CDC 3c251 Vol. 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Barrym07
B
Barrym07
Community Contributor
Quizzes Created: 3 | Total Attempts: 869
Questions: 76 | Attempts: 240

SettingsSettingsSettings
CDC Quizzes & Trivia

URE's from the book


Questions and Answers
  • 1. 

    (401)What device is a combination transmitter/receiver in a single package?

    • A.

      A transceiver

    • B.

      A repeater

    • C.

      A router

    • D.

      A hub

    Correct Answer
    A. A transceiver
    Explanation
    A transceiver is a device that combines the functions of both a transmitter and a receiver in a single package. It is commonly used in telecommunications and networking to transmit and receive signals over a network. Transceivers are essential components in various devices such as radios, wireless communication systems, and computer networks. They enable bidirectional communication by converting incoming signals into a format that can be understood by the receiving device and transmitting outgoing signals in a compatible format.

    Rate this question:

  • 2. 

    (401)What device operates at the physical layer of the Open System Interconnection (OSI) model and is used in Ethernet networks to connect which device to a fiber or copper cable?

    • A.

      Transceiver

    • B.

      Gateway

    • C.

      Router

    • D.

      Switch

    Correct Answer
    A. Transceiver
    Explanation
    A transceiver is a device that operates at the physical layer of the OSI model and is used in Ethernet networks to connect a device to a fiber or copper cable. It combines both transmitter and receiver functions, allowing data to be transmitted and received over the network. This device converts electrical signals into optical signals for transmission over fiber cables or into electrical signals for transmission over copper cables. Thus, a transceiver plays a crucial role in connecting devices to the network infrastructure.

    Rate this question:

  • 3. 

    (402)What device provides the physical, electrical, and electronic connections to the network media?

    • A.

      Bridge

    • B.

      Router

    • C.

      Gateway

    • D.

      Network interface card(NIC)

    Correct Answer
    D. Network interface card(NIC)
    Explanation
    A network interface card (NIC) provides the physical, electrical, and electronic connections to the network media. It is a hardware component that is installed in a computer or device to allow it to connect to a network. The NIC acts as an interface between the computer and the network, allowing data to be transmitted and received over the network. It provides the necessary connections, such as Ethernet or Wi-Fi, to establish a network connection and enable communication between devices.

    Rate this question:

  • 4. 

    (402)What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?

    • A.

      Data Link and Network layer

    • B.

      Physical layer and Network layer

    • C.

      Physical layer and Data Link layer

    • D.

      Physical, Data Link, and Network layer

    Correct Answer
    C. pHysical layer and Data Link layer
    Explanation
    Network interface cards (NIC) belong to the Physical layer and Data Link layer of the OSI model. The Physical layer is responsible for the physical transmission of data over the network, including the electrical, mechanical, and physical specifications of the network interface. The Data Link layer is responsible for the reliable transmission of data between two directly connected nodes, providing error detection and correction, as well as flow control. NICs handle both the physical connection to the network (Physical layer) and the data transmission between devices (Data Link layer).

    Rate this question:

  • 5. 

    (403)The device that receives a digital signal and regenerates the signal along the next leg of the medium is a...

    • A.

      Bridge

    • B.

      Brouter

    • C.

      Gateway

    • D.

      Repeater

    Correct Answer
    D. Repeater
    Explanation
    A repeater is a device that receives a digital signal and amplifies or regenerates it before sending it along the next leg of the medium. This is done to overcome signal degradation and ensure that the signal quality is maintained over longer distances. Unlike bridges, brouters, and gateways, which are used for different purposes in network communication, a repeater specifically focuses on signal regeneration and amplification.

    Rate this question:

  • 6. 

    (403)A repeater with more than one output port is a...

    • A.

      Hub

    • B.

      Bridge

    • C.

      Brouter

    • D.

      Gateway

    Correct Answer
    A. Hub
    Explanation
    A repeater with more than one output port is a hub. A hub is a networking device that allows multiple devices to connect to a network. It receives data from one port and broadcasts it to all other ports, essentially acting as a multi-port repeater. Therefore, a hub is the correct answer in this case.

    Rate this question:

  • 7. 

