1.
What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical
Explanation
The Physical layer of the Open System Interconnect model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. This layer deals with the physical transmission of data, including the physical media, signal encoding, and electrical voltages used for communication. It ensures that the data is transmitted reliably and accurately over the network.
2.
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer handles the flow control, error checking, and framing of data packets. It also provides services to the Network Layer. The Media Access Control (MAC) sublayer is responsible for controlling access to the network media and managing the physical addressing of data packets. These two sublayers work together to ensure reliable and efficient communication between network devices.
3.
At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Network switches and bridges use MAC addresses to forward data packets within a local area network (LAN) and make decisions based on the Media Access Control (MAC) sublayer. They provide functionalities such as filtering, error detection, and collision avoidance, which are essential for efficient and secure data transmission within a network.
4.
At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network
Explanation
Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing packets across different networks and determining the best path for data transmission. Routers use IP addresses and routing tables to make decisions about forwarding packets to their intended destinations. They also perform functions such as packet filtering, network address translation (NAT), and network segmentation. By operating at the Network layer, routers play a crucial role in connecting different networks and enabling communication between devices.
5.
At what Open System Interconnect layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for formatting and presenting data to the application layer. It ensures that the data is in a format that the receiving application can understand. Data compression reduces the size of the data for efficient transmission, while encryption ensures the security and privacy of the data by converting it into a form that can only be accessed by authorized parties. Therefore, the correct answer is Presentation.
6.
What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application
Explanation
The Open System Interconnect (OSI) model consists of seven layers, with the Application layer being the closest to the end user. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with software applications and allows users to access network resources. The Application layer is responsible for formatting, encrypting, and compressing data before sending it to the Presentation layer for further processing.
7.
What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
Correct Answer
D. Protocol
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that different devices and systems can communicate effectively and understand each other's messages. They provide a standardized way for computers to interact and enable the reliable transfer of data across networks.
8.
What topology defines the layout of a network’s devices and media?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical. The physical topology refers to the actual physical layout of devices and media in a network. It defines how the devices are connected and the physical arrangement of cables, switches, routers, and other networking equipment. This includes the placement of devices such as computers, servers, printers, and the physical connections between them. The physical topology is important for understanding how data flows within a network and for troubleshooting network issues.
9.
What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
Correct Answer
B. Logical
Explanation
Logical topology refers to the way in which devices communicate and data is transmitted in a network, regardless of the physical layout. It defines the logical connections between devices, such as how data flows from one device to another, without considering the physical arrangement of the network components. This can include various types of logical topologies such as bus, ring, mesh, or tree.
10.
What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus
Explanation
Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable known as the bus. Each device on the network can transmit data onto the bus, and all other devices on the network can receive that data. This type of topology is relatively simple and inexpensive to implement, making it suitable for small networks. However, if the bus cable fails, the entire network can be affected, and the performance of the network can be impacted as more devices are added.
11.
What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star
Explanation
The star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this topology, all the computers are connected directly to the central component, allowing for easy management and troubleshooting. If one computer fails or has an issue, it will not affect the rest of the network. Additionally, the star topology provides better performance and scalability compared to other topologies like bus or ring.
12.
What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that it can have a combination of bus, ring, star, or any other topology. It allows for more flexibility and scalability in the network design, as different topologies can be used in different parts of the network based on their specific requirements. This type of topology is commonly used in larger networks where different sections may have different connectivity needs.
13.
Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol
Explanation
The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for reliable and secure communication over networks, and it is widely used in the internet and other computer networks. It provides a standardized framework for addressing, routing, and transmitting data packets, making it an ideal choice for the Department of Defense to ensure efficient and secure communication within its network infrastructure.
14.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
Correct Answer
B. Address Resolution Protocol
Explanation
The Address Resolution Protocol (ARP) is the network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses in order to facilitate communication between devices on a local network.
15.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
Correct Answer
C. Reverse Address Resolution Protocol
Explanation
The Reverse Address Resolution Protocol (RARP) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in situations where a device does not have an IP address configured and needs to obtain one dynamically. The RARP server will then respond with the appropriate IP address for the requesting device.
16.
