1.
What layer of the Open System Interconnect model defines the electrical, mechanical,procedural, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical
Explanation
The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. This layer deals with the physical transmission of data, including the physical media, connectors, and signaling. It ensures that the bits sent over the network are properly encoded, transmitted, and received.
2.
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer handles the flow control and error checking of data packets, ensuring reliable transmission. The Media Access Control (MAC) sublayer manages the access to the physical media, such as Ethernet or Wi-Fi, and handles issues like collision detection and media arbitration. These two sublayers work together to provide a reliable and efficient data link between network devices.
3.
At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes and ensures error-free transmission over the physical network. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) or between different LANs. They operate by examining the MAC address of incoming packets and forwarding them to the appropriate destination based on the MAC address table.
4.
At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network
Explanation
Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing data packets across different networks. Routers use IP addresses to determine the best path for forwarding packets from one network to another. They examine the destination IP address of a packet and make decisions based on routing tables to ensure efficient and accurate delivery of data. Therefore, routers play a crucial role in network communication by connecting multiple networks and facilitating the transfer of data between them.
5.
At what Open System Interconnect layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for formatting, encrypting, and compressing data to be sent across the network. It ensures that the data is in a format that can be understood by the receiving system. Therefore, at this layer, data compression and encryption techniques are applied to optimize the transmission and secure the data being transmitted.
6.
What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application
Explanation
The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with software applications and ensures that the user's requests are properly communicated to the underlying layers of the OSI model for further processing and transmission.
7.
What is a formal set of rules and conventions that govern how computers exchangeinformation over a network medium?
Correct Answer
D. Protocol
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that communication between devices is reliable, efficient, and standardized. They define the roles and responsibilities of both the sender and receiver, ensuring that data is transmitted and received correctly.
8.
What topology defines the layout of a network’s devices and media?
Correct Answer
A. pHysical
Explanation
The correct answer is "Physical." The physical topology refers to the physical arrangement of devices and media in a network. It defines how the devices are connected and the layout of the cables and other physical components. This includes the placement of routers, switches, servers, and other network devices, as well as the type of cables used to connect them. The physical topology is important for determining the overall structure and organization of a network.
9.
What topology defines the way in which devices communicate, and data is transmitted,throughout the network?
Correct Answer
B. Logical
Explanation
Logical topology refers to the way in which devices communicate and data is transmitted throughout the network based on logical connections. It defines the flow of data and the paths it takes, regardless of the physical layout of the network. This includes protocols, addressing schemes, and the logical relationships between devices. Unlike physical topology, which focuses on the physical arrangement of devices and cables, logical topology deals with the abstract representation of the network's structure. Therefore, logical topology is the correct answer as it specifically addresses the communication and data transmission aspect of network design.
10.
What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus
Explanation
Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable called the bus. Each device on the network listens to the bus to determine if the transmitted data is intended for it. If a device wants to transmit data, it sends the data onto the bus, and all devices on the network receive the data. This type of topology is simple to install and cost-effective, but if the main cable fails, the entire network can be affected.
11.
What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star
Explanation
A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this topology, all communication between the computers is routed through this central component, which helps to manage and control the flow of data. This arrangement provides a high level of reliability, as if one computer or cable segment fails, it does not affect the rest of the network. Additionally, it allows for easy scalability, as new computers can be added to the network simply by connecting them to the central component.
12.
What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that a network can have a combination of bus, ring, star, or other topologies. The advantage of a hybrid topology is that it can provide flexibility and scalability, allowing for the customization of the network to meet specific needs. It can also provide redundancy and fault tolerance, as multiple topologies can be used to ensure network connectivity even if one part of the network fails.
13.
Which network protocol has the Department of Defense chosen as its standard to govern theflow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol
Explanation
The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable transmission of data over networks, including the internet. It is widely used and provides a standardized method for communication between devices and networks, making it an ideal choice for the Department of Defense to ensure interoperability and security in their information flow.
14.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
Correct Answer
B. Address Resolution Protocol
Explanation
The Address Resolution Protocol (ARP) is the correct answer because it is the network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve the IP address to the corresponding MAC address so that data can be properly transmitted over the network.
