1.
What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical.
Explanation
The correct answer is Physical. In the Open System Interconnect (OSI) model, the Physical layer is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. This layer deals with the physical transmission of data, such as the physical media used (e.g., copper wires, fiber optic cables) and the signaling methods employed. It ensures that the data is properly transmitted and received between devices in a network.
2.
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control.
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect Data Link Layers are divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for error control, flow control, and framing. It ensures reliable transmission of data across the physical link. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media, such as Ethernet. It manages the transmission of data packets and ensures that multiple devices can share the same physical media efficiently.
3.
At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link.
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) by examining the destination address in each packet and determining the appropriate port to forward it to. This layer also handles error detection and correction, ensuring the integrity of the data being transmitted.
4.
At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network.
Explanation
Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for logical addressing and routing of data packets between different networks. Routers use this layer to determine the best path for data packets to reach their destination by examining the destination IP address and making decisions based on routing tables.
5.
At what Open System Interconnect layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation.
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for the formatting and encryption of data before it is transmitted over the network. This layer ensures that the data is in a format that can be understood by the receiving device and also provides security measures such as encryption to protect the data during transmission. Therefore, it is at the Presentation layer where data compression and encryption schemes are commonly implemented.
6.
What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application.
Explanation
The Open System Interconnect (OSI) model consists of seven layers, with the Application layer being the closest to the end user. This layer is responsible for providing services to the user, such as email, web browsing, and file transfer. It interacts directly with the user and the software applications they are using. The Session, Presentation, and Transport layers are all lower layers in the OSI model and are responsible for functions such as data encryption, session management, and reliable data transfer.
7.
What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
Correct Answer
D. Protocol.
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. It ensures that devices can communicate effectively and understand each other's requests and responses. Specifications and standards can be part of a protocol, but the term "protocol" encompasses the entire set of rules and conventions. Etiquette, on the other hand, refers to social norms and manners and is unrelated to computer network communication.
8.
What topology defines the layout of a network’s devices and media?
Correct Answer
A. pHysical.
Explanation
The correct answer is "Physical" because the physical topology refers to the actual layout or arrangement of the devices and media in a network. It describes how the devices are physically connected to each other and the physical pathways that the data takes to travel between them. This includes the physical location of devices, the type of cables used, and the placement of network components such as switches and routers. The physical topology is important for understanding the physical connectivity and structure of a network.
9.
What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
Correct Answer
B. Logical.
Explanation
Logical topology defines the way in which devices communicate and data is transmitted throughout the network. It refers to the virtual connections between devices and the paths that data takes from one device to another. This includes the arrangement of devices, such as whether they are connected in a ring, bus, or mesh configuration, and the protocols used for data transmission. Unlike physical topology, which focuses on the physical layout of devices and cables, logical topology is concerned with the logical connections and paths that facilitate communication within the network.
10.
What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus.
Explanation
The correct answer is Bus. In a bus topology, devices are connected to a common cable called the bus. All devices share the same communication medium, and data is transmitted in both directions along the bus. This topology is relatively simple and cost-effective to implement, but it can be prone to collisions and network congestion.
11.
What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star.
Explanation
A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this configuration, all the data traffic flows through the central component, allowing for easier management and troubleshooting. Each computer has its own dedicated connection to the central component, which provides better performance and reliability compared to other topologies like bus or ring. The hybrid topology combines multiple topologies, so it is not the correct answer in this case.
12.
What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid.
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that the network can have a combination of bus, ring, star, or any other topologies depending on the requirements. The hybrid topology allows for flexibility and scalability, as it can be customized to meet specific needs. It also provides redundancy and fault tolerance, as multiple topologies can be used to ensure network availability.
13.
Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol.
Explanation
The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a widely used protocol suite that provides reliable and secure communication over networks. It is the foundation of the internet and has become the standard for data transmission in many organizations and industries.
14.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
Correct Answer
B. Address Resolution Protocol.
Explanation
The Address Resolution Protocol (ARP) is responsible for matching a known IP address for a destination device to a Media Access Control (MAC) address. When a device wants to send data to another device on the same network, it needs to know the MAC address of the destination device. ARP is used to resolve the IP address to the corresponding MAC address by broadcasting an ARP request and receiving an ARP reply from the device with the matching IP address. This allows the sender to correctly address the data packets to the destination device at the MAC layer.