    (403)What can be used to extend the size of a network?

    • A.

      Brouter

    • B.

      Gateway

    • C.

      Active Hubs

    • D.

      Passive Hubs

    Correct Answer
    C. Active Hubs
    Explanation
    Active Hubs can be used to extend the size of a network. Active Hubs are devices that amplify and regenerate signals, allowing them to extend the distance over which data can be transmitted. They receive data signals from one device and then transmit them to all other devices connected to the hub. This allows for the expansion of a network by connecting multiple devices to the hub, thereby extending the network's reach.

    Rate this question:

  • 8. 

    (404)What is a device that subdivides a network into smaller logical pieces, or segments?

    • A.

      Switch

    • B.

      Brouter

    • C.

      Gateway

    • D.

      Repeater

    Correct Answer
    A. Switch
    Explanation
    A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. Unlike a hub, which broadcasts data to all connected devices, a switch intelligently routes data only to the specific device it is intended for, improving network efficiency and security. Therefore, a switch is the correct answer to this question.

    Rate this question:

  • 9. 

    (404)What is the time a switch takes to figure out where to forward a data unit called?

    • A.

      Lag

    • B.

      Hop

    • C.

      Latency

    • D.

      Time Zone

    Correct Answer
    C. Latency
    Explanation
    Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay that occurs as the switch processes and forwards the data. The switch needs to analyze the data packet and make a decision on where to send it based on its destination address. This process takes a certain amount of time, which is known as latency.

    Rate this question:

  • 10. 

    (405)What network device is a combination of networking hardware and software that connect two dissimilar kinds of networks?

    • A.

      Switch

    • B.

      Brouter

    • C.

      Gateway

    • D.

      Repeater

    Correct Answer
    C. Gateway
    Explanation
    A gateway is a network device that combines both hardware and software to connect two different types of networks. It acts as an interface between these networks, allowing communication and data transfer between them. Unlike other devices like switches or repeaters, a gateway is specifically designed to handle the conversion and routing of data between dissimilar networks, making it the correct answer in this scenario.

    Rate this question:

  • 11. 

    (405)What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?

    • A.

      A voice/data gateway

    • B.

      An internet gateway

    • C.

      An LAN gateway

    • D.

      A Firewall

    Correct Answer
    B. An internet gateway
    Explanation
    An internet gateway is a type of gateway that can restrict the kind of access local area network (LAN) users have to the internet, and vice versa. It acts as a bridge between the LAN and the internet, controlling the flow of data and allowing only authorized access. It can enforce security policies, filter content, and block certain websites or services to ensure that the LAN users have restricted access to the internet. Additionally, it can also restrict external access to the LAN, providing a secure network environment.

    Rate this question:

  • 12. 

    (405)What type of gateway might include remote access servers that allow dial-up connectivity to a Local Area Network (LAN)?

    • A.

      A voice/data gateway

    • B.

      An internet gateway

    • C.

      An LAN gateway

    • D.

      A Firewall

    Correct Answer
    C. An LAN gateway
    Explanation
    An LAN gateway is the correct answer because it includes remote access servers that allow dial-up connectivity to a Local Area Network (LAN). This type of gateway serves as a bridge between the LAN and external networks, providing secure access for remote users to connect to the LAN using dial-up connections.

    Rate this question:

  • 13. 

    (406)What is a router's strength?

    • A.

      Its intelligence

    • B.

      Its quality of service

    • C.

      Its different interface cards

    • D.

      Its different types of network connectors

    Correct Answer
    A. Its intelligence
    Explanation
    A router's strength lies in its intelligence. This refers to its ability to analyze and make decisions based on data packets it receives, allowing it to efficiently direct network traffic. The intelligence of a router enables it to determine the best path for data transmission, manage network congestion, and prioritize certain types of traffic. This ensures that data is delivered accurately and efficiently, optimizing network performance.

    Rate this question:

  • 14. 

    (406)What is the oldest routing protocol?

    • A.

      Border Gateway Protocol(BGP)

    • B.

      Open Shortest Path First(OSPF)

    • C.

      Routing Information Protocol(RIP)

    • D.

