1.
Which three statements about networks are accurate?
Correct Answer(s)
A. Networks are used to transmit data in various environments, including homes, small businesses, and large enterprises.
B. A main office can have hundreds or even thousands of people who depend on network access to do their jobs.
C. A network is a connected collection of devices that can communicate with each other.
Explanation
The three statements that are accurate about networks are: networks are used to transmit data in various environments, including homes, small businesses, and large enterprises; a main office can have hundreds or even thousands of people who depend on network access to do their jobs; and a network is a connected collection of devices that can communicate with each other. These statements highlight the versatility and importance of networks in facilitating communication and information sharing among different devices and users in various settings.
2.
What is the purpose of a router?
Correct Answer
A. To interconnect networks and choose the best paths between them.
Explanation
A router's purpose is to interconnect networks and choose the best paths between them. It acts as a gateway between different networks, directing network traffic to its intended destination. By analyzing the network topology and using routing protocols, a router determines the most efficient path for data packets to travel. This allows for effective communication and data transfer between networks, ensuring optimal performance and connectivity.
3.
What is the purpose of a switch?
Correct Answer
D. To provide network attachment to the end systems and intelligent switching of the data within the local network
Explanation
The purpose of a switch is to provide network attachment to the end systems and intelligent switching of the data within the local network. This means that the switch connects devices within a local network, allowing them to communicate with each other. The switch also has the ability to analyze the data packets it receives and determine the most efficient route for transmitting the data. This helps to optimize network performance and ensure that data is delivered to its intended destination accurately and quickly.
4.
What is the purpose of interconnections?
Correct Answer
C. To provide the means for data to travel from one point to another in the network
Explanation
The purpose of interconnections is to provide the means for data to travel from one point to another in the network. Interconnections allow for the establishment of communication between separate networks and facilitate the transmission of data. They enable the data to be routed efficiently and choose the path over which it is sent to its destination. Interconnections also provide network attachment to the end systems and allow for intelligent switching of data within the local network.
5.
Which resource cannot be shared on a network?
Correct Answer
A. Memory
Explanation
Memory cannot be shared on a network because it is a physical component of a computer system that stores data and instructions temporarily. It is directly connected to the processor and is not designed to be accessed or shared by other devices on a network. In contrast, applications, peripherals, storage devices, and data can all be shared on a network, allowing for collaboration and access from multiple devices.
6.
Which three of the following are common network applications?
Correct Answer(s)
A. Email
B. Collaboration
D. Databases
Explanation
The three common network applications are email, collaboration, and databases. Email is a widely used application for sending and receiving messages over a network. Collaboration refers to the ability to work together on projects or documents in real-time, often through shared platforms or software. Databases are used to store and manage large amounts of structured data, allowing for efficient retrieval and manipulation of information.
7.
BLANK indicates how fast data is transmitted over the network
Correct Answer(s)
Speed
Explanation
The term "speed" refers to how fast data is transmitted over the network. It represents the rate at which information can be sent and received between devices or systems. A higher speed means that data can be transmitted more quickly, resulting in faster communication and data transfer. The speed of a network is an essential factor in determining its efficiency and performance.
8.
BLANK indicates the general price of components, installation, and maintenance of the network
Correct Answer(s)
Cost
Explanation
The given answer, "Cost," is the most suitable explanation for the blank in the question. The word "cost" fits perfectly in the sentence and accurately represents the general price associated with components, installation, and maintenance of the network.
9.
BLANK indicates the protection level of the network itself and the data that is transmitted
Correct Answer(s)
Security
Explanation
The given answer "Security" is the correct answer because the term "security" is used to indicate the protection level of the network itself and the data that is transmitted. Security measures are implemented to safeguard against unauthorized access, breaches, and threats to ensure the confidentiality, integrity, and availability of the network and its data.
10.
BLANK indicates how easily users can access the network
Correct Answer(s)
Availability
Explanation
The term "availability" refers to the extent to which users can access the network easily. It indicates the level of accessibility and reliability of the network, ensuring that it is consistently available and operational for users to connect and utilize its resources. This can include factors such as uptime, responsiveness, and the absence of downtime or service interruptions.
11.
