1.
The MAC Address is associated with which Layer?
Correct Answer
B. 2
Explanation
The MAC Address is associated with Layer 2 of the OSI model. Layer 2, also known as the Data Link Layer, is responsible for the physical addressing of devices on the network. MAC addresses are unique identifiers assigned to network interfaces at the hardware level, allowing devices to communicate with each other at the local network level. This layer handles the framing and transmission of data packets between devices on the same network.
2.
Data is placed into packets at which Layer?
Correct Answer
A. Network
Explanation
Data is placed into packets at the Network layer. This layer is responsible for addressing and routing packets across different networks. It takes the data from the upper layers and encapsulates it into packets, adding necessary network information such as source and destination IP addresses. The Network layer ensures that packets are properly delivered to their intended destinations by selecting the best path and handling any necessary routing protocols.
3.
10GBaseSR has a maximum cable length of ____ meters?
Correct Answer
B. 300
Explanation
The correct answer is 300. 10GBaseSR is a type of Ethernet standard that uses multimode fiber optic cables. It has a maximum cable length of 300 meters, which means that the cable cannot exceed this length for optimal performance. This limitation is due to the attenuation or loss of signal strength that occurs over longer distances in multimode fiber optic cables.
4.
True or False: DNS uses both TCP and UDP.
Correct Answer
A. True
Explanation
DNS (Domain Name System) uses both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is used when the size of the DNS response exceeds the maximum limit for a UDP packet, or when the DNS query requires a reliable and ordered delivery. UDP is used for most DNS queries as it is faster and more efficient for simple queries that can fit within a single packet. Therefore, the statement "DNS uses both TCP and UDP" is true.
5.
DNS runs on which port:
Correct Answer(s)
C. TCP 53
D. UDP 53
Explanation
DNS (Domain Name System) is a protocol used to translate domain names into IP addresses. It operates on both TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). TCP is a connection-oriented protocol that ensures reliable data transmission, while UDP is a connectionless protocol that provides faster and more efficient communication. Port 53 is the standard port used by DNS for both TCP and UDP communication. Therefore, the correct answer is TCP 53 and UDP 53.
6.
True or False: Token Ring uses CSMA/CD.
Correct Answer
B. False
Explanation
Token Ring does not use CSMA/CD (Carrier Sense Multiple Access with Collision Detection). Instead, it uses a different access method called Token Passing. In Token Ring, a token is passed around the network, and only the device holding the token is allowed to transmit data. This eliminates the need for collision detection since only one device can transmit at a time. Therefore, the statement that Token Ring uses CSMA/CD is false.
7.
The topology of a 10BaseT is usually in a form of a ______.
Correct Answer
B. Star
Explanation
The correct answer is "Star" because in a 10BaseT topology, all devices are connected to a central hub or switch. This central hub acts as a central point of connection, allowing each device to communicate with one another. This type of topology is called a star because the devices are connected to the central hub in a radial manner, resembling the shape of a star.
8.
______-grade cabling provides the most protection from the elements, including fire.
Correct Answer
D. Plenum
Explanation
Plenum-grade cabling provides the most protection from the elements, including fire. Plenum cables are made with special materials that have low smoke and low flame characteristics, making them ideal for use in air handling spaces such as plenum areas. These cables are designed to prevent the spread of fire and emit minimal smoke in case of a fire. Therefore, plenum-grade cabling is the best option for protecting against fire hazards in environments where fire safety is a concern.
9.
________ routing requires the most administrative overhead.
Correct Answer
A. Static
Explanation
Static routing requires the most administrative overhead because it involves manually configuring and maintaining the routing tables on each router in the network. This requires the network administrator to have detailed knowledge of the network topology and manually update the routing tables whenever there are changes in the network. In contrast, dynamic routing protocols automatically exchange routing information between routers, reducing the administrative overhead as the routers can dynamically update their routing tables based on the information received from neighboring routers.
10.
True or False: TCP and UDP offer the same services over Port 21.
Correct Answer
B. False
Explanation
TCP and UDP do not offer the same services over Port 21. Port 21 is specifically reserved for FTP (File Transfer Protocol) services. TCP is a connection-oriented protocol that ensures reliable and ordered delivery of data, making it suitable for applications like FTP that require error-free transmission. UDP, on the other hand, is a connectionless protocol that does not guarantee reliable delivery of data, making it unsuitable for FTP services. Therefore, the correct answer is False.
11.
Which of the following devices may have a Loopback test? (Select 2)
Correct Answer(s)
A. Modem
B. NIC
Explanation
A loopback test is a method used to test the functionality of a device by sending data out of the device and then immediately receiving it back. In this case, both a modem and a NIC (Network Interface Card) may have a loopback test. A modem is used to connect to the internet and a NIC is used to connect a computer to a network. By performing a loopback test on these devices, it can be determined if they are functioning properly and able to send and receive data effectively. The other two options, RJ-45 Connector and Patch Panel, are not devices that typically have loopback tests as they are used for physical connections rather than data transmission.
12.