15.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
Correct Answer
C. Reverse Address Resolution Protocol.
Explanation
Reverse Address Resolution Protocol (RARP) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to request its IP address from a RARP server using its MAC address as the identifier. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically. RARP works in the opposite direction of Address Resolution Protocol (ARP), which resolves IP addresses to MAC addresses.
16.
What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol.
Explanation
The correct answer is Internet Control Message Protocol. Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging between network devices. It is used to report errors and provide diagnostic information, making it useful for troubleshooting network issues. ICMP messages include error messages, echo requests and replies (ping), and route change notifications. By using ICMP, network administrators can identify and resolve network problems more efficiently.
17.
What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol.
Explanation
Transmission Control Protocol (TCP) is the correct answer because it is a transport layer protocol that provides reliable data delivery services. TCP ensures that data packets are delivered in the correct order and without errors by using mechanisms such as acknowledgment, retransmission, and flow control. It establishes a connection between the sender and receiver, allowing for reliable and ordered delivery of data. TCP is widely used in applications that require accurate and error-free transmission, such as web browsing, email, and file transfer.
18.
What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
Correct Answer
A. File Transfer Protocol.
Explanation
File Transfer Protocol (FTP) is the correct answer because it is specifically designed for transferring files over TCP/IP networks. FTP allows users to upload and download files between their local computer and a remote server. It provides a set of commands for navigating directories, transferring files, and managing file permissions. FTP operates on the application layer of the TCP/IP protocol suite and uses TCP as its transport protocol. Trivial File Transfer Protocol (TFTP) is a simpler version of FTP that lacks some advanced features. Simple Mail Transfer Protocol (SMTP) is used for sending emails, and HyperText Transfer Protocol (HTTP) is used for transferring web pages.
19.
What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network.
Explanation
A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike Local Area Networks (LANs) that connect devices within a limited area like a home or office, WANs provide connectivity over large distances. Virtual Private Networks (VPNs) are a type of network that uses encryption and tunneling protocols to create a secure connection over a public network, typically the internet. Metropolitan Area Networks (MANs) are networks that cover a larger area than a LAN but smaller than a WAN, typically within a city or metropolitan area.
20.
What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual Private Network.
Explanation
A Virtual Private Network (VPN) makes use of tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. This allows for secure and private communication between the systems, even though they may be located in different geographical locations. VPNs provide encryption and authentication mechanisms to ensure the confidentiality and integrity of the data being transmitted over the network.
21.
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080.
Explanation
Port 8080 is a common port that contains Hyper Text Transfer Protocol servers and proxies. While Port 80 is the standard port for HTTP, Port 8080 is often used as an alternative port for HTTP servers and proxies. It is commonly used for testing or running web servers on non-standard ports, allowing developers to run multiple web servers on the same machine. Port 110 is used for the POP3 email protocol, while Port 443 is used for secure HTTP (HTTPS) connections.
22.
How many bits are in an IPv4 address?
Correct Answer
B. 32 bits.
Explanation
An IPv4 address is a 32-bit address used to identify devices on a network. It consists of four sets of eight bits each, separated by periods. Each set can have a value ranging from 0 to 255. Therefore, the correct answer is 32 bits.
23.
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation.
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four parts, each representing an octet of the address. Each octet is separated by a dot, making it easier for users to read and understand the address. This format is widely used and familiar to most people, making it more convenient for users to work with IPv4 addresses.
24.
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A.
Explanation
An IPv4 address is divided into classes based on the range of values in the first octet. In this case, the range of 1-126 falls within the first class, known as Class A. Class A addresses are used for large networks as they provide a large number of host addresses.
25.
What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C.
Explanation
Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for a maximum of 254 usable host addresses. This makes it suitable for small to medium-sized networks that require around 250 nodes. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental purposes, and Class F addresses are reserved and not used in practice.
26.
What IPv4 class address is used for multicast addressing?
Correct Answer
B. Class D.
Explanation
Class D addresses are used for multicast addressing in IPv4. Multicast addressing allows a single packet to be sent to multiple hosts simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast groups. These addresses are used for applications such as video streaming, online gaming, and audio conferencing, where multiple recipients need to receive the same data simultaneously.
27.
What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1.
Explanation
The IPv4 reserved address used for loopback is 127.0.0.1. This address is reserved for testing and troubleshooting network connectivity on the local machine. When a packet is sent to this address, it is looped back and delivered to the same machine, allowing applications to communicate with themselves. This address is commonly referred to as the "localhost" address.
