1.
(201) What layer of the Open System Interconnect model defines the electrical, mechanical,
procedural, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data over the network, including the physical medium, such as cables or wireless signals, and the encoding and decoding of data bits.
2.
(201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect
Data Link Layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control.
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for managing communication links and providing error correction. The Media Access Control (MAC) sublayer handles the access to the physical media and controls the transmission of data. These two sublayers work together to ensure reliable and efficient communication between network devices.
3.
(201) At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between network devices over a physical link. Network switches and bridges use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address of incoming packets and forward them only to the appropriate port, improving network efficiency and reducing collisions.
4.
(201) At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network
Explanation
Routers operate at the Network layer of the Open System Interconnect (OSI) model. This layer is responsible for logical addressing and routing of data packets between different networks. Routers use this layer to make decisions on how to forward packets based on the destination IP address. By operating at the Network layer, routers can connect multiple networks and enable communication between them by determining the best path for data transmission.
5.
(201) At what Open System Interconnect layer are common data compression and encryption
schemes used?
Correct Answer
C. Presentation
Explanation
Data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting and presenting data in a way that can be understood by the application layer. Data compression reduces the size of the data, making it more efficient to transmit, while encryption ensures the security and confidentiality of the data. Therefore, both these techniques are commonly implemented at the Presentation layer.
6.
(201) What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application.
Explanation
The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with the user and serves as the interface between the user and the network. The other layers (Session, Presentation, and Transport) are responsible for tasks such as establishing connections, data formatting, and reliable data transfer, but they are not directly involved in user interactions.
7.
(201) What is a formal set of rules and conventions that govern how computers exchange
information over a network medium?
Correct Answer
D. Protocol
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that devices can communicate effectively and understand each other's messages, allowing for reliable and efficient data exchange.
8.
(202) What topology defines the layout of a network’s devices and media?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical. The topology of a network refers to the arrangement of its devices and media. This includes the physical layout and connections between devices, such as how they are physically connected using cables or wireless connections. The physical topology determines how devices are physically arranged and connected to each other in a network, such as in a bus, ring, star, or mesh configuration.
9.
(202) What topology defines the way in which devices communicate, and data is transmitted,
throughout the network?
Correct Answer
B. Logical
Explanation
The correct answer is Logical. Logical topology refers to the way in which devices communicate and data is transmitted in a network. It defines the logical connections between devices, regardless of their physical locations. This includes the paths that data takes from one device to another, the protocols used for communication, and the logical organization of the network.
10.
(202) What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus
Explanation
A bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable, which acts as a backbone. Each device on the bus network can transmit data and receive data from the cable. The advantage of a bus topology is that it is simple and cost-effective to implement, as it requires less cabling compared to other topologies. However, a disadvantage is that if the cable fails, the entire network can be affected.
11.
(202) What topology consists of cable segments from each computer connected to a centralized
component?
Correct Answer
C. Star
Explanation
A star topology consists of cable segments from each computer connected to a centralized component, typically a switch or hub. In this configuration, all the devices are connected to a central point, allowing for easy management and troubleshooting. Each device has its own dedicated connection to the central component, which provides better performance and reliability compared to other topologies like bus or ring. This topology also allows for easy expansion and scalability as new devices can be added without affecting the existing connections.
12.
(202) What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that the network can have a combination of bus, ring, star, or any other topology. In a hybrid topology, different sections of the network may use different topologies depending on the requirements of that section. This allows for flexibility and scalability in the network design, as different sections can be configured to suit their specific needs.
13.
(203) Which network protocol has the Department of Defense chosen as its standard to govern the
flow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol.
Explanation
The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable transmission of data over networks, including the internet. It is widely used and provides a robust and scalable solution for networking, making it a suitable choice for the Department of Defense's needs.
14.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the
service of matching a known IP address for a destination device to a Media Access Control
address?
Correct Answer
B. Address Resolution Protocol.
Explanation
The correct answer is Address Resolution Protocol. The Address Resolution Protocol (ARP) is responsible for mapping an IP address to a MAC address in a local network. When a device wants to send data to another device in the same network, it needs to know the MAC address of the destination device. ARP helps in this process by sending out an ARP request to all devices in the network, asking for the MAC address associated with a specific IP address. The device with the matching IP address responds with its MAC address, allowing the sender to establish a connection and send data.
