1.
What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical.
Explanation
The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data over the network, including the physical media, connectors, and signaling. It ensures that the data is transmitted reliably and accurately between devices.
2.
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for managing the flow of data between devices and providing error control. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media and handling the transmission of data frames. These two sublayers work together to ensure reliable and efficient communication between devices in a network.
3.
At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link.
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address in the data frames and make forwarding decisions based on this information. Therefore, the correct answer is Data Link.
4.
At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network.
Explanation
Routers operate at the network layer of the Open System Interconnect (OSI) model. The network layer is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer protocols such as IP (Internet Protocol) and ICMP (Internet Control Message Protocol). Routers play a crucial role in connecting multiple networks together and ensuring efficient data transmission across the internet.
5.
At what Open System Interconnect layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation.
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting, encrypting, and compressing data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving system. By using compression, the size of the data is reduced, optimizing network bandwidth. Encryption ensures the security and confidentiality of the data during transmission. Therefore, the correct answer is Presentation.
6.
What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application.
Explanation
The Open System Interconnect (OSI) model is a conceptual framework that describes how network protocols interact and communicate with each other. It consists of seven layers, with the Application layer being the closest to the end user. The Application layer provides services directly to the user, such as web browsing, email, and file transfer. It interacts with the user and initiates communication with the lower layers of the OSI model to transmit and receive data over the network. Therefore, the Application layer is the correct answer as it is the layer closest to the end user.
7.
What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
Correct Answer
D. Protocol.
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It ensures that data is transmitted and received correctly, and defines the format, timing, sequencing, and error control of the communication. A protocol acts as a common language that allows different devices and systems to communicate effectively and efficiently.
8.
What topology defines the layout of a network’s devices and media?
Correct Answer
A. pHysical.
Explanation
The correct answer is physical because the physical topology refers to the actual layout of the devices and media in a network. It describes how the devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the type of cables used, and the location of network components. On the other hand, logical topology refers to how data flows within the network, independent of the physical layout.
9.
What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
Correct Answer
B. Logical.
Explanation
Logical topology refers to the way in which devices are connected and communicate with each other in a network, regardless of their physical location. It defines the pathways that data takes as it is transmitted between devices. Unlike physical topology, which focuses on the actual physical connections between devices, logical topology is concerned with the logical relationships between devices. It determines how data is transmitted, routed, and controlled within the network, allowing for efficient communication and data transfer.
10.
What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus
Explanation
Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable, known as the bus. Each device on the network can transmit data onto the bus, and all other devices on the network can receive that data. It is a simple and cost-effective topology, but it has the disadvantage of being susceptible to a single point of failure, as if the main cable is damaged, the entire network may go down.
11.
What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star.
Explanation
A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this configuration, all communication between computers passes through the central component, making it easier to manage and troubleshoot the network. Each computer has its own dedicated connection to the central component, which improves performance and allows for easier expansion of the network.
12.
What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that it can have different sections of the network using different topologies such as bus, ring, or star. This allows for greater flexibility and scalability in the network design, as different sections can be configured to meet specific requirements or preferences.
13.
Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol
Explanation
The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of rules and protocols that allows for reliable and secure communication between devices on a network. It is widely used in the internet and is known for its robustness and scalability. The decision to adopt TCP/IP as the standard protocol by the Department of Defense highlights its effectiveness and widespread acceptance in the field of networking.
14.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
Correct Answer
B. Address Resolution Protocol
Explanation
The Address Resolution Protocol (ARP) is the network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses in a local network environment. When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address corresponding to the IP address of the destination device. This allows for successful communication at the data link layer.
15.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
Correct Answer
C. Reverse Address Resolution Protocol.
Explanation
Reverse Address Resolution Protocol (RARP) is the correct answer because it is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.
16.
What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting
Correct Answer
D. Internet Control Message Protocol
Explanation
The correct answer is Internet Control Message Protocol. The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging services for troubleshooting purposes. It is used to send error messages and operational information, such as network congestion or unreachable hosts, between network devices. ICMP messages are crucial for diagnosing and resolving network issues, as they allow network administrators to identify and troubleshoot problems in the network.
17.
What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol
Explanation
The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without any errors or loss. TCP uses acknowledgment and retransmission mechanisms to guarantee reliable delivery, making it suitable for applications that require accurate and complete data transmission, such as web browsing and file transfer.
18.
What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
Correct Answer
A. File Transfer Protocol
Explanation
File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files. FTP allows users to transfer files between a client and a server over a network, using TCP as the underlying protocol for reliable data transmission. FTP provides a set of commands for navigating and manipulating files on the server, making it a widely used protocol for file transfer over the internet.
19.
What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network
Explanation
A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a Local Area Network (LAN) which is confined to a small area, a WAN allows for long-distance communication and connects multiple LANs together. A Virtual Private Network (VPN) is a technology that allows secure remote access to a private network over a public network, and a Metropolitan Area Network (MAN) connects networks within a specific geographic area, such as a city.
20.