28.
What is a mechanism that allows a network device to divide an IP address into a network and host number?
Correct Answer
A. Subnet mask.
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address belongs to the network and which part belongs to the host. The subnet mask is a 32-bit number that consists of a series of ones followed by a series of zeros. By comparing the IP address with the subnet mask, the device can determine the network address and the host address.
29.
What is the default classful subnet mask on class B networks?
Correct Answer
C. 255.255.255.0.
Explanation
The default classful subnet mask for class B networks is 255.255.255.0. This mask allows for a maximum of 65,534 hosts on the network. Class B networks have a default address range of 128.0.0.0 to 191.255.255.255, with the first two octets representing the network portion and the last two octets representing the host portion. The subnet mask of 255.255.255.0 means that the first three octets are used for the network portion, allowing for 256 possible networks, and the last octet is used for the host portion, allowing for 256 possible hosts on each network.
30.
What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
B. Classless Inter-Domain Routing.
Explanation
Classless Inter-Domain Routing (CIDR) is a method that borrows bits from the host field of an IP address to create a subnet. This allows for more efficient allocation of IP addresses and more flexible network design compared to Classful Subnet Masking. Virtual Private Networking (VPN) and Virtual Local Area Networking (VLAN) are not directly related to borrowing bits from the host field of an IP address for subnet creation.
31.
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format.
Explanation
IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format uses groups of four hexadecimal digits separated by colons, making it easier for users to read and remember the addresses. This format also allows for shorter representation of addresses by omitting leading zeros in each group. Dotted decimal notation, hexadecimal, and octal are not used to express IPv6 addresses.
32.
What notation is expressed in leading zero compression for IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234.
Explanation
Leading zero compression is a notation used in IPv6 to simplify the representation of consecutive blocks of zeros. It allows for the omission of one or more consecutive blocks of zeros by replacing them with a double colon "::". In the given answer, 1234:1234:0:0:1234:0:0:1234, the consecutive blocks of zeros in the middle are compressed using leading zero compression (::), resulting in a more concise representation of the IPv6 address.
33.
What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678.
Explanation
The correct answer is 10AB::3:0:1234:5678. This is the correct notation for zero compression in IPv6. Zero compression allows consecutive groups of zeros to be replaced with a double colon (::). In this notation, the consecutive zeros between "3" and "1234" are compressed to "::".
34.
What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?
Correct Answer
B. Link-local.
Explanation
Link-local addresses are used for communication within a single network segment and do not require a router for traffic to be directed. These addresses are automatically assigned to interfaces and are not routable outside of the local network. Therefore, they operate within a network segment and do not originate from or be destined to an interface that requires a router. Site-local addresses, on the other hand, were deprecated in favor of unique local addresses (ULA) and are not used for communication within a network segment. Aggregatable local and aggregatable global addresses are not relevant to the given question.
35.
What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
Correct Answer
A. Site-local.
Explanation
Site-local unicast address scope is designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique or routable on the internet. Site-local addresses provide a way for devices within a site to communicate with each other without the need for global IP address assignments.
36.
What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global.
Explanation
Aggregatable Global is the correct answer because it refers to a Unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is broken up into different areas, allowing for hierarchical design and allocation. This means that the address can be divided into smaller subnets, making it easier to manage and allocate addresses in a large network.
37.
The computing part of the computer is the central processing unit, also called the
Correct Answer
C. Microprocessor.
Explanation
The correct answer is microprocessor. The microprocessor is the computing part of a computer that performs all the necessary calculations and operations. It is responsible for executing instructions, managing data, and controlling the overall functioning of the computer. The control unit, arithmetic logic unit, and minicomputer are all components or parts of a computer, but the microprocessor specifically refers to the central processing unit that carries out the actual computing tasks.
38.
What two main components make up the central processing unit?
Correct Answer
B. Control unit and arithmetic logic unit.
Explanation
The central processing unit (CPU) is composed of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for coordinating and controlling the operations of the CPU, while the ALU performs mathematical and logical operations. Together, these two components work together to execute instructions and perform calculations, making them the main components of the CPU.
39.
What is the type of memory that retains data after power is removed or lost?
Correct Answer
B. Nonvolatile.
Explanation
Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power supply to maintain data, nonvolatile memory is designed to preserve information even in the absence of power. This type of memory is commonly used in devices like hard drives, solid-state drives, and flash memory, where data needs to be stored for long periods without being lost.