15.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the
IP address for a device that knows its own MAC address?
Correct Answer
C. Reverse Address Resolution Protocol.
Explanation
Reverse Address Resolution Protocol (RARP) is the correct answer because it is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request the corresponding IP address. This is useful in scenarios where a device does not have a preconfigured IP address and needs to obtain one dynamically.
16.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides
messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol.
Explanation
The correct answer is Internet Control Message Protocol. Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging for troubleshooting purposes. It allows network devices to send error messages and operational information to indicate any issues or errors encountered during data transmission. ICMP messages can be used to diagnose network connectivity problems, determine the availability of network services, and troubleshoot network configuration issues.
17.
(203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides
reliable data delivery services?
Correct Answer
C. Transmission Control Protocol.
Explanation
The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors by using acknowledgment mechanisms, flow control, and error detection and correction. TCP is widely used in applications that require reliable and ordered delivery of data, such as web browsing, file transfer, and email.
18.
(203) What application within Transmission Control Protocol/Internet Protocol is used to send
and receive files via TCP?
Correct Answer
A. File Transfer Protocol.
Explanation
The correct answer is File Transfer Protocol (FTP). FTP is specifically designed for sending and receiving files over a TCP/IP network. It provides a standard set of commands for accessing and transferring files between computers. FTP is widely used for uploading files to a website, downloading files from a server, and transferring files between computers on a network. It ensures reliable and secure file transfer by using TCP as the underlying protocol. Trivial File Transfer Protocol (TFTP) is a simpler version of FTP, but it does not provide the same level of functionality and security. Simple Mail Transfer Protocol (SMTP) is used for sending emails, and HyperText Transfer Protocol (HTTP) is used for transferring web pages.
19.
(204) What type of network connects networks that are typically separated by geographical
distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network.
Explanation
A Wide Area Network (WAN) is the correct answer because it connects networks that are separated by geographical distances, such as between cities, states, countries, or even around the world. Unlike a Local Area Network (LAN) which connects devices within a limited area, a WAN allows for communication and data transfer over long distances. Other options like Virtual Private Network (VPN) and Metropolitan Area Network (MAN) may also connect networks, but they are not specifically designed for long-distance connections like a WAN.
20.
(204) What type of network makes use of tunneling and security protocols to enables a group of
two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual Private Network
Explanation
A Virtual Private Network (VPN) is a type of network that utilizes tunneling and security protocols to allow a group of two or more computer systems to communicate over the public Internet. It creates a secure and encrypted connection between the systems, ensuring that the data transmitted between them remains private and protected from unauthorized access. VPNs are commonly used by businesses and individuals to establish secure connections and access resources remotely, providing a level of privacy and security that is not possible with a Local Area Network or a Wide Area Network.
21.
(204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080
Explanation
Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While the default port for HTTP is 80, port 8080 is often used as an alternative port for HTTP. It is commonly used for testing or running web servers on non-standard ports, allowing developers to run multiple web servers on the same machine. This port is also used for proxy servers, which act as intermediaries between clients and servers, forwarding HTTP requests and responses.
22.
(205) How many bits are in an IPv4 address?
Correct Answer
B. 32 bits
Explanation
An IPv4 address is a 32-bit address used to identify devices on a network. This means that there are 32 bits in an IPv4 address. Each bit can have a value of either 0 or 1, resulting in a total of 2^32 possible unique addresses.
23.
(205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation.
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four parts, each separated by a dot. Each part represents a decimal value ranging from 0 to 255, making it easier for users to read and remember. This format is widely used and understood, allowing users to easily identify and communicate IP addresses.
24.
(205) Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A
Explanation
An IPv4 address is divided into different classes based on the range of the first octet. In this case, the range is given as 1-126, which falls within the range of Class A addresses. Class A addresses have the first bit set to 0, indicating that the network portion of the address is in the first octet. This allows for a large number of networks with a smaller number of hosts per network.
25.
(205) What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C
Explanation
Class C is the correct answer because it is the class of IPv4 addresses that is typically used for small to medium-sized networks. Class C addresses have a default subnet mask of 255.255.255.0, which allows for up to 254 usable host addresses. Since the question states that the network has about 250 nodes, Class C would be the most appropriate choice. Class D is used for multicast addresses, Class E is reserved for experimental use, and Class F is currently unassigned.
26.
