)Client/server
The chief information officer (CIO) is negotiating lease prices with several telecommunications
providers. She wants a service that offers circuits that will link to various physical buildings and
branches, including a connection to the physical demarcation point. For what network infrastructure will
this service be used? - (ANSWER)Wide area network (WAN)
Samantha is a network engineer. She is writing a proposal to her company's chief information office
(CIO) about the deployment of a group of end-user nodes to replace the office's aging workstations. Her
solution is to use PCs with only display screens, keyboards, and mice, with all of the computing work and
storage hosted on servers. What is her solution? - (ANSWER)Thin client