      Enhanced Interior Gateway Routing Protocol(EIGRP)

    Correct Answer
    C. Routing Information Protocol(RIP)
    Explanation
    RIP, or Routing Information Protocol, is considered the oldest routing protocol. It was developed in the early 1980s and was one of the first routing protocols used in computer networks. RIP uses a distance-vector algorithm to determine the best path for data packets to travel through a network. It has a maximum hop count of 15, which limits its scalability in larger networks. Despite its limitations, RIP is still used in some small networks today.

    Rate this question:

  • 15. 

    (406)What is the routing protocol of internet backbones?

    • A.

      Border Gateway Protocol(BGP)

    • B.

      Open Shortest Path First(OSPF)

    • C.

      Routing Information Protocol(RIP)

    • D.

      Enhanced Interior Gateway Routing Protocol(EIGRP)

    Correct Answer
    A. Border Gateway Protocol(BGP)
    Explanation
    The correct answer is Border Gateway Protocol (BGP). BGP is the routing protocol used in internet backbones. It is responsible for exchanging routing information between autonomous systems (AS) and is designed to provide scalability, stability, and security in large-scale networks. BGP allows routers to make informed decisions about the best path for data packets to travel across different networks, ensuring efficient and reliable routing on the internet backbone.

    Rate this question:

  • 16. 

    (407)Based on a specific input address, which Local Area Network (LAN) switch has the lowest delay and should be considered for supporting real-time applications?

    • A.

      Hybrid switch

    • B.

      Cut-through switch

    • C.

      Fragment-free switch

    • D.

      Store and forward switch

    Correct Answer
    B. Cut-through switch
    Explanation
    A cut-through switch is the best choice for supporting real-time applications because it has the lowest delay. Cut-through switches forward packets as soon as the destination address is received, without waiting for the entire packet to be received. This reduces the delay in transmitting data, making it ideal for real-time applications that require quick and efficient data transfer. Hybrid switches, fragment-free switches, and store and forward switches have higher delays compared to cut-through switches, making them less suitable for real-time applications.

    Rate this question:

  • 17. 

    (408)What synchronous optical network (SONET) device aggregates or splits SONET traffic at various speeds so as to provide access to SONET without demultiplexing the SONET signal stream?

    • A.

      Add/Drop multiplexer(ADM)

    • B.

      Drop-and-repeat node(D+R)

    • C.

      Digital cross connect(DCS)

    • D.

      Digital line carrier(DLC)

    Correct Answer
    A. Add/Drop multiplexer(ADM)
    Explanation
    An Add/Drop multiplexer (ADM) is a synchronous optical network (SONET) device that aggregates or splits SONET traffic at various speeds. It allows access to SONET without the need to demultiplex the SONET signal stream. This means that it can add or drop specific channels or signals from the SONET network without interfering with the rest of the traffic. ADMs are commonly used in telecommunications networks to efficiently manage and distribute SONET traffic.

    Rate this question:

  • 18. 

    (408)What Synchronous Optical Network (SONET) devices are configured to split SONET traffic and copy individual channels on two or more output links?

    • A.

      Add/Drop multiplexer(ADM)

    • B.

      Drop-and-repeat node(D+R)

    • C.

      Digital cross connect(DCS)

    • D.

      Digital line carrier(DLC)

    Correct Answer
    B. Drop-and-repeat node(D+R)
    Explanation
    A Drop-and-repeat node (D+R) is a Synchronous Optical Network (SONET) device that is configured to split SONET traffic and copy individual channels on two or more output links. This means that the D+R node can take the incoming SONET traffic and duplicate specific channels onto multiple output links, allowing for redundancy and improved reliability in the network. This feature is useful in scenarios where high availability and fault tolerance are required.

    Rate this question:

  • 19. 

    (408)When tributary units are grouped together they form...

    • A.

      A tributary unit group(TUG)

    • B.

      A virtual container(VC)

    • C.

      Synchronous transport signal level N (STS-N) frames

    • D.

      Synchronous transport modules (STM) frames

    Correct Answer
    A. A tributary unit group(TUG)
    Explanation
    When tributary units are grouped together, they form a tributary unit group (TUG). This implies that multiple tributary units are combined or assembled into a single group or entity called a TUG. The TUG serves as a higher-level unit that encompasses and manages the individual tributary units within it.