15.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address ?
Correct Answer
C. Reverse Address Resolution Protocol
Explanation
The Reverse Address Resolution Protocol (RARP) is used to obtain an IP address when the device already knows its own MAC address. RARP allows a device to send a broadcast request on the network, asking for its IP address to be assigned based on its MAC address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.
16.
What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol
Explanation
The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to assist with troubleshooting. ICMP messages are used to report errors, provide diagnostic information, and test network connectivity. It is commonly used by network administrators and tools such as ping and traceroute to identify and resolve network issues.
17.
What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol
Explanation
The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors by using acknowledgments, retransmissions, and flow control mechanisms. TCP also provides congestion control to prevent network congestion and ensure efficient data transmission.
18.
What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
Correct Answer
A. File Transfer Protocol
Explanation
The correct answer is File Transfer Protocol (FTP). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a simple and reliable way to send and receive files between computers. FTP uses a client-server architecture, where one computer acts as the server, hosting the files, and another computer acts as the client, requesting and downloading the files. FTP is widely used for uploading website files, downloading software updates, and sharing large files over the internet.
19.
What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network
Explanation
A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a Local Area Network (LAN) that connects devices within a limited area like a home or office, a WAN enables communication over larger distances. A Virtual Private Network (VPN) is a secure connection that allows users to access a private network over a public network like the internet. A Metropolitan Area Network (MAN) connects networks within a specific metropolitan area.
20.
What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual Private Network
Explanation
A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to allow a group of computer systems to communicate over the public Internet. It creates a secure and encrypted connection between these systems, ensuring that the data transmitted over the network is protected from unauthorized access. VPNs are commonly used by businesses and individuals to establish secure connections over public networks, such as the Internet, allowing remote access to resources and ensuring the privacy and security of communication.
21.
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080
Explanation
Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While Port 80 is the default port for HTTP, Port 8080 is often used as an alternative port for HTTP servers and proxies. It allows for additional flexibility and can be used to run multiple web servers on the same machine. This port is commonly used for testing and development purposes as well.
22.
How many bits are in an IPv4 address?
Correct Answer
B. 32 bits
Explanation
An IPv4 address is a 32-bit address, which means it consists of 32 binary digits or bits. This allows for a total of 2^32 or approximately 4.3 billion unique addresses. Each bit can be either a 0 or a 1, allowing for a wide range of possible combinations and therefore a large number of unique addresses.
23.
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four parts, each representing a byte of the address, and separated by periods. Each byte is expressed in decimal form, ranging from 0 to 255. This format is easier for users to read and understand compared to binary or hexadecimal formats, which are more commonly used in computer systems.
24.
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A
Explanation
An IPv4 address with a first octet in the range of 1-126 belongs to Class A. Class A addresses are used for large networks, as they have a very large number of available IP addresses. The first octet in a Class A address represents the network portion of the address, while the remaining three octets represent the host portion.
25.
What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C
Explanation
Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, and they provide a maximum of 254 usable host addresses per network. This makes them suitable for small to medium-sized networks, such as small businesses or home networks. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental purposes, and Class F addresses are reserved for future use.
26.
What IPv4 class address is used for multicast addressing?
Correct Answer
B. Class D
Explanation
Class D is the correct answer because it is the IPv4 class address used for multicast addressing. Multicast addressing allows a single packet to be sent to multiple destinations simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, and they are reserved for multicast groups. These addresses are used for applications such as video streaming, online gaming, and audio conferencing, where data needs to be sent to multiple recipients at the same time.
27.
What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1
Explanation
The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly known as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is looped back to the same machine without being sent over the network. This allows for testing and troubleshooting network applications without the need for an actual network connection.
28.
What is a mechanism that allows a network device to divide an IP address into a network and host number?
Correct Answer
A. Subnet mask
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. By applying the subnet mask to the IP address, the device can determine the network address and perform routing and communication within the network.
29.
What is the default classful subnet mask on class B networks?