(205) What IPv4 class address is used for multicast addressing?
Correct Answer
B. Class D
Explanation
Class D is the correct answer because it is the class of IPv4 addresses specifically reserved for multicast addressing. Multicast is a method of sending network packets to a group of devices simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are used for applications like video streaming, online gaming, and audio conferencing where data needs to be distributed to multiple recipients.
27.
(205) What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1
Explanation
The IPv4 reserved address used for loop back is 127.0.0.1. This address is reserved for the loopback interface, which allows a device to send network traffic to itself. When a device sends traffic to 127.0.0.1, it is looped back internally and does not leave the device. This is commonly used for testing and troubleshooting network connectivity on a local machine.
28.
(205) What is a mechanism that allows a network device to divide an IP address into a network
and host number?
Correct Answer
A. Subnet mask
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is a 32-bit number that is used to identify the network portion of an IP address. By using a subnet mask, the device can determine which part of the IP address belongs to the network and which part belongs to the host. This division is essential for routing and forwarding packets within a network.
29.
(205) What is the default classful subnet mask on class B networks?
Correct Answer
A. 255.255.0.0
Explanation
The default classful subnet mask for class B networks is 255.255.0.0. Class B networks have a default subnet mask of 255.255.0.0, which means that the network portion of the IP address is the first two octets and the host portion is the last two octets. This allows for a maximum of 65,534 hosts per network.
30.
(205) What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
B. Classless Inter-Domain Routing.
Explanation
Classless Inter-Domain Routing (CIDR) is a method that borrows bits from the host field of an IP address to create a subnet. It allows for more flexible and efficient allocation of IP addresses by allowing variable-length subnet masks. This means that instead of being restricted to the fixed subnet masks used in classful subnet masking, CIDR allows for the creation of subnets of different sizes based on the specific needs of the network. This helps to conserve IP address space and improve network scalability.
31.
(206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format.
Explanation
IPv6 addresses are expressed in colon hexadecimal format to make them more user-friendly. In this format, the address is divided into eight groups of four hexadecimal digits, separated by colons. This format allows for a larger address space compared to IPv4, which uses dotted decimal notation. The use of hexadecimal makes it easier for users to read and remember the addresses. Octal and binary formats are not used for IPv6 addresses.
32.
(206) What notation is expressed in leading zero compression for IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234.
Explanation
Leading zero compression is a notation used in IPv6 to simplify the representation of consecutive blocks of zeros. It allows for the omission of one or more consecutive blocks of zeros, replacing them with a double colon "::". In the given answer, the notation "1234:1234:0:0:1234:0:0:1234" represents leading zero compression because it contains consecutive blocks of zeros that have been compressed using the "::" notation.
33.
(206) What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678.
Explanation
The correct answer is 10AB::3:0:1234:5678. This notation represents zero compression in IPv6. In IPv6, consecutive blocks of zeros can be compressed by using a double colon (::) to represent multiple blocks of zeros. In this notation, the double colon is used to compress two blocks of zeros, resulting in a shorter representation of the IPv6 address.
34.
(206) What Unicast address scope operates within a network segment, and will not originate from,
or be destined to, an interface that requires a router to direct traffic?
Correct Answer
B. Link-local
Explanation
Link-local addresses are used for communication within a network segment and do not require a router to direct traffic. These addresses are automatically assigned to interfaces and are only valid within the local network. They are not routable and cannot be used to communicate with devices outside of the network segment. Therefore, link-local addresses operate within a network segment and do not originate from, or be destined to, an interface that requires a router.
35.
(206) What Unicast address scope is designed to be private, internally routable addresses that do
not route outside the site?
Correct Answer
A. Site-local
Explanation
Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique. Site-local addresses were deprecated in favor of Unique Local Addresses (ULA) by RFC 4193, but they are still used in some legacy systems. They provide a way for organizations to have private addressing within their network without the need for global routing.
36.
(206) What Unicast address scope is publicly accessible with the Network ID portion of the
address broken up into different areas allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global
Explanation
Aggregatable Global is the correct answer because it refers to the unicast address scope that is publicly accessible, with the Network ID portion of the address broken up into different areas. This allows for hierarchical design and allocation, meaning that the address can be divided into smaller subnets or areas for more efficient routing and management. Aggregatable Global addresses are routable on the public internet and are designed to support global connectivity.