40.
Which landline transmission medium is the primary carrier of voice communications?
Correct Answer
A. Twisted pair cable.
Explanation
Twisted pair cable is the primary carrier of voice communications because it is a reliable and cost-effective transmission medium. It consists of two insulated copper wires twisted together, which helps to reduce interference and crosstalk. Twisted pair cable is commonly used in telephone systems and provides good voice quality over short to medium distances. Fiber optic cable can also carry voice communications, but it is more commonly used for high-speed data transmission. Coaxial cable and twinax cable are typically used for transmitting video and data signals rather than voice communications.
41.
An optical communications system is comprised of a
Correct Answer
A. Transmitter, cable, and receiver.
Explanation
The correct answer is transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through a cable or optical fiber. The cable serves as the medium through which the optical signals travel. Finally, the receiver receives the optical signals and converts them back into electrical signals for further processing or use. The options including logic analyzer and protocol analyzer are not necessary components of an optical communications system.
42.
Which of the following is not one of the three advantages to using wireless technology?
Correct Answer
C. Safety.
Explanation
Wireless technology offers three advantages: ease of installation, lower cost, and mobility. However, safety is not listed as one of these advantages. This suggests that wireless technology may not necessarily provide any specific safety benefits compared to other forms of technology.
43.
The ability to move about without being tethered by wires in wireless technology is called
Correct Answer
A. Mobility.
Explanation
The correct answer is mobility. This is because wireless technology allows devices to move freely without being connected by wires, enabling mobility and flexibility in their usage.
44.
Which of the following is not one the four security threats to Wireless Local Area Network?
Correct Answer
B. Direct Connections.
Explanation
Direct Connections is not one of the four security threats to Wireless Local Area Network. The other three options, Rogue Access Points, War Drivers, and Hackers, are all commonly recognized as security threats to WLANs. Rogue Access Points refer to unauthorized access points that are set up by attackers to gain access to the network. War Drivers are individuals who drive around looking for vulnerable wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to a network to steal information or cause damage. However, Direct Connections does not fit into any of these categories and is therefore not considered a security threat to WLANs.
45.
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
Correct Answer
B. Employee.
Explanation
An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an insider, an employee has access to sensitive information and can exploit their privileges to compromise the network security. They may unintentionally fall victim to social engineering attacks or be coerced into providing access to unauthorized individuals. Alternatively, they may intentionally collaborate with external parties to breach the network for personal gain or malicious purposes. Therefore, it is crucial for organizations to implement proper security measures and educate employees about the risks associated with their actions.
46.
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks?
Correct Answer
A. Institute of Electrical Electronics Engineers.
Explanation
The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards include IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX). The IEEE is a professional association that focuses on advancing technology for the benefit of humanity, and their wireless standards have played a crucial role in shaping the wireless communication industry.
47.
How many peripherals can a Universal Serial Bus handle at once?
Correct Answer
A. 127.
Explanation
A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit address scheme, allowing for a maximum of 127 unique addresses to be assigned to connected devices. Each peripheral connected to the USB is assigned a unique address, and the USB controller can communicate with each device individually using these addresses. Therefore, the correct answer is 127.
48.
How many devices can connect to a FireWire bus?
Correct Answer
A. 63.
Explanation
A FireWire bus can support up to 63 devices. This is because the FireWire specification allows for a maximum of 63 devices to be connected to a single bus. Each device connected to the bus is assigned a unique ID, ranging from 0 to 62. Therefore, the correct answer is 63.
49.
What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
Correct Answer
B. Voltage.
Explanation
Voltage is applied across Liquid Crystal Display (LCD) material to change its alignment and light polarizing property. The application of voltage alters the orientation of liquid crystal molecules, which affects the alignment of the material and the polarization of light passing through it. By adjusting the voltage, the LCD can control the amount of light that is transmitted, resulting in the display of different colors and images. Current, resistance, and inductance do not directly impact the alignment and polarizing property of LCD material.
50.
What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Correct Answer
B. Bridge.
Explanation
A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates at the MAC address layer and forwards data packets between the two segments based on their MAC addresses. Unlike a hub, which simply broadcasts all received packets to all connected devices, a bridge selectively forwards packets only to the intended recipient, reducing network congestion and improving performance. A switch is similar to a bridge but operates at a higher speed and can connect multiple devices simultaneously. A router, on the other hand, operates at the Network layer and connects different networks together.