What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet
Correct Answer
C. Virtual Private Network
Explanation
A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. VPNs provide a secure and encrypted connection between the computers, allowing them to send and receive data as if they were directly connected to a private network. This makes VPNs particularly useful for remote workers or for accessing private networks while connected to a public network, such as the internet.
21.
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080.
Explanation
Port 8080 is commonly used for HTTP servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative when port 80 is already in use or blocked. Port 110 is used for POP3 email protocol, and port 443 is used for secure HTTPS communication.
22.
How many bits are in an IPv4 address?
Correct Answer
B. 32 bits.
Explanation
An IPv4 address is a 32-bit binary number, divided into four octets, each containing 8 bits. Therefore, the correct answer is 32 bits.
23.
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four sections, each representing an octet of the address. Each octet is represented as a decimal number ranging from 0 to 255, separated by dots. This format is easier for users to understand and remember compared to binary, hexadecimal, or octal formats.
24.
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A.
Explanation
An IPv4 address is divided into different classes based on the range of values in the first octet. Class A addresses have a first octet range of 1-126, which means that any IP address falling within this range belongs to Class A. Class A addresses are used for large networks, as they provide a large number of host addresses.
25.
What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C.
Explanation
Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255 and provide 24 bits for the network portion and 8 bits for the host portion. This allows for a maximum of 2^8 (256) possible network addresses, with each network capable of accommodating up to 2^8 (256) hosts. Therefore, a Class C address is suitable for networks with approximately 250 nodes.
26.
What IPv4 class address is used for multicast addressing?
Correct Answer
B. Class D.
Explanation
Class D is the correct answer because it is the class of IPv4 addresses that is reserved for multicast addressing. Multicast addressing allows a single packet to be sent to multiple recipients simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, and they are specifically designated for multicast group communication.
27.
What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1.
Explanation
The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly referred to as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is looped back to the same machine without being transmitted on the network. This allows for testing and troubleshooting network applications without the need for an external network connection.
28.
What is a mechanism that allows a network device to divide an IP address into a network and host number
Correct Answer
A. Subnet mask.
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. The subnet mask consists of a series of binary digits that correspond to the number of bits used for the network portion of the IP address. By applying the subnet mask to the IP address, the device can determine the network address and the host address, allowing for proper routing and communication within the network.
29.
What is the default classful subnet mask on class B networks?
Correct Answer
A. 255.255.0.0.
Explanation
The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for 16 bits to be used for the network portion of the IP address and 16 bits for the host portion. This means that class B networks can have up to 65,536 hosts on each network.
30.
What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
A. Classful Subnet Masking
Explanation
Classful subnet masking is a method that borrows bits from the host field of an IP address to create a subnet. In classful subnet masking, the IP address is divided into network and host portions based on predetermined class boundaries. The subnet mask is used to determine the size of the network and host portions. By borrowing bits from the host field, the network can be further divided into smaller subnets, allowing for more efficient use of IP addresses and better network management.
31.
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format
Explanation
IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format uses groups of four hexadecimal digits separated by colons. This allows for a larger address space and simplifies the representation of IPv6 addresses compared to the binary format used in IPv4. The use of hexadecimal digits also makes it easier for humans to read and remember the addresses.
32.
What notation is expressed in leading zero compression for IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234.
Explanation
Leading zero compression is a notation used in IPv6 to simplify the representation of consecutive blocks of zeros. It allows for the removal of one or more consecutive blocks of zeros and replaces them with a double colon (::). In the given answer, the notation 1234:1234:0:0:1234:0:0:1234 represents the IPv6 address with leading zero compression. The consecutive blocks of zeros have been compressed to ::, making the representation shorter and more concise.
33.
What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678.
Explanation
The correct answer is "10AB::3:0:1234:5678." This is an example of zero compression notation in IPv6. Zero compression allows consecutive blocks of zeros to be represented by "::". In this case, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", as well as the consecutive blocks of zeros between "3" and "1234:5678". This notation helps to simplify and shorten the representation of IPv6 addresses.
34.
What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?
Correct Answer
B. Link-local
Explanation
Link-local addresses operate within a network segment and do not require a router to direct traffic. These addresses are automatically assigned to interfaces and are used for communication within the local network. They are not meant to be routed outside of the network segment and are only valid within that specific network.
35.
What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
Correct Answer
A. Site-local.
Explanation
Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally routable. They allow for communication within the site without the need for external routing. Site-local addresses were defined in older versions of the Internet Protocol (IPv6) but have been deprecated in favor of Unique Local Addresses (ULA).
36.
What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global.
Explanation
The correct answer is Aggregatable Global. Aggregatable Global Unicast addresses are publicly accessible and allow for hierarchical design and allocation by breaking up the Network ID portion of the address into different areas. This enables efficient routing and management of IP addresses on a global scale. Site-local addresses are not publicly accessible and are limited to a specific site or organization. Link-local addresses are only used for communication within a single network segment. Aggregatable Local addresses are not a recognized scope for Unicast addresses.
37.