What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol
Explanation
The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to assist in troubleshooting. ICMP is primarily used for error reporting, network diagnostics, and troubleshooting network connectivity issues. It allows network devices to send error messages to the source IP address when a problem occurs during packet transmission. These error messages can provide valuable information about network issues, such as unreachable hosts, network congestion, or incorrect routing configurations. ICMP is an essential component of the TCP/IP protocol suite and is widely used by network administrators to diagnose and resolve network problems.
17.
What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol
Explanation
The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without any errors. TCP uses a combination of acknowledgment and retransmission mechanisms to guarantee reliable delivery of data over IP networks. It also includes flow control and congestion control mechanisms to manage the transmission rate and prevent network congestion. Overall, TCP is designed to provide a reliable and error-free communication channel between network hosts.
18.
What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
Correct Answer
A. File Transfer Protocol
Explanation
File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files over a network. FTP allows users to transfer files between a client and a server using TCP as the underlying protocol. It provides a reliable and efficient method for file transfer, making it a widely used protocol for tasks such as uploading website files or transferring large files between computers.
19.
What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network
Explanation
A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances. It is used to connect networks between cities, states, countries, or even across the world. Unlike a Local Area Network (LAN) which is limited to a specific area, a WAN allows for long-distance communication and enables organizations to connect their remote offices or branches. A Virtual Private Network (VPN) is a secure connection that uses public networks to create a private network, while a Metropolitan Area Network (MAN) connects networks within a specific metropolitan area.
20.
What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual Private Network
Explanation
A Virtual Private Network (VPN) is a type of network that utilizes tunneling and security protocols to enable a group of computer systems to communicate over the public Internet. It creates a secure and encrypted connection between the systems, allowing them to exchange data and information privately. This is particularly useful for remote workers or organizations that need to connect multiple locations securely over the internet. A VPN ensures that the communication remains private and protected from unauthorized access or interception.
21.
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080
Explanation
Port 8080 is commonly used for hosting Hyper Text Transfer Protocol (HTTP) servers and proxies. While port 80 is the default port for HTTP, port 8080 is often used as an alternative when port 80 is already in use or blocked. This allows for multiple HTTP servers or proxies to run simultaneously on a single device.
22.
How many bits are in an IPv4 address?
Correct Answer
B. 32 bits
Explanation
An IPv4 address is made up of 32 bits. Each bit can be either a 0 or a 1, resulting in a total of 2^32 possible combinations. This allows for approximately 4.3 billion unique addresses, which are used to identify devices on a network. IPv4 addresses are commonly written in decimal format with four sets of numbers separated by periods, with each set representing 8 bits.
23.
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four sections, each representing one byte of the address. Each section is separated by a dot, making it easier for users to read and understand the address. This format is widely used and is familiar to most users, making it more convenient for communication and configuration purposes.
24.
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A
Explanation
An IPv4 address is divided into different classes based on the range of values in the first octet. Class A addresses have a range of 1-126 in the first octet, which means that the given IPv4 address belongs to Class A. Class A addresses are used for large networks as they can accommodate a large number of hosts.
25.
What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C
Explanation
Class C is the correct answer because it is designed for small to medium-sized networks with approximately 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, allowing for up to 254 hosts per network. Class D is used for multicasting, Class E is reserved for experimental purposes, and Class F is not a valid class in the IPv4 addressing system.
26.
What IPv4 class address is used for multicast addressing?
Correct Answer
B. Class D
Explanation
Class D is the correct answer because it is the IPv4 class address used for multicast addressing. Multicast addressing allows a single packet to be sent to multiple destinations simultaneously, making it ideal for applications such as video streaming and online gaming. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast groups.
27.
What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1
Explanation
The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly referred to as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is immediately routed back to the sender without leaving the network interface, allowing the machine to communicate with itself.
28.
What is a mechanism that allows a network device to divide an IP address into a network and host number?
Correct Answer
A. Subnet mask
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address belongs to the network and which part belongs to the host. By using a subnet mask, a network device can identify the network that a particular IP address belongs to and route the data accordingly. This helps in efficient communication and management of IP addresses within a network.
29.