BLANK indicates how well the network can accomodate more users or data transmission requirements
Correct Answer(s)
Scalability
Explanation
Scalability refers to the ability of a network to accommodate more users or data transmission requirements. It determines the network's capacity to handle increasing demands and grow in size without experiencing performance degradation or bottlenecks. A scalable network can easily scale up or down to meet the growing needs of users and adapt to changes in data transmission requirements. It ensures that the network remains efficient and reliable even as the number of users or data transmission increases.
12.
BLANK indicates the dependability of the network
Correct Answer(s)
Reliability
Explanation
The term "reliability" refers to the ability of a network to consistently perform its intended functions without failure or interruption. It measures the dependability of the network in terms of its stability and consistency. A reliable network ensures that data and information can be transmitted and received accurately and consistently, minimizing the risk of errors, downtime, or disruptions. Therefore, "reliability" is the most appropriate term to indicate the dependability of a network.
13.
BLANK indicates the structure of the network
Correct Answer(s)
Topology
Explanation
The term "topology" refers to the structure or layout of a network. It describes how the devices and components of a network are connected and arranged. Different types of network topologies include bus, star, ring, mesh, and hybrid. The answer "topology" is correct because it directly relates to the given statement, which mentions that BLANK indicates the structure of the network. Therefore, "topology" is the appropriate term to fill in the blank.
14.
Which statement about physical networking topologies is accurate?
Correct Answer
A. A pHysical topology defines the way in which CPU's, printers, networks, devices, and other devices are connected
Explanation
A physical topology defines the way in which CPU's, printers, networks, devices, and other devices are connected. This means that it specifies how these devices are physically arranged and connected to each other in a network. It does not describe the paths that signals travel or the type of data transmitted, but rather focuses on the physical layout and connections of the devices. The statement accurately describes the purpose and scope of a physical topology.
15.
Which statement about logical topologies is accurate?
Correct Answer
C. A logical topology describes the paths that the signals travel from one point on a network to another
Explanation
A logical topology describes the paths that the signals travel from one point on a network to another. This means that it defines the communication paths between different devices on a network, including CPUs, printers, and network devices. It is not dependent solely on the type of computers on the network, and it is possible for a network to have different logical and physical topologies.
16.
All of the network devices connect directly to each other in a linear fashion.
Correct Answer
Bus
Explanation
The correct answer is Bus because in a bus network topology, all network devices are connected to a common communication medium, forming a linear structure. This means that each device is connected directly to the medium, allowing for easy communication between devices.
17.
Al of the network devices are directly connected to one central point, with no other connections between them
Correct Answer
Star
Explanation
The correct answer is "Star" because in a star network topology, all network devices are directly connected to a central point called a hub or switch. There are no direct connections between the devices themselves. This central point acts as a central communication hub, allowing devices to communicate with each other through the hub. This type of network topology is commonly used in home networks and small business networks due to its simplicity and ease of setup.
18.
All of the devices on a network are connected in the form of a circle
Correct Answer
Ring
Explanation
In a ring network, all devices are connected in a circular manner, forming a closed loop. Each device is connected to its adjacent devices, creating a continuous pathway for data transmission. This type of network topology allows for efficient and reliable communication as data can flow in both directions. It also provides redundancy, as if one device fails, the data can still travel in the opposite direction. Therefore, the correct answer for this question is "Ring."
19.
Each device has a connection to all other devices
Correct Answer
Mesh
Explanation
In a mesh network, each device is directly connected to every other device in the network. This means that there are multiple paths for data to travel between devices, providing redundancy and ensuring that the network remains connected even if one or more devices fail. This type of network topology is commonly used in large-scale networks where reliability and fault tolerance are important.
20.
At least one device maintains multiple connections to other devices
Correct Answer
Partial Mesh
Explanation
A partial mesh network is a type of network where at least one device maintains multiple connections to other devices. In this network topology, not all devices are directly connected to each other, but there are some devices that have multiple connections. This allows for redundancy and improved fault tolerance in the network, as there are alternative paths for data transmission if one connection fails. The partial mesh topology strikes a balance between the fully connected mesh network and the less connected star or bus networks.
21.
The design adds redundancy to the network
Correct Answer
Dual Ring
Explanation
The dual ring design refers to a network topology where there are two interconnected rings of network nodes. This design adds redundancy to the network by providing multiple paths for data transmission. If one ring fails, the other ring can still maintain network connectivity, ensuring that the network remains operational. This redundancy helps to improve network reliability and fault tolerance.
22.
Which two statements about wireless networks is accurate?
