1.
Which of the following cable types are most commonly used for medium-sized LANs?
Correct Answer
B. Unshielded Twisted Pair (UTP)
Explanation
Unshielded Twisted Pair (UTP) is the most commonly used cable type for medium-sized LANs. UTP cables are cost-effective and easy to install, making them a popular choice in networking. They consist of twisted pairs of copper wires, which help to reduce electromagnetic interference. UTP cables are capable of transmitting data at high speeds and can support various network protocols. They are widely used in Ethernet networks and are compatible with most networking devices. Shielded Twisted Pair (STP) cables, British Naval Connector (BNC), and Attachment User Interface (AUI) are not as commonly used for medium-sized LANs as UTP cables.
2.
In which network topology do all devices connect to a central hub?
Correct Answer
B. Star
Explanation
In a star network topology, all devices are connected to a central hub, which acts as a central point of communication. This hub manages and controls the flow of data between the devices connected to it. Each device has a separate connection to the hub, allowing for efficient communication and easy troubleshooting. This topology is commonly used in Ethernet networks and provides better performance and reliability compared to other topologies like bus or ring.
3.
In which network topology are all devices connected with many redundant interconnections between them?
Correct Answer
D. Mesh
Explanation
A mesh network topology is characterized by having all devices connected with many redundant interconnections between them. This means that each device has multiple connections to other devices, creating a highly redundant and fault-tolerant network. In a mesh network, if one connection fails, there are alternative paths available to ensure continuous connectivity. This type of topology is commonly used in large-scale networks where reliability and fault tolerance are crucial, such as in telecommunications or military applications.
4.
How many layers are in the Open System Interconnection (OSI) model?
Correct Answer
C. 7
Explanation
The Open System Interconnection (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. Each layer has a specific role and interacts with the layers above and below it. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Therefore, the correct answer is 7.
5.
What network component allows a computer to transmit data over a standard telephone line?
Correct Answer
A. Modem
Explanation
A modem is a network component that allows a computer to transmit data over a standard telephone line. It converts digital signals from the computer into analog signals that can be transmitted over the telephone line, and vice versa. This enables the computer to communicate with other devices or access the internet using a dial-up connection. A router, gateway, or bridge are not specifically designed for transmitting data over telephone lines, making modem the correct answer.
6.
Which of the following are TRUE about MAC addresses? (Select all that apply)
Correct Answer(s)
C. Each device on a network must have different MAC addresses
D. MAC addresses are 12-digit hexadecimal numbers
7.
Which network protocol is the standard for sending data over networks?
Correct Answer
B. TCP/IP
Explanation
TCP/IP is the standard network protocol for sending data over networks. It stands for Transmission Control Protocol/Internet Protocol and is the foundation of the internet. TCP/IP provides a set of rules for how data is transmitted, routed, and received between devices on a network. It is widely used and supported by various operating systems and network devices, making it the de facto standard for network communication. Other protocols like NetBEUI, IPX/SPX, and NetBIOS were used in the past but have been largely replaced by TCP/IP.
8.
Which Bluetooth Class is the most common?
Correct Answer
B. Class 2
Explanation
Class 2 is the most common Bluetooth class because it offers a good balance between range and power consumption. Class 1 has the longest range but consumes more power, making it less common. Class 3 has a shorter range and is primarily used for short-range communication within a room. Class 4 is not a standard Bluetooth class, so it is not commonly used.
9.
How many simultaneous connections to 1 device does Bluetooth support?
Correct Answer
C. 7
Explanation
Bluetooth supports up to 7 simultaneous connections to 1 device. This means that up to 7 different devices can be connected to a single Bluetooth device at the same time.
10.
Which of the following are disadvantages of Infrared? (Select all that apply)
Correct Answer(s)
B. Both devices must be within very close proximity
D. Both devices must have a clear line of sight
Explanation
Infrared technology has the disadvantage that both devices must be within very close proximity. This means that the devices need to be in close physical proximity to establish a connection and transfer data. Additionally, both devices must have a clear line of sight, meaning that there should be no obstructions between them for the infrared signals to transmit effectively. These limitations restrict the range and flexibility of infrared technology compared to other wireless data transfer methods.
11.
Which of the following were made to replace current telephone networks which require digital-to-analog conversions?
Correct Answer
C. ISDN
Explanation
ISDN (Integrated Services Digital Network) was developed to replace current telephone networks that required digital-to-analog conversions. It is a set of communication standards that allows digital transmission of voice, video, and data over traditional copper telephone lines. Unlike traditional analog networks, ISDN enables direct digital communication without the need for conversion, resulting in improved call quality and faster data transmission speeds. Therefore, ISDN is the correct answer as it was specifically designed to replace networks that required digital-to-analog conversions.
12.
Which of the following correctly compares 802.11b to 802.11a? (Select all that apply)
Correct Answer(s)
A. 802.11b is more vulnerable to other appliances operating on the same frequency, whereas 802.11a is not.
B. 802.11b has better signal range and isn't easily obstructed, whereas 802.11a has shorter range and is easily obstructed.
C. 802.11b is less expensive than 802.11a
D. 802.11b operates at 2.4Ghz and 802.11a operates at 5Ghz.
Explanation
The correct answer is that 802.11b is more vulnerable to other appliances operating on the same frequency, whereas 802.11a is not. Additionally, 802.11b has a better signal range and is not easily obstructed, while 802.11a has a shorter range and is easily obstructed. Furthermore, 802.11b is less expensive than 802.11a, and 802.11b operates at 2.4Ghz while 802.11a operates at 5Ghz.
13.
Which of the following translates host names to TCP/IP addresses?
Correct Answer
B. DNS
Explanation
DNS (Domain Name System) translates host names to TCP/IP addresses. It is a system that converts human-readable domain names (such as www.example.com) into IP addresses (such as 192.0.2.1) that computers can understand. DNS plays a crucial role in the functioning of the internet, allowing users to access websites and other online services by simply typing in a domain name. It acts as a directory that matches domain names to their corresponding IP addresses, enabling communication between devices on the internet.
14.
Twisted Pair cable uses what kind of connector?
Correct Answer
B. RJ-45
Explanation
Twisted Pair cable uses RJ-45 connectors. RJ-45 connectors are commonly used for Ethernet connections and are designed specifically for twisted pair cables. They have eight pins and are used to connect computers, routers, switches, and other network devices. The RJ-45 connector provides a secure and reliable connection for transmitting data over twisted pair cables.
15.
Which of the following protocols is primarily used for secure communication over a network by providing encryption and authentication between client and server?
Correct Answer
C. HTTPS
Explanation
HTTPS (Hypertext Transfer Protocol Secure) is designed to provide secure communication over a network by incorporating encryption and authentication mechanisms. It uses SSL/TLS protocols to encrypt data exchanged between a client and a server, ensuring privacy and security. FTP (File Transfer Protocol), SNMP (Simple Network Management Protocol), and DHCP (Dynamic Host Configuration Protocol) do not inherently provide encryption or secure communication.