What is the default classful subnet mask on class B networks?
Correct Answer
A. 255.255.0.0
Explanation
The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for a network with a maximum of 65,536 hosts. Class B networks have a default IP address range of 128.0.0.0 to 191.255.255.255, and the first two octets of the subnet mask, 255.255, indicate that the network portion of the IP address is 16 bits long.
30.
What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
B. Classless Inter-Domain Routing
Explanation
Classless Inter-Domain Routing (CIDR) is the method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more flexible and efficient allocation of IP addresses by allowing variable-length subnet masks. This means that the traditional class-based subnetting is replaced with a more granular approach, where the number of borrowed bits can vary depending on the network's needs. CIDR is widely used in modern networks to optimize address allocation and routing.
31.
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format
Explanation
IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format represents the address as eight groups of four hexadecimal digits, separated by colons. This allows for a larger address space compared to IPv4 and makes it easier for users to read and remember the addresses. Additionally, the use of hexadecimal digits simplifies the representation of large numbers and reduces the length of the address compared to using binary or decimal notation.
32.
What notation is expressed in leading zero compression for IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234
Explanation
The given answer, "1234:1234:0:0:1234:0:0:1234," is an example of leading zero compression for IPv6 notation. In this notation, consecutive groups of zeros can be represented by a double colon (::) to simplify the representation of the address. This allows for a more concise and readable representation of IPv6 addresses.
33.
What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678
Explanation
The given answer "10AB::3:0:1234:5678" is an example of zero compression notation for IPv6. In this notation, consecutive blocks of zeros can be represented by "::". This allows for a shorter representation of the IPv6 address. In the given answer, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", and between "3" and "1234".
34.
What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?
Correct Answer
B. Link-local
Explanation
Link-local addresses are used for communication within a network segment and do not require a router for directing traffic. These addresses are automatically assigned to interfaces and are not meant to be routed outside of the local network. They are used for local network operations and are not globally unique. Therefore, link-local is the correct answer for the given question.
35.
What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
Correct Answer
A. Site-local
Explanation
Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique. They provide a way for devices within the same site to communicate with each other without the need for external routing. Site-local addresses have been deprecated in favor of Unique Local Addresses (ULA) as per the IPv6 addressing architecture.
36.
What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global
Explanation
Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is broken up into different areas, allowing for hierarchical design and allocation. This means that the address can be divided into smaller subnets, making it easier to manage and allocate IP addresses in a large network. The term "aggregatable" suggests that these smaller subnets can be aggregated or combined together, reducing the routing table size and improving efficiency in network routing.
37.
The computing part of the computer is the central processing unit, also called the
Correct Answer
C. Microprocessor
Explanation
The correct answer is microprocessor because it is the component of a computer that performs most of the processing inside the computer. It is responsible for executing instructions, performing calculations, and managing data flow between different parts of the computer. The microprocessor is often referred to as the "brain" of the computer as it controls and coordinates all the activities of the computer system.
38.
What two main components make up the central processing unit?
Correct Answer
B. Control unit and arithmetic logic unit
Explanation
The central processing unit (CPU) is made up of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for coordinating and controlling the operations of the CPU, while the ALU performs arithmetic and logical operations. Together, these two components work together to execute instructions, process data, and perform calculations within a computer system.
39.
What is the type of memory that retains data after power is removed or lost?
Correct Answer
B. Nonvolatile
Explanation
Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power supply to retain data, nonvolatile memory can store information without the need for power. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory, where data needs to be stored even when the device is powered off.
40.
Which landline transmission medium is the primary carrier of voice communications?
Correct Answer
A. Twisted pair cable
Explanation
Twisted pair cable is the primary carrier of voice communications because it is a reliable and cost-effective transmission medium. It consists of two insulated copper wires twisted together, which helps to minimize interference and crosstalk. Twisted pair cables are widely used in telephone networks and are capable of transmitting voice signals over long distances without significant degradation in quality. Additionally, they are easy to install and maintain, making them a popular choice for voice communication systems.
41.