Correct Answer(s)
A. Instead of cables, wireless communications uses RF or infrared waves to transmit data
B. To receive the signals from the access point, a computer needs to have a wireless adapter card or wireless NIC.
Explanation
Wireless communications use RF or infrared waves to transmit data instead of cables. In order to receive signals from the access point, a computer must have a wireless adapter card or wireless NIC.
23.
What is the main threat to a closed network?
Correct Answer
B. A deliberate or accidental attack from inside
Explanation
The main threat to a closed network is a deliberate or accidental attack from inside. This means that the network is vulnerable to both intentional attacks by employees or individuals with authorized access, as well as unintentional breaches caused by human error or negligence. These internal attacks can potentially cause significant damage to the network's security and compromise sensitive information. It is crucial for organizations to implement strong security measures and regularly monitor and educate their employees to prevent such threats.
24.
Which of the following four attacks is classified as an access attack?
Correct Answer
A. Password attacks
Explanation
Password attacks are classified as access attacks because they involve unauthorized attempts to gain access to a system or network by exploiting weak or stolen passwords. These attacks can include techniques such as brute force, dictionary attacks, or password guessing. The objective of a password attack is to bypass authentication measures and gain unauthorized access to sensitive information or resources.
25.
Which two factors have recently influenced the increase in threats from Hackers?
Correct Answer(s)
B. Hacker tools have become more sopHisticated
D. Hacker toos require less technical knowledge to use
Explanation
The increase in threats from hackers can be attributed to two factors. Firstly, hacker tools have become more sophisticated, allowing hackers to carry out more advanced and complex attacks. This means that they are able to exploit vulnerabilities in systems more effectively, resulting in an increase in threats. Secondly, hacker tools now require less technical knowledge to use. This means that more individuals with limited technical skills can access and use these tools, leading to a larger pool of potential hackers. These two factors combined have contributed to the recent increase in threats from hackers.
26.
Which two statements about the purpose of the OSI model are accurate?
Correct Answer(s)
A. The OSI model defines the network function that occur at each layer
B. The OSI model facilitates the understanding of how information travels throughout a network
Explanation
The OSI model defines the network functions that occur at each layer, providing a clear framework for organizing and understanding the different processes involved in network communication. It also facilitates the understanding of how information travels throughout a network by breaking down the complex communication process into distinct layers, making it easier to comprehend and troubleshoot network issues.
27.
Provides connectivity and path selection between two host systems that may be located on geographically seperated networks
Correct Answer(s)
Network
Explanation
The given answer "Network" is correct because a network provides connectivity and path selection between two host systems that may be located on geographically separated networks. A network allows these host systems to communicate with each other, share resources, and exchange data. It enables the transmission of data packets across different networks, ensuring that the information reaches its intended destination efficiently and securely.
28.
Ensures that the information sent at the application layer of one system is readable by the application layer of another system
Correct Answer(s)
Presentation
Explanation
The presentation layer ensures that the information sent at the application layer of one system is readable by the application layer of another system. It is responsible for formatting, encrypting, and compressing the data to be transmitted. This layer also handles the conversion of data formats between different systems, ensuring that the data is compatible and can be understood by the receiving application layer. By performing these functions, the presentation layer ensures that the data is presented in a standardized and readable format, regardless of the underlying systems or protocols being used.
29.
Defines how data is formatted for transmission and how access to the network is controlled
Correct Answer(s)
Data link
Explanation
The data link layer is responsible for defining how data is formatted for transmission and how access to the network is controlled. This layer ensures that data is properly packaged into frames and provides error detection and correction mechanisms. It also manages the flow of data between devices and handles protocols for addressing and routing data within a local network. In summary, the data link layer establishes a reliable communication link between two adjacent nodes in a network.
30.
Segments data from the system of the sending host and reassembles the data into a data streamon the system of the receiving host
Correct Answer(s)
Transport
Explanation
The given answer "Transport" is correct because the transport layer in the network protocol stack is responsible for segmenting the data from the sending host into smaller units called segments. It then reassembles these segments into a data stream on the receiving host. The transport layer ensures that the data is reliably delivered from the sender to the receiver by providing mechanisms such as error detection, flow control, and congestion control.
31.