An ISDN BRI connection has two _____ Kbps "B" channels for a total connection speed of ______ Kbps?
Correct Answer
D. 64, 128
Explanation
An ISDN BRI connection has two "B" channels, each with a speed of 64 Kbps. Therefore, the total connection speed is 128 Kbps.
13.
RAID ____ provides disk striping with parity.
Correct Answer
D. 5
Explanation
RAID 5 provides disk striping with parity. In RAID 5, data is striped across multiple disks, with parity information distributed across all the disks. This allows for increased performance and fault tolerance. In the event of a disk failure, the parity information can be used to reconstruct the data on the failed disk. RAID 0 does not provide parity, RAID 1 is mirroring, and RAID 3 uses dedicated parity disk.
14.
Kerberos is a security suite that utilizes ________ for authentication.
Correct Answer
A. Tickets
Explanation
Kerberos is a security suite that utilizes tickets for authentication. In the Kerberos authentication process, a client requests a ticket from the Kerberos server, which is then used to authenticate the client to other services in the network. The ticket contains encrypted information that verifies the client's identity and allows them to access the requested resources without having to provide their credentials repeatedly. Therefore, the use of tickets in Kerberos ensures secure and efficient authentication within a network environment.
15.
Microsoft's Active Directory can be said to be similar to _______.
Correct Answer
C. LDAP
Explanation
Microsoft's Active Directory is a directory service that stores information about network resources and enables administrators to manage user accounts, groups, and permissions. LDAP (Lightweight Directory Access Protocol) is a protocol used for accessing and managing directory information. Active Directory uses LDAP as its primary means of communication, making LDAP the most similar option among the given choices. IGMP (Internet Group Management Protocol) is used for managing multicast group memberships, RIP (Routing Information Protocol) is used for routing data between networks, and Kerberos is a network authentication protocol.
16.
100BaseFX uses which cable type?
Correct Answer
D. Fiber
Explanation
100BaseFX is a type of Ethernet technology that uses fiber optic cables to transmit data. Fiber optic cables are made of glass or plastic fibers that transmit data using light signals. They offer high bandwidth and are immune to electromagnetic interference, making them ideal for long-distance and high-speed data transmission. Shielded UTP, coaxial, and unshielded UTP cables are not used for 100BaseFX, as they are typically used for other types of Ethernet technologies.
17.
HTTP runs on which Layer of the OSI model?
Correct Answer
B. 7
Explanation
HTTP runs on Layer 7 of the OSI model, which is the Application layer. This layer is responsible for providing network services to user applications. HTTP is a protocol that enables communication between web browsers and web servers, allowing the retrieval and display of web pages. As an application layer protocol, HTTP operates on top of the transport layer (Layer 4) and uses the services provided by lower layers to establish and maintain connections between clients and servers.
18.
VoIP is defined by which IEEE standard?
Correct Answer
802.9
19.
SSH uses which port?
Correct Answer
C. TCP 22
Explanation
SSH (Secure Shell) uses TCP port 22 for secure remote administration and secure file transfers. It is a network protocol that provides a secure channel over an unsecured network. SSH is commonly used for remote login to a server or computer system, allowing users to securely access and manage the system remotely. By using TCP port 22, SSH ensures that the communication between the client and the server is encrypted and protected from unauthorized access or tampering.
20.
A host on with the IP address of 128.12.0.15 belongs to which Class?
Correct Answer
B. B
Explanation
The IP address 128.12.0.15 belongs to Class B. Class B IP addresses range from 128.0.0.0 to 191.255.255.255. These addresses have the first two octets reserved for the network portion and the last two octets for the host portion. In this case, the first octet is 128, which falls within the range for Class B addresses.
21.
Which protocol contains tools to troubleshoot networks like PING and TRACERT?
Correct Answer
C. ICMP
Explanation
ICMP (Internet Control Message Protocol) contains tools like PING and TRACERT to troubleshoot networks. PING is used to test the connectivity between two devices by sending an ICMP Echo Request message and receiving an Echo Reply message. TRACERT is used to trace the route taken by packets from the source to the destination by sending a series of ICMP Echo Request messages with increasing TTL (Time-To-Live) values. ICMP is responsible for reporting errors and providing diagnostic information in IP networks.
22.
Which network topology is also called a "peer-to-peer" topology?
Correct Answer
C. Mesh
Explanation
A network topology that is also called a "peer-to-peer" topology is a mesh topology. In a mesh topology, each device in the network is connected to every other device directly. This allows for direct communication between any two devices without the need for a central server. Each device in the network acts as both a client and a server, hence the term "peer-to-peer". This type of topology is commonly used in small networks or for connecting devices in a decentralized manner.
23.
Crossover cables are similar to patch cables, but the following pins are swapped:
Correct Answer
A. 1, 2 & 3, 6
Explanation
Crossover cables are designed to connect two devices of the same type, such as two computers or two switches, without the need for a hub or switch. The pins that are swapped in a crossover cable are 1 and 2, and 3 and 6. This swapping allows the transmit signal from one device to be correctly received by the other device, and vice versa. By swapping these pins, the crossover cable ensures that the transmit and receive signals are correctly aligned between the two devices, enabling communication between them.