An optical communications system is comprised of a
Correct Answer
A. Transmitter, cable, and receiver
Explanation
An optical communications system requires a transmitter to convert electrical signals into optical signals, a cable to transmit the optical signals, and a receiver to convert the optical signals back into electrical signals. This is the basic setup for transmitting information through optical fibers. The other options mentioned, such as logic analyzer and protocol analyzer, are not essential components of an optical communications system.
42.
Which of the following is not one of the three advantages to using wireless technology?
Correct Answer
C. Safety
Explanation
Safety is not one of the three advantages to using wireless technology. Wireless technology offers ease of installation, lower cost, and mobility as its advantages. Safety may not be considered as an advantage because wireless technology can have potential security risks such as unauthorized access, data breaches, and interference. While wireless technology provides convenience and flexibility, it may not guarantee the same level of safety as wired connections.
43.
The ability to move about without being tethered by wires in wireless technology is called
Correct Answer
A. Mobility
Explanation
The correct answer is mobility. Mobility refers to the ability to move freely without being restricted by wires in wireless technology. It allows users to access and use devices or services from different locations without the need for physical connections. This feature is essential in various applications such as mobile phones, laptops, and wireless networks, enabling convenience and flexibility for users.
44.
Which of the following is not one the four security threats to Wireless Local Area Network?
Correct Answer
B. Direct Connections
Explanation
Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points, War Drivers, and Hackers are all potential threats to the security of a wireless network. Rogue Access Points refer to unauthorized access points that are set up by attackers to gain access to the network. War Drivers are individuals who drive around with a wireless device to detect and exploit vulnerabilities in wireless networks. Hackers are individuals who attempt to gain unauthorized access to the network to steal data or disrupt operations. However, Direct Connections do not pose a direct security threat to a wireless network as they are typically used for legitimate purposes such as connecting a device directly to a router or modem.
45.
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
Correct Answer
B. Employee
Explanation
An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an insider, an employee has access to sensitive information and network resources, making them a potential threat if they misuse their privileges or fall victim to social engineering tactics. They can either unintentionally assist attackers by clicking on malicious links or sharing confidential information, or intentionally collaborate with external parties to compromise the network's security.
46.
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks?
Correct Answer
A. Institute of Electrical Electronics Engineers
Explanation
The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards include IEEE 802.11 for Wi-Fi, IEEE 802.15 for Bluetooth, IEEE 802.16 for WiMAX, and many others. The IEEE is a globally recognized organization that focuses on advancing technology and innovation in various fields, including wireless communications. Their standards ensure interoperability, reliability, and performance in wireless networks, making them crucial for the development and implementation of wireless technologies.
47.
How many peripherals can a Universal Serial Bus handle at once?
Correct Answer
A. 127
Explanation
A Universal Serial Bus (USB) can handle up to 127 peripherals at once. USB is a widely used interface for connecting various devices to a computer, such as keyboards, mice, printers, and external storage devices. The USB specification allows for a maximum of 127 devices to be connected in a daisy-chain fashion using hubs. Each device connected to the USB has a unique address, and the USB protocol supports efficient communication and data transfer between the computer and the connected peripherals. Therefore, the correct answer is 127.
48.
How many devices can connect to a FireWire bus?
Correct Answer
A. 63
Explanation
A FireWire bus can connect up to 63 devices. This is because the FireWire standard allows for a maximum of 63 devices to be connected in a daisy-chain configuration, where each device is connected to the previous one. This limit is imposed by the addressing scheme used by FireWire, which assigns a unique identifier to each device on the bus. Therefore, the correct answer is 63.
49.
What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
Correct Answer
B. Voltage
Explanation
Voltage is applied across Liquid Crystal Display (LCD) material to change the alignment and light polarizing property. This is because the liquid crystals in an LCD are sensitive to electric fields. By applying a voltage, the electric field causes the liquid crystals to align in a specific direction, which in turn affects the polarization of light passing through the LCD. This allows for the manipulation of light transmission and the creation of images on the display.
50.
What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Correct Answer
B. Bridge
Explanation
A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the destination MAC address of each incoming frame and forwarding it only to the segment where the destination device is located. This helps to reduce collisions and improve network performance by isolating traffic within each segment. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge selectively forwards frames based on their destination MAC address.