Defines the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link betweek end systems
Correct Answer(s)
Physical
Explanation
The answer "Physical" is correct because it accurately describes the specifications related to the activation, maintenance, and deactivation of the physical link between end systems. This includes the electrical, mechanical, procedural, and functional aspects of the physical connection.
32.
Provides network services to the applications of the user, such as email, file transfer, and terminal emulation
Correct Answer(s)
Application
Explanation
The correct answer is "Application" because an application is a software program that provides network services to the user. These services can include email, file transfer, and terminal emulation. Applications allow users to interact with the network and perform various tasks. They act as intermediaries between the user and the network, allowing the user to access and utilize network services easily.
33.
Establishes, manages, and terminates sessions between two communicating hosts and also synchronizes dialogue between the presentation layers of the hosts and manages their data exchange
Correct Answer(s)
Session
Explanation
The correct answer is "Session". A session is responsible for establishing, managing, and terminating sessions between two communicating hosts. It also synchronizes dialogue between the presentation layers of the hosts and manages their data exchange. In other words, the session layer ensures that communication between the hosts is organized and coordinated, allowing them to exchange data effectively and efficiently.
34.
At which layer does de-encapsulation first occur?
Correct Answer
B. Data link
Explanation
De-encapsulation is the process of removing headers and trailers from a packet as it travels through the network layers. In this case, de-encapsulation first occurs at the Data link layer. This layer is responsible for the physical transmission of data and it adds a header and trailer to the packet before sending it over the network. When the packet reaches its destination, the Data link layer is the first layer to remove these added headers and trailers, thus initiating the de-encapsulation process.
35.
Encapulates the network layer packet in a frame
Correct Answer
Data Link Layer
Explanation
The data link layer is responsible for encapsulating the network layer packet in a frame. This layer takes the packets received from the network layer and adds necessary headers and trailers to create a frame. The frame includes information such as source and destination MAC addresses. This process allows for the transmission of data over the physical network.
36.
Moves the data through the internetwork by encapsulating the data and attaching a header to create a packet
Correct Answer
Network Layer
Explanation
The network layer is responsible for moving data through the internetwork by encapsulating the data and attaching a header to create a packet. This layer ensures that the packets are properly routed to their destination by using various protocols and algorithms. It also handles addressing and logical network topology, allowing different networks to communicate with each other.
37.
Encodes the data link frame into a patter of 1's and 0's (bits) for transmission on the medium
Correct Answer
Physical Layer
Explanation
The physical layer is responsible for encoding the data link frame into a pattern of 1's and 0's (bits) for transmission on the medium. This layer is concerned with the actual transmission of the data over the physical medium, such as cables or wireless signals. It converts the digital data into a format that can be transmitted and received by the physical medium, ensuring reliable and accurate transmission of the data.
38.
What is the function of a network protocol?
Correct Answer
A. Uses sets of rules that tell the services of a network what to do
Explanation
A network protocol is a set of rules that govern the communication between devices in a network. It defines how data is transmitted, received, and interpreted by the devices. By using sets of rules, the protocol instructs the services of a network on how to handle data packets, establish connections, and ensure proper communication. These rules ensure that data is delivered reliably, routed efficiently, and that all devices in the network can understand and interpret the transmitted information correctly.
39.
Provides applications for file transfer, network troubleshooting, and internet activities, and supports the network
Correct Answer
Application Layer
Explanation
The application layer is responsible for providing applications that enable file transfer, network troubleshooting, and internet activities. It supports the network by offering a wide range of services and protocols that allow users to access and utilize network resources. This layer interacts directly with the end-user and provides a user-friendly interface for various applications to communicate with the network.
40.
Defines how data is formatted for transmission and how access to the network is controlled
Correct Answer
Data link layer
Explanation
The data link layer is responsible for formatting data for transmission and controlling access to the network. This layer ensures that data is properly organized into frames before being sent over the network. It also manages the flow of data between devices and handles error detection and correction. By defining protocols and standards for data transmission, the data link layer ensures efficient and reliable communication between devices on the network.
41.
Defines the electrical mechanical, procedural, and functional specifications for activating, maintaining, and deactivation the physical link betweek the systems
Correct Answer
Physical Layer
Explanation
The physical layer is responsible for defining the electrical, mechanical, procedural, and functional specifications for activating, maintaining, and deactivating the physical link between systems. It deals with the transmission of raw data bits over a physical medium, such as cables or wireless signals. This layer ensures that the physical connection between devices is established and maintained properly, allowing for the reliable transfer of data.