    Rate this question:

  • 20. 

    (408)An OC-12's electrical signal is the same as a Synchronous Transport Signal level-12 (STS-12) frame and equal to what Synchronous Transport Modules (STM) frame?

    • A.

      STM-2

    • B.

      STM-4

    • C.

      STM-6

    • D.

      STM-8

    Correct Answer
    B. STM-4
    Explanation
    An OC-12's electrical signal is the same as a Synchronous Transport Signal level-12 (STS-12) frame, which is equivalent to an STM-4 frame.

    Rate this question:

  • 21. 

    (409)Because of its cost, Asynchronous Transfer Mode (ATM) is rarely used on small local area networks (LAN). What technology is better suited for LANs?

    • A.

      Gigabit Ethernet

    • B.

      Fast Ethernet

    • C.

      Ethernet

    • D.

      Synchronous optical network(SONET)

    Correct Answer
    A. Gigabit Ethernet
    Explanation
    ATM is rarely used on small LANs due to its high cost. Gigabit Ethernet, on the other hand, is a technology that provides high-speed data transmission and is better suited for LANs. It offers a data transfer rate of 1 gigabit per second, which is significantly faster than Fast Ethernet and Ethernet. Gigabit Ethernet is more cost-effective and provides better performance, making it the preferred choice for LANs.

    Rate this question:

  • 22. 

    (410)What topology defines the layout of network's devices and media?

    • A.

      Physical

    • B.

      Logical

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. pHysical
    Explanation
    Physical topology refers to the actual physical layout of devices and media in a network. It describes how the devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the types of cables used, and the location of devices within the network. In contrast, logical topology refers to the way in which data flows within the network, regardless of the physical layout. The star and hybrid topologies are examples of physical topologies, where devices are connected to a central hub or a combination of different topologies, respectively.

    Rate this question:

  • 23. 

    (411)What topology consists of devices connected to a common, shared cable?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    A. Bus
    Explanation
    The correct answer is bus. In a bus topology, all devices are connected to a common cable called the bus. This cable acts as a shared communication medium, allowing devices to transmit and receive data. Each device on the bus can access the data transmitted by other devices, making it a simple and cost-effective solution for small networks. However, if the bus cable fails, the entire network can be affected.

    Rate this question:

  • 24. 

    (411)What topology consists of cable segments from each computer connected to a centralized component?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    C. Star
  • 25. 

    (411)What topology has the stations connected in the form of a circle?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    B. Ring
    Explanation
    A ring topology has the stations connected in the form of a circle. In this type of network, each station is connected to exactly two other stations, forming a closed loop. Data is transmitted in one direction around the ring, and each station receives the data and passes it along to the next station until it reaches the intended destination. This topology is commonly used in local area networks (LANs) and allows for efficient data transmission and easy expansion of the network.

    Rate this question:

  • 26. 

    (411)What topology combines two or more different physical topologies in a single network?

    • A.

      Bus

    • B.

      Ring

    • C.

      Star

    • D.

      Hybrid

    Correct Answer
    D. Hybrid
  • 27. 

    (412)What is NOT an advantage of a logical bus topology?

    • A.

      There are no collisions

    • B.

      If a node is down, it does not bring down the entire network

    • C.

      It's the most widely implemented of the logical topologies

    • D.

      Additions and changes can be made easily without affecting other workstations

    Correct Answer
    A. There are no collisions
    Explanation
    A logical bus topology does not eliminate collisions. In a logical bus topology, all nodes share the same communication channel, and when two or more nodes transmit data at the same time, collisions occur. However, collision detection and collision avoidance mechanisms can be implemented to minimize the impact of collisions. Therefore, the statement "There are no collisions" is not an advantage of a logical bus topology.

    Rate this question:

  • 28. 

    (412)What is an advantage of a logical ring topology?

    • A.

      There are no collisions

    • B.

      If a node is down, it does not bring down the entire network

    • C.

      It's the most widely implemented of the logical topologies

    • D.

