Network Architecture & Design
COMPLETE MIDTERM REVIEW
© 2024/2025
,1. Multiple Choice: Which protocol is used for securely entering a
remote computer over a network?
a) SSH
b) FTP
c) HTTP
d) SMTP
Correct Answer: a) SSH
2. Fill-in-the-Blank: The _______ model is a conceptual
framework used to understand network protocols and their
relationships.
Correct Answer: OSI
3. True/False: In a mesh topology, devices are connected with
many redundant interconnections between network nodes.
Correct Answer: True
4. Multiple Response: Which of the following are benefits of using
a virtual private network (VPN)?
a) Enhanced security
© 2024/2025
, b) Reduced costs
c) Scalability
d) Increased latency
Correct Answers: a) Enhanced security, b) Reduced costs, c)
Scalability
5. Multiple Choice: What is the primary purpose of the Border
Gateway Protocol (BGP)?
a) To route data within a single autonomous system
b) To provide email services
c) To route data between autonomous systems
d) To transfer files over a network
Correct Answer: c) To route data between autonomous systems
6. Fill-in-the-Blank: _______ is a network device that forwards data
packets between computer networks, creating an overlay network.
Correct Answer: Router
7. True/False: TCP/IP is a hierarchical protocol made up of
interactive modules, each of which provides specific functionality.
Correct Answer: True
© 2024/2025