42.
Provides routing of data from the source to a destinations by defining the packet and addressing scheme, moving data between the data link and transport layers, routing packets of data to remote hosts, and performing fragmentation and reassembly of the data packets
Correct Answer
Internet layer
Explanation
The Internet layer is responsible for routing data from the source to a destination by defining the packet and addressing scheme. It also moves data between the data link and transport layers, routes packets of data to remote hosts, and performs fragmentation and reassembly of the data packets. This layer ensures that data is properly addressed and delivered to the correct destination by using routing protocols and IP addressing.
43.
Provides communication services directly to the application proceses that are running on different network hosts
Correct Answer
Transport Layer
Explanation
The Transport Layer provides communication services directly to the application processes that are running on different network hosts. This layer is responsible for establishing a reliable and efficient communication channel between the sender and receiver. It ensures that data is delivered in the correct order, without errors, and with the appropriate flow control. The Transport Layer also handles segmentation and reassembly of data packets, as well as error detection and correction. Overall, it manages end-to-end communication and guarantees the reliable delivery of data between applications.
44.
Which area of the OSI model and the TCP/IP stack is most diverse
Correct Answer
D. Data-Link Layer
Explanation
The Data-Link Layer is the correct answer because it is responsible for the physical transmission of data over the network. This layer deals with the protocols and technologies used to transmit data between devices on the same network. It includes functions such as framing, error detection, and media access control. The diversity in this layer comes from the wide range of technologies and protocols that can be used, such as Ethernet, Wi-Fi, and Bluetooth, each with its own set of specifications and standards.
45.
How many bits are in an IPv4 Address?
Correct Answer
B. 32
Explanation
An IPv4 address is a 32-bit address, which means it is composed of 32 binary digits (bits). Each bit can have a value of either 0 or 1, resulting in a total of 2^32 possible unique addresses. This address format is commonly used in computer networks to identify and locate devices connected to the internet.
46.
In a class B address, which of the octets are the host portion and are assigned locally?
Correct Answer
D. The third and forth octets are assigned locally
Explanation
In a class B address, the third and fourth octets are assigned locally. This means that the network administrator can assign any value to these octets within the range of 0 to 255 to create unique IP addresses within the network. The first and second octets, on the other hand, are used to identify the network itself and cannot be changed.
47.
This address 172.16.128.17 is of which class?
Correct Answer
B. Class B
Explanation
The given IP address, 172.16.128.17, falls within the range of Class B addresses. In Class B, the first two octets are used to identify the network, while the remaining two octets are used to identify hosts within the network. Therefore, the given IP address is classified as Class B.
48.
Which of the following statements is true of a directed-broadcast address?
Correct Answer
C. A directed-broadcast address is an address that has all 1's in the host field
Explanation
A directed-broadcast address is an address that has all 1's in the host field. This means that in a network, when a packet is sent to a directed-broadcast address, it will be delivered to all hosts within that network. This is different from a regular broadcast address, which has all 0's in the host field and is used to send a packet to all hosts on the entire network. Therefore, the correct statement is that a directed-broadcast address has all 1's in the host field.
49.
Whick two of these addresses are privat IP addresses?
Correct Answer(s)
A. 10.215.34.124
C. 172.17.10.10
Explanation
The two private IP addresses are 10.215.34.124 and 172.17.10.10. Private IP addresses are reserved for use within private networks and are not routable on the internet. The address range 10.0.0.0 to 10.255.255.255 (10.0.0.0/8) is reserved for private networks. Similarly, the address range 172.16.0.0 to 172.31.255.255 (172.16.0.0/12) is also reserved for private networks. Therefore, both 10.215.34.124 and 172.17.10.10 fall within these private address ranges.
50.
Which three statements about IP are accurate?
Correct Answer(s)
A. IP is a connectionless protocol
E. IP does not provide any recovery functions
F. IP delivers data on a best effort basis
Explanation
IP is a connectionless protocol, meaning that it does not establish a dedicated connection before transmitting data. It uses relational addressing to identify devices on a network. However, IP does not provide any recovery functions, so it does not guarantee the delivery of data. Instead, it delivers data on a best effort basis, meaning that it tries its best to deliver data but does not ensure reliability. IP operates at Layer 3 of the TCP/IP stack and OSI model, not Layer 2.