24.
Which Layer 1 device can strengthen a signal?
Correct Answer
C. Active hub
Explanation
An active hub is a Layer 1 device that can strengthen a signal. Unlike passive hubs, which simply pass along the signal without any amplification, active hubs actively regenerate and amplify the signal, allowing it to travel further distances without degradation. This makes active hubs useful in extending the reach of a network by boosting the signal strength.
25.
A subnet mask of 255.255.255.128 creates ___ subnetworks?
Correct Answer
A. 2
Explanation
A subnet mask of 255.255.255.128 creates 2 subnetworks because the last octet of the subnet mask has a binary value of 10000000, which means that the first bit is fixed and cannot be changed. This leaves only one bit that can be used to create subnetworks, resulting in 2 possible subnetworks.
26.
Which of the following protocols is connection-oriented?
Correct Answer
A. TCP
Explanation
TCP (Transmission Control Protocol) is a connection-oriented protocol. It establishes a reliable and ordered connection between two devices before data transmission occurs. TCP ensures that all packets are received in the correct order and retransmits any lost packets. It also performs flow control and congestion control to prevent network congestion. In contrast, UDP (User Datagram Protocol) is connectionless and does not establish a connection before data transmission. IP (Internet Protocol) is a network layer protocol responsible for addressing and routing packets, but it is also connectionless.
27.
IPv4 addresses are ____ bit addresses?
Correct Answer
C. 32
Explanation
IPv4 addresses are 32-bit addresses. This means that they consist of 32 binary digits or bits, which are used to identify and locate devices on a network. The 32-bit address space allows for a total of 4,294,967,296 unique addresses, which are divided into different classes and ranges to allocate them efficiently. IPv4 addresses are represented in decimal format, with each 8 bits separated by a dot, such as 192.168.0.1. However, due to the limited number of addresses available in IPv4, the world has transitioned to IPv6, which uses 128-bit addresses.
28.
A private IP address is only used within a _____?
Correct Answer
D. LAN
Explanation
A private IP address is only used within a LAN (Local Area Network). A LAN is a network that is confined to a small geographic area, such as a home, office, or building. Private IP addresses are reserved for internal use within a LAN and are not routable over the internet. They are used to identify devices within the network and allow them to communicate with each other. Therefore, a private IP address is not used within a WAN (Wide Area Network), subnetwork, or domain.
29.
A tool used to find kinks or breaks in media is called a ________.
Correct Answer
A. Reflectometer
Explanation
A reflectometer is a tool used to find kinks or breaks in media. It measures the amount of light reflected from a surface, allowing it to detect any irregularities or disruptions in the media. By analyzing the reflected light, a reflectometer can identify kinks or breaks in cables, fibers, or other types of media, making it a useful tool for troubleshooting and maintenance in various industries such as telecommunications and networking.
30.
Spanning a disk drive across multiple physical or logical disks for increased performance is called what?
Correct Answer
B. Disk striping
Explanation
Disk striping is the correct answer because it refers to the process of dividing data across multiple physical or logical disks in order to enhance performance. By striping the data, the workload is distributed among multiple disks, allowing for faster read and write operations. This technique is commonly used in RAID (Redundant Array of Independent Disks) systems to improve disk performance and data availability.
31.
IPsec is a standardized framework for securing IP communications by encrypting and/or authenticating each ________ in a data stream.
Correct Answer
B. Packet
Explanation
IPsec is a standardized framework for securing IP communications by encrypting and/or authenticating each packet in a data stream. This means that IPsec can provide confidentiality and integrity to individual packets of data being transmitted over an IP network. By encrypting and authenticating each packet, IPsec ensures that the data remains secure and protected from unauthorized access or tampering.
32.
______ is a tunneling version of PPP?
Correct Answer
PPTP
Point to point tunneling protocol
point-to-point tunneling protocol
Explanation
PPTP stands for Point-to-Point Tunneling Protocol. It is a tunneling version of PPP (Point-to-Point Protocol) that allows the secure transmission of data over a network. PPTP creates a virtual private network (VPN) connection, enabling users to connect to a private network remotely. It encapsulates PPP packets within IP packets, providing encryption and authentication for secure communication. Therefore, PPTP is the correct answer for the question.
33.
10Base2 cable uses which kind of connector?
Correct Answer
C. BNC
Explanation
The correct answer is BNC. 10Base2 cable, also known as thinnet or coaxial cable, uses BNC connectors. These connectors are used to connect the cable to devices such as computers, routers, or switches. BNC connectors are commonly used in older Ethernet networks and are known for their durability and reliability in transmitting data over short distances. RJ45 connectors, on the other hand, are used for twisted pair Ethernet cables, not coaxial cables. SC connectors are used for fiber optic cables.
34.
The 10Base___ cable type has a max length of 2000 meters?
Correct Answer
FL