      Additions and changes can be made easily without affecting other workstations

    Correct Answer
    A. There are no collisions
    Explanation
    In a logical ring topology, there are no collisions because data is transmitted in a sequential manner. Each node has a dedicated time slot to transmit data, ensuring that there is no interference or collision between different nodes. This advantage allows for efficient and reliable communication within the network.

    Rate this question:

  • 29. 

    (413)What data communication protocol uses characters and symbols (character code set) to govern the flow and format of information between systems?

    • A.

      Character-oriented

    • B.

      Bit-oriented

    • C.

      Routing

    • D.

      Internet

    Correct Answer
    A. Character-oriented
    Explanation
    Character-oriented data communication protocol uses characters and symbols (character code set) to govern the flow and format of information between systems. This means that the protocol focuses on the transmission and interpretation of individual characters, allowing for easy understanding and compatibility between different systems. Unlike bit-oriented protocols that focus on the transmission of individual bits, character-oriented protocols provide a higher level of abstraction and are commonly used in applications that require the transmission of human-readable data. Routing and the Internet are not specifically related to the use of characters and symbols in data communication protocols.

    Rate this question:

  • 30. 

    (413)What data communication protocol uses character control or 'handshaking' to link and represent information?

    • A.

      Asynchronous protocol

    • B.

      Binary synchronous protocol

    • C.

      Synchronous Data Link Control(SDLC)

    • D.

      High-Level Data Link Control(HDLC)

    Correct Answer
    B. Binary synchronous protocol
    Explanation
    Binary synchronous protocol is a data communication protocol that uses character control or 'handshaking' to link and represent information. This protocol ensures reliable and error-free transmission of data by using start and stop bits to mark the beginning and end of each character. It also includes error checking mechanisms and acknowledgments to ensure data integrity. Overall, binary synchronous protocol provides a robust and efficient way to transmit data over a communication link.

    Rate this question:

  • 31. 

    (413)What data communication protocol is based on bits and the position of the bits?

    • A.

      Character-oriented

    • B.

      Bit-oriented

    • C.

      Routing

    • D.

      Internet

    Correct Answer
    B. Bit-oriented
    Explanation
    Bit-oriented is the correct answer because this data communication protocol is based on the manipulation and positioning of individual bits. It focuses on the transmission and reception of binary data, where each bit's position and value are crucial for communication. This protocol ensures accurate and reliable data transmission by considering the bits' order and arrangement.

    Rate this question:

  • 32. 

    (413)What data communication protocol ensures that the receiving station can distinguish information from garbage?

    • A.

      Asynchronous protocol

    • B.

      Binary synchronous protocol

    • C.

      Synchronous Data Link Control(SDLC)

    • D.

      High-Level Data Link Control(HDLC)

    Correct Answer
    D. High-Level Data Link Control(HDLC)
    Explanation
    High-Level Data Link Control (HDLC) is a data communication protocol that ensures the receiving station can distinguish information from garbage. HDLC uses a frame structure, which includes a start and end flag, to mark the beginning and end of a frame. This helps the receiving station identify and extract the correct data from the transmission, while ignoring any noise or garbage data. HDLC also provides error detection and correction mechanisms to ensure data integrity and reliability during transmission.

    Rate this question:

  • 33. 

    (414)Which network protocol has DOD chosen as its standard to govern the flow of information?

    • A.

      Binary synchronous protocol(BSC)

    • B.

      Synchronous Data Link Control(SDLC)

    • C.

      High-Level Data Link Control(HDLC)

    • D.

      Transmission control protocol/internet protocol(TCP/IP)

    Correct Answer
    D. Transmission control protocol/internet protocol(TCP/IP)
    Explanation
    The correct answer is TCP/IP. The Department of Defense (DOD) has chosen TCP/IP as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows computers to communicate with each other over the internet. It provides reliable and secure transmission of data, ensuring that information is delivered accurately and efficiently. TCP/IP is widely used and has become the standard protocol for internet communication.

    Rate this question:

  • 34. 

    (414)Which TCP/IP Network layer protocol provides information about how and where data should be delivered, including the data's source and destination addresses?

    • A.

      Internet Protocol(IP)

    • B.

      Address Resolution Protocol(ARP)

    • C.