The computing part of the computer is the central processing unit, also called the
Correct Answer
C. Microprocessor
Explanation
The central processing unit (CPU) is the computing part of a computer that performs all the necessary calculations and operations. It is responsible for executing instructions, managing data, and controlling the overall operation of the computer. The microprocessor is a key component of the CPU, acting as its brain and carrying out the actual processing of data. It is a small chip that contains millions of transistors and circuits, allowing it to perform complex calculations and operations at high speeds. Therefore, the microprocessor is the correct answer as it accurately represents the computing part of the computer.
38.
What two main components make up the central processing unit?
Correct Answer
B. Control unit and arithmetic logic unit
Explanation
The central processing unit (CPU) consists of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching and decoding instructions, while the ALU performs mathematical and logical operations, such as addition, subtraction, and comparisons. Together, these two components work in tandem to carry out the instructions and process data within the CPU.
39.
What is the type of memory that retains data after power is removed or lost?
Correct Answer
B. Nonvolatile.
Explanation
Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power source to retain data, nonvolatile memory can store information for long periods without power. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory, where data needs to be stored even when the device is turned off or loses power.
40.
Which landline transmission medium is the primary carrier of voice communications?
Correct Answer
A. Twisted pair cable
Explanation
Twisted pair cable is the primary carrier of voice communications because it is a widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to minimize interference and crosstalk. The twisted pair cable is capable of carrying analog signals, such as voice, over long distances without significant degradation in quality. It is cost-effective, easy to install, and suitable for both residential and commercial applications, making it the preferred choice for voice communication.
41.
An optical communications system is comprised of a
Correct Answer
A. Transmitter, cable, and receiver
Explanation
The correct answer is transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through a cable made of optical fibers. The receiver at the other end of the cable receives the optical signals and converts them back into electrical signals. Therefore, the transmitter, cable, and receiver are the essential components of an optical communications system.
42.
Which of the following is not one of the three advantages to using wireless technology?
Correct Answer
C. Safety
Explanation
Safety is not one of the three advantages to using wireless technology because it can pose security risks and vulnerabilities. While wireless technology offers ease of installation, lower cost, and mobility, it may also be susceptible to unauthorized access, data breaches, and interference. Therefore, safety is not a direct advantage of wireless technology, but rather a concern that needs to be addressed and managed.
43.
The ability to move about without being tethered by wires in wireless technology is called
Correct Answer
A. Mobility.
Explanation
The correct answer is mobility. In wireless technology, mobility refers to the ability to move freely without being restricted by wires. This allows users to access and use devices or networks from different locations, providing convenience and flexibility. Mobility is a key feature of wireless technology that enables users to stay connected and access information on the go.
44.
Which of the following is not one the four security threats to Wireless Local Area Network?
Correct Answer
B. Direct Connections
Explanation
Direct Connections is not considered one of the four security threats to Wireless Local Area Network because it refers to a legitimate method of connecting devices to a network using a physical cable, rather than wirelessly. Rogue Access Points, War Drivers, and Hackers, on the other hand, are all potential security threats to wireless networks.
45.
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network
Correct Answer
B. Employee.
Explanation
An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. Employees have legitimate access to the network and can potentially compromise its security by either unintentionally falling victim to social engineering attacks or intentionally collaborating with external entities to breach the network's defenses.
46.
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks
Correct Answer
A. Institute of Electrical Electronics Engineers
Explanation
The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards, such as IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX), have played a crucial role in ensuring interoperability and reliable wireless communication. The IEEE is a renowned organization in the field of electrical and electronics engineering, and its contributions have greatly influenced the development and advancement of wireless technology.
47.
How many peripherals can a Universal Serial Bus handle at once?
Correct Answer
A. 127
Explanation
A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because the USB specification supports a maximum of 127 unique device addresses, each of which can be assigned to a peripheral device. Therefore, any additional peripherals beyond this limit would not be recognized or supported by the USB.
48.
How many devices can connect to a FireWire bus?
Correct Answer
A. 63
Explanation
A FireWire bus can support up to 63 devices. This is because the FireWire protocol uses a 6-bit device address field, allowing for a maximum of 2^6 - 1 (63) unique addresses. Each device connected to the bus is assigned a unique address, and therefore, the maximum number of devices that can be connected is 63.
49.
What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
Correct Answer
B. Voltage
Explanation
Voltage is applied across Liquid Crystal Display (LCD) material to change its alignment and light polarizing property. By applying voltage, the liquid crystals in the display can be aligned in a specific way, which affects the polarization of light passing through them. This alignment change allows the display to control the amount of light that passes through different areas, thus creating the desired image or text. Therefore, voltage is the correct answer as it directly influences the alignment and polarizing properties of the LCD material.
50.
What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Correct Answer
B. Bridge
Explanation
A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of the incoming frames and making forwarding decisions based on the destination address. By doing so, it can filter and control the flow of traffic between the segments, reducing collisions and improving network performance. Unlike a hub, which simply broadcasts all incoming traffic to all connected devices, a bridge selectively forwards traffic only to the intended destination, making it an efficient solution for dividing a network into separate segments.