Correct Answer
A. 255.255.0.0
Explanation
The default classful subnet mask for class B networks is 255.255.0.0. In classful networking, the IP address is divided into three parts: network, subnet, and host. Class B networks have a default subnet mask of 255.255.0.0, which means that the first two octets are used for the network portion and the last two octets are used for the host portion. This allows for a maximum of 65,534 hosts on each network.
30.
What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
B. Classless Inter-Domain Routing
Explanation
Classless Inter-Domain Routing (CIDR) is the method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more flexibility in subnetting by allowing the allocation of variable-length subnet masks, unlike Classful Subnet Masking which uses fixed-length subnet masks. Virtual Private Networking (VPN) and Virtual Local Area Networking (VLAN) are unrelated to subnetting and do not involve borrowing bits from the host field of an IP address.
31.
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format
Explanation
IPv6 addresses are expressed in the colon hexadecimal format to make them more user-friendly. In this format, the address is divided into eight groups of four hexadecimal digits separated by colons. This format allows for a larger address space compared to IPv4 and is easier for users to read and remember. Additionally, it eliminates the need for long strings of zeros, as consecutive zeros within a group can be replaced with a double colon (::). This simplifies the representation of IPv6 addresses and makes them more manageable for users.
32.
What notation is expressed in leading zero compression for IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234
Explanation
The given answer, 1234:1234:0:0:1234:0:0:1234, is expressed in leading zero compression notation for IPv6. This notation allows consecutive sets of zeros to be replaced with a double colon (::), reducing the length of the IPv6 address. In this case, the two sets of consecutive zeros, 0:0 and 0:0, are compressed into ::, resulting in the given answer.
33.
What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678
Explanation
The correct answer is "10AB::3:0:1234:5678". This notation represents zero compression for IPv6. In IPv6, consecutive blocks of zeros can be compressed by using double colons "::". This allows for a more concise representation of the IPv6 address. In the given answer, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", and between "3" and "1234:5678".
34.
What Unicast address scope operates within a network segment, and will not originate from,or be destined to, an interface that requires a router to direct traffic?
Correct Answer
B. Link-local
Explanation
Link-local addresses are used for communication within a single network segment and do not require a router for directing traffic. These addresses are automatically assigned to interfaces and are only valid within the local network. They are typically used for neighbor discovery, address autoconfiguration, and other local network protocols. Link-local addresses cannot be routed outside the local network and are not globally unique.
35.
What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
Correct Answer
A. Site-local
Explanation
Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique. They provide a way for devices within the same site to communicate with each other without the need for global routing. Site-local addresses were deprecated in favor of Unique Local Addresses (ULA) in IPv6, but they were commonly used in IPv4 networks.
36.
What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global
Explanation
Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible and allows for hierarchical design and allocation. This means that the Network ID portion of the address can be broken up into different areas, enabling efficient routing and management of IP addresses on a global scale.
37.
The computing part of the computer is the central processing unit, also called the
Correct Answer
C. Microprocessor
Explanation
The correct answer is microprocessor. The microprocessor is the computing part of the computer that performs all the necessary calculations and logical operations. It is responsible for executing instructions, managing data, and controlling the overall operation of the computer system. The control unit, arithmetic logic unit, and minicomputer are all components of a computer system, but the microprocessor specifically refers to the integrated circuit that contains the CPU.
38.
What two main components make up the central processing unit?
Correct Answer
B. Control unit and arithmetic logic unit
Explanation
The central processing unit (CPU) is composed of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching instructions, decoding them, and executing them. The ALU, on the other hand, performs arithmetic and logical operations, such as addition, subtraction, and comparison. Together, these two components form the core of the CPU and are essential for carrying out the processing and execution of instructions in a computer system.
39.
What is the type of memory that retains data after power is removed or lost?
Correct Answer
B. Nonvolatile
Explanation
Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power supply to maintain data, nonvolatile memory can retain information even when power is not available. This type of memory is commonly used in devices like solid-state drives (SSDs), flash drives, and ROM (Read-Only Memory) chips. It allows for long-term storage of data without the risk of losing it due to power failure or shutdown.
40.