      Reverse Address Resolution Protocol(RARP)

    • D.

      Internet Control Message Protocol(ICMP)

    Correct Answer
    A. Internet Protocol(IP)
    Explanation
    The correct answer is Internet Protocol (IP). IP is responsible for providing information about how and where data should be delivered, including the source and destination addresses. It is a network layer protocol that ensures the proper routing and delivery of data packets across different networks. IP addresses are used to uniquely identify devices on a network and facilitate the transmission of data between them.

    Rate this question:

  • 35. 

    (414)Which TCP/IP Network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address?

    • A.

      IP

    • B.

      Address Resolution Protocol(ARP)

    • C.

      Reverse Address Resolution Protocol(RARP)

    • D.

      Internet Control Message Protocol(ICMP)

    Correct Answer
    B. Address Resolution Protocol(ARP)
    Explanation
    ARP (Address Resolution Protocol) is the correct answer because it is the TCP/IP Network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses by broadcasting an ARP request on the local network and receiving an ARP reply from the device with the corresponding MAC address. This allows devices to communicate with each other at the data link layer using MAC addresses.

    Rate this question:

  • 36. 

    (414)Which TCP/IP Network layer protocol provides messaging that can help with troubleshooting?

    • A.

      IP

    • B.

      Address Resolution Protocol(ARP)

    • C.

      Reverse Address Resolution Protocol(RARP)

    • D.

      Internet Control Message Protocol(ICMP)

    Correct Answer
    D. Internet Control Message Protocol(ICMP)
    Explanation
    ICMP is a TCP/IP network layer protocol that provides messaging for troubleshooting purposes. It is used to send error messages and operational information about network conditions. ICMP messages can be used to diagnose network connectivity issues, identify problems with routers or hosts, and determine the status of network devices. It is commonly used by network administrators and technicians to troubleshoot and resolve network problems.

    Rate this question:

  • 37. 

    (414)Which TCP/IP Application layer protocol is used to send and receive files via TCP/IP?

    • A.

      File Transfer Protocol(FTP)

    • B.

      Trivial File Transfer Protocol(TFTP)

    • C.

      Simple Mail transfer Protocol(SMTP)

    • D.

      HyperText Transfer Protocol(HTTP)

    Correct Answer
    A. File Transfer Protocol(FTP)
    Explanation
    The correct answer is File Transfer Protocol (FTP). FTP is a TCP/IP application layer protocol that is used to transfer files between a client and a server on a network. It provides a simple and standardized way to send and receive files, allowing users to upload, download, and manage files on remote servers. FTP uses TCP as its transport protocol, ensuring reliable and secure file transfer over the network.

    Rate this question:

  • 38. 

    (414)Which protocol is a simpler way to transfer files between computers but is simpler or more trivial than FTP?

    • A.

      File Transfer Protocol(FTP)

    • B.

      Trivial File Transfer Protocol(TFTP)

    • C.

      Simple Mail transfer Protocol(SMTP)

    • D.

      HyperText Transfer Protocol(HTTP)

    Correct Answer
    B. Trivial File Transfer Protocol(TFTP)
    Explanation
    TFTP is a simpler way to transfer files between computers compared to FTP. It is considered more trivial because it lacks some of the advanced features and functionalities of FTP. TFTP is primarily used for simple file transfers and is commonly used in scenarios where simplicity and efficiency are more important than advanced capabilities.

    Rate this question:

  • 39. 

    (414)Which TCP/IP Application layer protocol is a terminal emulation protocol used to log on to remote hosts?

    • A.

      Telnet

    • B.

      Trivial File Transfer Protocol(TFTP)

    • C.

      Simple Mail Transfer Protocol(SMTP)

    • D.

      HyperText Transfer Protocol(HTTP)

    Correct Answer
    A. Telnet
    Explanation
    Telnet is a TCP/IP Application layer protocol that allows users to log on to remote hosts and access them as if they were directly connected to the local machine. It provides terminal emulation, allowing users to interact with the remote host's command-line interface. Telnet is commonly used for remote administration, troubleshooting, and accessing network devices. It is a simple and lightweight protocol that transmits data in clear text, making it less secure compared to other protocols like SSH.

