Search Header Logo
BYTEQUEST Round 2: "Vidya Vaibhav" - Networking Fundamentals

BYTEQUEST Round 2: "Vidya Vaibhav" - Networking Fundamentals

Assessment

Presentation

Computers

University

Practice Problem

Hard

Created by

Martin Purification

Used 1+ times

FREE Resource

1 Slide • 20 Questions

1

It’s a typical Monday morning at NetComm, a major telecommunications company, and you, Alex, a seasoned network engineer, are sipping your first coffee of the day when the emergency alarm blares across the office. Your screen lights up with alerts—NetComm’s network is experiencing a massive outage, affecting millions of customers nationwide. The pressure is on as your team scrambles to diagnose the issue and restore connectivity.

2

Multiple Choice

Before wrapping up for the day, Sarah turns to you with one final question to test your knowledge.

Why is it important to regularly update and patch network systems?

1

To add new features

2

To improve network speed

3

To fix vulnerabilities and enhance security

4

To reduce bandwidth usage

3

Multiple Choice

You immediately head to the Network Operations Center (NOC), where your colleagues are already poring over system logs and network maps. The team lead, Sarah, turns to you and says, "Alex, we need to figure out which part of the network is down. Given the symptoms, which layer of the OSI model should we investigate first?

Which layer of the OSI model is most likely to be affected by a physical network outage?

1

Physical

2

Data Link

3

Transport

4

Application

4

Multiple Choice

As you delve into the investigation, you brainstorm with the team about what could have caused this outage. You consider various possibilities, from hardware issues to external events.

What are some common causes of network outages?

1

Hardware failures

2

Software bugs

3

Natural disasters

4

All of the above

5

Multiple Choice

The network map shows that the outage is localized to a specific area of the network. You notice that this part of the network uses a star topology, which sets off alarm bells in your head. "If the central hub fails, everything connected to it goes down too," you mutter.

Which network topology is most vulnerable to a single point of failure?

1

Bus

2

Star

3

Ring

4

Mesh

6

Multiple Choice

To avoid future outages of this magnitude, you suggest that the network design should incorporate redundancy. Sarah nods in agreement, "Redundancy could have saved us from this nightmare."

What is the significance of redundancy in network design?

1

Increases network performance

2

Improves network security

3

Reduces the impact of network failures

4

Simplifies network management

7

Multiple Choice

You start using various diagnostic tools to pinpoint the exact cause of the outage. One of the tools you deploy is a traceroute, hoping to identify where the network path is failing.

What is the purpose of a traceroute tool?

1

Identify the path packets take through a network

2

Measure network latency

3

Test network connectivity

4

Analyze network traffic

8

Multiple Choice

As you dig deeper, you realize that the root cause of the issue was a network engineer who had excessive access privileges and accidentally made a configuration change that took down the hub.

Which network security principle is violated when a user has excessive access privileges?

1

Patch management

2

Least privilege

3

Separation of duties

4

Defense in depth

9

Multiple Choice

With the root cause identified, you and your team work tirelessly to restore the network. As you implement the necessary changes, you review the basics to ensure everyone is on the same page:

A ___________ is a device that connects two or more networks and forwards packets based on their destination IP addresses.

1

Router

2

Switch

3

Firewall

4

Hub

10

Multiple Choice

The ____ protocol is used to resolve IP addresses to MAC addresses.

1
ARP
2

HTTP

3

DNS

4

DHCP

11

Multiple Choice

_________ is a technique used to hide malicious code within a seemingly harmless program.

1
Malware
2

Encryption

3

Phishing

4

Spoofing

12

Multiple Choice

A __________ is a network security rule that allows only specific traffic to enter or leave a network.

1

Firewall

2

Policy

3

Rule

4

Blacklist

13

Multiple Choice

_________ is the process of converting encrypted data back into its original form.

1
Decryption
2

Encryption

3

Encoding

4

Decoding

14

Multiple Choice

A _________ is a network topology where all devices are connected to a central hub.

1

Star

2

Mesh

3

Bus

4

Ring

15

Multiple Choice

_________ is a network protocol used for reliable data transmission between two hosts.

1
TCP
2

UDP

3

ICMP

4

HTTP

16

Multiple Choice

________ is a type of network attack that aims to disrupt network services by overwhelming a system with traffic.

1
DoS
2

Man-in-the-Middle

3

Phishing

4

SQL Injection

17

Multiple Choice

_________ is a network address translation technique that allows multiple devices on a private network to share a single public IP address.

1
NAT
2

PAT

3

DNS

4

DHCP

18

Multiple Choice

________ is a network protocol used for sending and receiving email.

1
SMTP
2

HTTP

3

FTP

4

SSH

19

Multiple Choice

Finally, as the network starts to stabilize, Sarah quizzes the team to ensure everyone’s up to speed.

Abbreviation Check:

DNS Stands for

1
Domain Name Service
2
Dynamic Network Service
3
Data Network System
4
Domain Name System

20

Multiple Choice

A switch is a layer 2 device.

1

True

2

False

21

Multiple Choice

A VPN can be used to create a secure tunnel over the internet.

1

True

2

False

It’s a typical Monday morning at NetComm, a major telecommunications company, and you, Alex, a seasoned network engineer, are sipping your first coffee of the day when the emergency alarm blares across the office. Your screen lights up with alerts—NetComm’s network is experiencing a massive outage, affecting millions of customers nationwide. The pressure is on as your team scrambles to diagnose the issue and restore connectivity.

Show answer

Auto Play

Slide 1 / 21

SLIDE