
BYTEQUEST Round 2: "Vidya Vaibhav" - Networking Fundamentals
Presentation
•
Computers
•
University
•
Practice Problem
•
Hard
Martin Purification
Used 1+ times
FREE Resource
1 Slide • 20 Questions
1
It’s a typical Monday morning at NetComm, a major telecommunications company, and you, Alex, a seasoned network engineer, are sipping your first coffee of the day when the emergency alarm blares across the office. Your screen lights up with alerts—NetComm’s network is experiencing a massive outage, affecting millions of customers nationwide. The pressure is on as your team scrambles to diagnose the issue and restore connectivity.
2
Multiple Choice
Before wrapping up for the day, Sarah turns to you with one final question to test your knowledge.
Why is it important to regularly update and patch network systems?
To add new features
To improve network speed
To fix vulnerabilities and enhance security
To reduce bandwidth usage
3
Multiple Choice
You immediately head to the Network Operations Center (NOC), where your colleagues are already poring over system logs and network maps. The team lead, Sarah, turns to you and says, "Alex, we need to figure out which part of the network is down. Given the symptoms, which layer of the OSI model should we investigate first?
Which layer of the OSI model is most likely to be affected by a physical network outage?
Physical
Data Link
Transport
Application
4
Multiple Choice
As you delve into the investigation, you brainstorm with the team about what could have caused this outage. You consider various possibilities, from hardware issues to external events.
What are some common causes of network outages?
Hardware failures
Software bugs
Natural disasters
All of the above
5
Multiple Choice
The network map shows that the outage is localized to a specific area of the network. You notice that this part of the network uses a star topology, which sets off alarm bells in your head. "If the central hub fails, everything connected to it goes down too," you mutter.
Which network topology is most vulnerable to a single point of failure?
Bus
Star
Ring
Mesh
6
Multiple Choice
To avoid future outages of this magnitude, you suggest that the network design should incorporate redundancy. Sarah nods in agreement, "Redundancy could have saved us from this nightmare."
What is the significance of redundancy in network design?
Increases network performance
Improves network security
Reduces the impact of network failures
Simplifies network management
7
Multiple Choice
You start using various diagnostic tools to pinpoint the exact cause of the outage. One of the tools you deploy is a traceroute, hoping to identify where the network path is failing.
What is the purpose of a traceroute tool?
Identify the path packets take through a network
Measure network latency
Test network connectivity
Analyze network traffic
8
Multiple Choice
As you dig deeper, you realize that the root cause of the issue was a network engineer who had excessive access privileges and accidentally made a configuration change that took down the hub.
Which network security principle is violated when a user has excessive access privileges?
Patch management
Least privilege
Separation of duties
Defense in depth
9
Multiple Choice
With the root cause identified, you and your team work tirelessly to restore the network. As you implement the necessary changes, you review the basics to ensure everyone is on the same page:
A ___________ is a device that connects two or more networks and forwards packets based on their destination IP addresses.
Router
Switch
Firewall
Hub
10
Multiple Choice
The ____ protocol is used to resolve IP addresses to MAC addresses.
HTTP
DNS
DHCP
11
Multiple Choice
_________ is a technique used to hide malicious code within a seemingly harmless program.
Encryption
Phishing
Spoofing
12
Multiple Choice
A __________ is a network security rule that allows only specific traffic to enter or leave a network.
Firewall
Policy
Rule
Blacklist
13
Multiple Choice
_________ is the process of converting encrypted data back into its original form.
Encryption
Encoding
Decoding
14
Multiple Choice
A _________ is a network topology where all devices are connected to a central hub.
Star
Mesh
Bus
Ring
15
Multiple Choice
_________ is a network protocol used for reliable data transmission between two hosts.
UDP
ICMP
HTTP
16
Multiple Choice
________ is a type of network attack that aims to disrupt network services by overwhelming a system with traffic.
Man-in-the-Middle
Phishing
SQL Injection
17
Multiple Choice
_________ is a network address translation technique that allows multiple devices on a private network to share a single public IP address.
PAT
DNS
DHCP
18
Multiple Choice
________ is a network protocol used for sending and receiving email.
HTTP
FTP
SSH
19
Multiple Choice
Finally, as the network starts to stabilize, Sarah quizzes the team to ensure everyone’s up to speed.
Abbreviation Check:
DNS Stands for
20
Multiple Choice
A switch is a layer 2 device.
True
False
21
Multiple Choice
A VPN can be used to create a secure tunnel over the internet.
True
False
It’s a typical Monday morning at NetComm, a major telecommunications company, and you, Alex, a seasoned network engineer, are sipping your first coffee of the day when the emergency alarm blares across the office. Your screen lights up with alerts—NetComm’s network is experiencing a massive outage, affecting millions of customers nationwide. The pressure is on as your team scrambles to diagnose the issue and restore connectivity.
Show answer
Auto Play
Slide 1 / 21
SLIDE
Similar Resources on Wayground
15 questions
Sistemas Operativos
Presentation
•
University
15 questions
Adwent
Presentation
•
University
14 questions
La libertad 1. Qué es la Ilustración
Presentation
•
KG
14 questions
Traffic Signs
Presentation
•
KG
14 questions
Classifying Triangles
Presentation
•
10th Grade
16 questions
Php basic
Presentation
•
University
15 questions
Correo Electronico
Presentation
•
KG
17 questions
MICROSOFT POWERPOINT
Presentation
•
University
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade
Discover more resources for Computers
55 questions
Post Malone Addtion (Tres)
Quiz
•
12th Grade - University
20 questions
Disney Trivia
Quiz
•
University
50 questions
AP Biology Exam Review 2017
Quiz
•
11th Grade - University
24 questions
5th Grade Math EOG Review
Quiz
•
KG - University
12 questions
Star Wars Trivia - Easy
Quiz
•
KG - University
215 questions
8th Physical Science GA Milestones Review
Quiz
•
KG - University
40 questions
Famous Logos
Quiz
•
7th Grade - University
14 questions
(5-3) 710 Mean, Median, Mode & Range Quick Check
Quiz
•
6th Grade - University