    Rate this question:

  • 40. 

    (414)Which TCP/IP Application layer protocol is an automated means of assigning a unique IP address to every device on a network?

    • A.

      Dynamic Host Configuration Protocol(DHCP)

    • B.

      Trivial File Transfer Protocol(TFTP)

    • C.

      Simple Mail Transfer Protocol(SMTP)

    • D.

      HyperText Transfer Protocol(HTTP)

    Correct Answer
    A. Dynamic Host Configuration Protocol(DHCP)
    Explanation
    DHCP is an automated means of assigning a unique IP address to every device on a network. It allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration settings automatically. This eliminates the need for manual IP address assignment, making it easier to manage and scale networks. TFTP is a file transfer protocol, SMTP is used for email transmission, and HTTP is used for web communication, so they are not directly related to assigning IP addresses.

    Rate this question:

  • 41. 

    (414)Which TCP/IP Application layer protocol is a simple protocol used to synchronize the clocks of computers on a network?

    • A.

      Dynamic Host Configuration Protocol(DHCP)

    • B.

      Simple Network Management Protocol(SNMP)

    • C.

      Network Time Protocol(NTP)

    • D.

      Packet Internet Groper(PING)

    Correct Answer
    C. Network Time Protocol(NTP)
    Explanation
    Network Time Protocol (NTP) is a TCP/IP Application layer protocol used to synchronize the clocks of computers on a network. It allows computers to maintain accurate time synchronization by exchanging time information between clients and servers. NTP uses a hierarchical system of time sources, where lower-level servers synchronize with higher-level servers, ultimately obtaining time from highly accurate reference clocks. This ensures that all devices on the network have a consistent and accurate time, which is crucial for various network operations and services that rely on synchronized timekeeping. DHCP, SNMP, and PING are not specifically designed for clock synchronization.

    Rate this question:

  • 42. 

    (414)Which TCP/IP Application layer protocol is a utility that can verify that TCP/IP is installed and communicating with the network?

    • A.

      Dynamic Host Configuration Protocol(DHCP)

    • B.

      Simple Network Management Protocol(SNMP)

    • C.

      Network Time Protocol(NTP)

    • D.

      Packet Internet Groper(PING)

    Correct Answer
    D. Packet Internet Groper(PING)
    Explanation
    PING is a utility that sends a message to a specific IP address or domain name and waits for a response. It is commonly used to test network connectivity and verify if TCP/IP is installed and functioning correctly. PING sends a series of small packets to the target address and measures the time it takes for the packets to be sent and received. If a response is received, it confirms that the network is properly configured and communication is established. Therefore, PING is the correct answer for this question.

    Rate this question:

  • 43. 

    (415)What is a group of computers and associated devices that share a common communications line within a small geographic?

    • A.

      Metropolitan area network(MAN)

    • B.

      Local area network(LAN)

    • C.

      Wide area network(WAN)

    • D.

      Virtual Private Network(VPN)

    Correct Answer
    B. Local area network(LAN)
    Explanation
    A local area network (LAN) is a group of computers and associated devices that share a common communications line within a small geographic area. This network is typically confined to a building or a campus and is used to facilitate communication and resource sharing among the devices connected to it. Unlike a wide area network (WAN) or a metropolitan area network (MAN), a LAN has a smaller coverage area and is usually privately owned and operated by an organization. A virtual private network (VPN) is a technology that allows users to securely access a private network over a public network, but it is not specifically related to a group of computers sharing a common communications line within a small geographic area.

    Rate this question:

  • 44. 

    (415)The interconnection of several networks of computer resources in a city into a single larger network is a...

    • A.

      Local area network(LAN)

    • B.

      Wide area network(WAN)

    • C.

      Virtual Private Network(VPN)

    • D.

      Metropolitan area network(MAN)

    Correct Answer
    D. Metropolitan area network(MAN)
    Explanation
    A metropolitan area network (MAN) is the correct answer because it refers to the interconnection of several networks of computer resources in a city into a single larger network. A LAN is a network that covers a small area, such as a home or office. A WAN is a network that spans a large geographical area, such as multiple cities or countries. A VPN is a secure private network that allows users to access a network remotely. Therefore, a MAN best describes the scenario where multiple networks in a city are interconnected into a larger network.

