1.
Which of the following are advantages of a client/server network? (Choose 2)
Correct Answer(s)
A. Centrailised administration
C. Avoid file duplication and corruption
Explanation
A client/server network offers the advantage of centralized administration, which means that network resources and user accounts can be managed from a single location. This simplifies the management process and allows for better control and security. Additionally, a client/server network helps to avoid file duplication and corruption by storing files on a central server. This ensures that multiple users can access and edit the same file without the risk of creating conflicting versions or losing data.
2.
Which of the following is correct about a peer-to-peer network?
Correct Answer
C. There is no centralised data storage
Explanation
A peer-to-peer network is a type of network where all devices have equal capabilities and responsibilities. In this type of network, there is no central server or central storage location for data. Instead, each device in the network can act as both a client and a server, allowing for direct communication and file sharing between devices. This decentralized approach to data storage means that each device is responsible for storing and managing its own data, eliminating the need for a central storage location.
3.
Data travelling in two directions at once is called ____ ______? (2 words)
Correct Answer
Full Duplex
Matt Damon
4.
Which of the following describes a class C IP address?
Correct Answer
D. Used by small networks
Explanation
A class C IP address is typically used by small networks. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, with the first octet always starting with a number between 192 and 223. These addresses provide a relatively small number of available network addresses, making them suitable for smaller networks such as home networks or small businesses. Large networks typically require more available addresses and therefore use class A or class B IP addresses.
5.
Which of the following is a class A subnet mask?
Correct Answer
A. 255.0.0.0
Explanation
The subnet mask 255.0.0.0 is a class A subnet mask because it has a network portion of 8 bits, which means it can support a large number of networks and a small number of hosts per network. Class A subnet masks have a range of 1.0.0.0 to 126.0.0.0 and are typically used for large organizations with a large number of hosts.
6.
Software used to automatically assign IP addresses is called? (4 words)
Correct Answer
Dynamic Host Configuration Protocol
DHCP
Matt Damon
Explanation
The correct answer is Dynamic Host Configuration Protocol (DHCP). DHCP is a software protocol that automatically assigns IP addresses to devices on a network. It simplifies network administration by eliminating the need for manual IP address configuration. Matt Damon is not relevant to the question and can be disregarded.
7.
The information a DHCP server can assign to hosts is? (Choose 3 )
Correct Answer(s)
A. IP address
B. Default gateway
D. Subnet Mask
Explanation
A DHCP server can assign IP addresses, default gateways, and subnet masks to hosts. IP addresses are necessary for devices to communicate with each other over a network. A default gateway is the IP address of the router that connects a local network to other networks. It is used to forward network traffic between different networks. Subnet masks determine the network portion and host portion of an IP address, allowing devices to identify which network they belong to and which hosts are on the same network.
8.
A small, fast protocol designed for a workgroup network, which requires no internet connection is?
Correct Answer
B. NetBeui/BetBios
Explanation
NetBeui/BetBios is the correct answer because it is a small and fast protocol specifically designed for workgroup networks. Unlike TCP/IP, which is used for internet connections, NetBeui/BetBios does not require an internet connection. HTTP/HTTPs and FTP are protocols used for web browsing and file transfer respectively, but they are not specifically designed for workgroup networks without internet access.
9.
Which protocols are for use when downloading emails from an email server? (Choose 2)
Correct Answer(s)
B. POP3
D. IMAP
Explanation
POP3 and IMAP are protocols that are used for downloading emails from an email server. POP3 (Post Office Protocol version 3) is a standard protocol used for retrieving emails from a remote server to a local client. It allows the user to download and delete emails from the server. IMAP (Internet Message Access Protocol) is another protocol used for email retrieval. Unlike POP3, IMAP allows the user to access and manage their emails directly on the server, providing more flexibility and synchronization options across multiple devices.
10.
A command line tool used to test connectivity with a server is? (1 word)
Correct Answer(s)
Ping
Matt Damon
Explanation
Ping is the correct answer. Ping is a command line tool used to test connectivity with a server. It sends a small packet of data to the server and waits for a response. If the server responds, it indicates that there is a connection between the client and the server. Matt Damon is not a command line tool and is unrelated to testing connectivity with a server.
11.
Which network cabling is immune to EMI and provides the fastest speeds?
Correct Answer
C. Fiber optic
Explanation
Fiber optic cabling is immune to electromagnetic interference (EMI) due to its use of light signals instead of electrical signals. This makes it less susceptible to interference from nearby electronic devices or power sources. Additionally, fiber optic cables provide the fastest speeds compared to other options mentioned. This is because they can transmit data at a much higher bandwidth and over longer distances without loss of signal quality.
12.
The topology which allows for most redundancy is? (1 word)
Correct Answer
Mesh
Matt Damon
13.
How does CSMA/CD known when to send data on the network?
Correct Answer
B. Listens for when the network is clear to send information
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to ensure that multiple devices can share the same network without causing collisions. In order to avoid collisions, CSMA/CD listens for when the network is clear to send information. It first checks if the network is idle, meaning no other device is currently transmitting data. If the network is clear, it sends its own information. However, if it detects another device transmitting at the same time, it aborts its transmission and waits for a random amount of time before attempting to send again. This process helps to minimize collisions and optimize network efficiency.
14.
Maximum length of a 10000BaseT cable is?
Correct Answer
B. 100m
Explanation
The maximum length of a 10000BaseT cable is 100m. This is because 10000BaseT is a type of Ethernet technology that uses twisted pair cabling, specifically Category 6 or higher. The maximum distance that can be achieved with this type of cable is 100m, beyond which the signal may degrade and cause transmission errors.
15.
Which wireless standard transmits at 54mb/s, and operates in at 2.4ghz?
Correct Answer
D. 802.11g
Explanation
802.11g is the correct answer because it is a wireless standard that operates at a speed of 54mb/s and uses the 2.4GHz frequency. This standard was introduced as an improvement over the previous 802.11b standard, offering faster data transfer rates. It is widely used in home and small office networks for its compatibility with older devices and its ability to provide a decent balance between speed and range.
16.
Which layer of the OSI model deals with transport and flow control across a network?
Correct Answer
A. Transport
Explanation
The correct answer is Transport. The Transport layer of the OSI model is responsible for providing reliable and transparent transfer of data between end systems. It ensures that data is delivered error-free, in the correct order, and with proper flow control. This layer also handles segmentation and reassembly of data, as well as multiplexing and demultiplexing of different connections on the same network.
17.
A MAC address is?
Correct Answer
C. Is burned onto the network card
Explanation
A MAC address is burned onto the network card because it is a unique identifier assigned to the network interface hardware. It is a permanent address that cannot be changed by the user. This address is used to identify devices on a network and is essential for communication between devices.
18.
Which type of DSL line has speeds of 384kb/s to 6mb/s and typically has a higher download speed than upload speed
Correct Answer
A. ADSL
Explanation
ADSL (Asymmetric Digital Subscriber Line) is the correct answer. ADSL is a type of DSL line that offers speeds ranging from 384kb/s to 6mb/s. It is called "asymmetric" because it typically provides a higher download speed compared to the upload speed. This makes it suitable for activities such as web browsing, streaming, and downloading files, where users require faster download speeds.
19.
The network protocol which translates a network name into an IP address is called? (3 words)
Correct Answer
Domain Name Server
DNS
Matt Damon
Explanation
The correct answer is Domain Name Server (DNS). DNS is a network protocol that translates a network name into an IP address. It is responsible for resolving domain names to their corresponding IP addresses, allowing users to access websites and other resources on the internet using easy-to-remember domain names instead of complicated IP addresses. Matt Damon is not related to this network protocol.