Which landline transmission medium is the primary carrier of voice communications
Correct Answer
A. Twisted pair cable
Explanation
Twisted pair cable is the primary carrier of voice communications because it is a cost-effective and widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to reduce electromagnetic interference. The twisted pair cable is capable of transmitting voice signals over long distances without significant loss or degradation of quality. It is also easy to install and maintain, making it a popular choice for landline telephone networks.
41.
An optical communications system is comprised of a
Correct Answer
A. Transmitter, cable, and receiver
Explanation
An optical communications system requires a transmitter to convert electrical signals into optical signals, a cable or transmission medium to carry the optical signals, and a receiver to convert the optical signals back into electrical signals. The logic analyzer and protocol analyzer mentioned in the other options are not essential components of an optical communications system.
42.
Which of the following is not one of the three advantages to using wireless technology?
Correct Answer
C. Safety
Explanation
Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology can provide convenience and flexibility, it also comes with certain risks, such as potential interference, security vulnerabilities, and health concerns related to electromagnetic radiation. Therefore, safety cannot be considered as one of the advantages of using wireless technology.
43.
The ability to move about without being tethered by wires in wireless technology is called
Correct Answer
A. Mobility
Explanation
The correct answer is "mobility" because wireless technology allows devices to move freely without the need for physical connections or wires. This enables users to access and use technology while on the go, providing them with the freedom to move around without being restricted by cables.
44.
Which of the following is not one the four security threats to Wireless Local Area Network?
Correct Answer
B. Direct Connections
Explanation
Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points, War Drivers, and Hackers are all considered security threats to WLAN. Rogue Access Points refer to unauthorized access points that are set up by individuals without permission, which can lead to unauthorized access to the network. War Drivers are individuals who drive around looking for vulnerable wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to a network for malicious purposes. However, Direct Connections do not pose a specific security threat to WLAN as they are typically used for legitimate purposes such as connecting devices directly to a router or modem.
45.
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
Correct Answer
B. Employee
Explanation
An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, an employee has access to sensitive information and can potentially misuse their privileges to compromise the network security. They may unknowingly fall victim to social engineering tactics or intentionally collaborate with external parties to breach the network defenses. Therefore, it is crucial for organizations to implement strong security measures, employee training, and monitoring systems to prevent such unauthorized activities and protect the network from potential threats.
46.
What organization developed several wireless standards to meet the demands of security,speed, and flexibility of today’s wireless networks?
Correct Answer
A. Institute of Electrical Electronics Engineers
Explanation
The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards ensure that wireless networks are reliable, efficient, and interoperable. The IEEE is a renowned organization in the field of electrical engineering and is responsible for developing various technical standards across different industries, including wireless communication.
47.
How many peripherals can a Universal Serial Bus handle at once?
Correct Answer
A. 127
Explanation
A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit addressing system, allowing for a maximum of 127 unique addresses for connected devices. Each peripheral connected to the USB is assigned a unique address, and the USB controller can communicate with all these devices simultaneously. Therefore, the correct answer is 127.
48.
How many devices can connect to a FireWire bus?
Correct Answer
A. 63
Explanation
A FireWire bus can support up to 63 devices connected to it. This is because the FireWire standard allows for a maximum of 63 devices to be connected in a daisy-chain configuration. Each device on the FireWire bus has a unique identifier, allowing them to communicate with the computer independently. Therefore, the correct answer is 63.
49.
What do you apply across Liquid Crystal Display material to change the alignment and lightpolarizing property?
Correct Answer
B. Voltage
Explanation
To change the alignment and light polarizing property of Liquid Crystal Display (LCD) material, voltage is applied. Voltage is used to control the orientation of the liquid crystal molecules, which affects the alignment and polarization of light passing through the LCD material. By applying different voltages, the liquid crystal molecules can be aligned in different directions, allowing control over the transmission or blocking of light, thus enabling the display of different colors and images on the LCD screen.
50.
What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Correct Answer
B. Bridge
Explanation
A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of the incoming frames and forwarding them only to the appropriate segment, based on the destination MAC address. This helps to reduce collisions and improve network performance by isolating traffic within each segment. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge selectively forwards frames, making it a more efficient option for segmenting networks.