    Rate this question:

  • 45. 

    (415)What type of network enables a group of two or more computer systems to communicate over the public internet?

    • A.

      Local area network(LAN)

    • B.

      Wide area network(WAN)

    • C.

      Virtual Private Network(VPN)

    • D.

      Metropolitan area network(MAN)

    Correct Answer
    C. Virtual Private Network(VPN)
    Explanation
    A Virtual Private Network (VPN) enables a group of computer systems to communicate over the public internet by creating a secure and encrypted connection. It allows users to access and share data remotely while maintaining privacy and security. VPNs are commonly used by businesses to connect remote offices or remote workers to the main office network, as well as by individuals to secure their internet connections and protect their online activities from prying eyes.

    Rate this question:

  • 46. 

    (416)What network model enables users to share resources, files, and printers in a decentralized way?

    • A.

      Intranet

    • B.

      Extranet

    • C.

      Peer-to-peer

    • D.

      Client-server

    Correct Answer
    C. Peer-to-peer
    Explanation
    Peer-to-peer network model enables users to share resources, files, and printers in a decentralized way. In this model, each device on the network can act as both a client and a server, allowing users to directly connect and share resources without the need for a central server. This model is commonly used in file-sharing applications and allows for greater flexibility and scalability compared to other network models.

    Rate this question:

  • 47. 

    (416)What network model is a centralized model for data storage, security, running applications, and network administration?

    • A.

      Intranet

    • B.

      Extranet

    • C.

      Peer-to-peer

    • D.

      Client-server

    Correct Answer
    D. Client-server
    Explanation
    A client-server network model is a centralized model for data storage, security, running applications, and network administration. In this model, there are dedicated servers that store and manage data, run applications, and handle security measures. Clients, on the other hand, are devices that connect to the servers to access the resources and services provided. This model allows for efficient management and control of the network, ensuring that data and applications are centrally managed and accessed by authorized users.

    Rate this question:

  • 48. 

    (417)What is the physical address of any device on the network?

    • A.

      Internet protocol version 4(IPv4) address

    • B.

      Internet protocol version 6(IPv6) address

    • C.

      Static internet protocol(IP) address

    • D.

      Media Access Control(MAC) address

    Correct Answer
    D. Media Access Control(MAC) address
    Explanation
    A MAC address is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. It is a hardware address that is physically assigned to the device and remains constant, regardless of the network it is connected to. Unlike IP addresses, MAC addresses are not assigned by a network administrator and cannot be changed. Therefore, the MAC address is the physical address of any device on the network.

    Rate this question:

  • 49. 

    (417)What address is a 32-bit number?

    • A.

      Internet protocol version 4(IPv4) address

    • B.

      Internet protocol version 6(IPv6) address

    • C.

      Static internet protocol(IP) adress

    • D.

      Media Access Control(MAC) address

    Correct Answer
    A. Internet protocol version 4(IPv4) address
    Explanation
    A 32-bit number is the format used for Internet Protocol version 4 (IPv4) addresses. IPv4 addresses are used to identify devices on a network and are made up of four sets of numbers separated by periods. Each set can range from 0 to 255, resulting in a total of approximately 4.3 billion unique addresses. However, due to the rapid growth of the internet, the number of available IPv4 addresses is now limited, leading to the development and adoption of IPv6, which uses a 128-bit number format.

    Rate this question:

  • 50. 

    (417)What address uses a 128 bit addressing scheme?

    • A.

      Internet protocol version 4(IPv4) address

    • B.

      Internet protocol version 6(IPv6) address

    • C.

      Static internet protocol(IP) adress

    • D.

      Media Access Control(MAC) address

    Correct Answer
    B. Internet protocol version 6(IPv6) address
    Explanation
    IPv6 addresses use a 128-bit addressing scheme, which allows for a significantly larger number of unique addresses compared to IPv4. This is necessary due to the increasing number of devices connected to the internet. IPv6 addresses are written in a hexadecimal format and are separated by colons.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 14, 2009
    Quiz Created by
    Barrym07
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.