1.
You have a key network administrator leave a company. Therefore, what does the company depend on to continue to use the network?
Correct Answer
D. Network documentation
Explanation
: To understand your LAN better, it helps to write down what its structure is—in other words, to document it. Network documentation is any information that helps describe, define, and otherwise explain how the network computers are connected physically and logically.
2.
What is the most common central device used today to connect computers to a network?
Correct Answer
B. Switch
Explanation
A switch is the most common central device used today to connect computers to a network. Unlike a hub, a switch can intelligently direct network traffic to specific devices, making it more efficient and secure. A switch operates at the data link layer of the OSI model, allowing it to read the MAC addresses of connected devices and send data only to the intended recipient. This improves network performance and reduces the likelihood of data collisions. Switches are widely used in both home and enterprise networks due to their ability to handle high volumes of traffic and provide better network management capabilities.
3.
What is the most common adapter or connector used to connect a computer to a wired network?
Correct Answer
C. RJ45
Explanation
The most common adapter or connector used to connect a computer to a wired network is the RJ45. RJ45 is a standard connector used for Ethernet connections. It has eight pins and is commonly used for connecting computers, routers, switches, and other networking devices to a local area network (LAN). RJ45 connectors are easy to use, widely available, and provide a reliable and secure connection for data transmission over a wired network.
4.
Which of the following does a switch use for increased performance?
Correct Answer
C. Full duplex
Explanation
A switch uses full duplex for increased performance. Full duplex allows for simultaneous communication in both directions, allowing for faster and more efficient data transfer. This means that the switch can send and receive data at the same time, reducing latency and improving overall network performance.
5.
What do you use to isolate a group of computers within your organization?
Correct Answer
C. VLAN
Explanation
A VLAN (Virtual Local Area Network) is used to isolate a group of computers within an organization. It allows for the segmentation of a network into smaller, separate networks, even if the computers are physically connected to the same network switch. This isolation helps to improve security, manage network traffic, and organize resources within the organization. WLAN (Wireless Local Area Network) and WAN (Wide Area Network) are different types of networks, while the Internet is a global network that connects multiple organizations and individuals.
6.
What do you use to create VLANs
Correct Answer
B. Switch
Explanation
Switches are used to create VLANs. A VLAN (Virtual Local Area Network) is a logical grouping of devices on a network, allowing them to communicate as if they were on the same physical network, even if they are located in different physical locations. Switches have the capability to create and manage VLANs by assigning ports to specific VLANs, allowing for segmentation and improved network security. Routers, firewalls, and proxy servers are not typically used to create VLANs, as their primary functions are related to routing traffic, filtering network traffic, and providing network services, respectively.
7.
What zone is used to publish external websites for an organization?
Correct Answer
D. DMZ
Explanation
A DMZ (Demilitarized Zone) is a network segment that is used to securely host external-facing services, such as websites, for an organization. It acts as a buffer zone between the internal network (intranet) and the external network (internet). By placing external websites in the DMZ, organizations can provide access to these sites without compromising the security of their internal network. The DMZ allows external users to access the websites while providing an additional layer of protection against potential threats from the internet.
8.
Which topology is the most redundant and the most expensive?
Correct Answer
C. Mesh
Explanation
A network topology defines the physical connections of hosts in a computer network. With the mesh topology, every computer connects to every other computer. No central connecting device is needed. Since every computer connects to every other computer, it requires the most cabling, which increases the cost.
9.
What standard describes CSMA/CD?
Correct Answer
B. 802.3
Explanation
The correct answer is 802.3. This standard describes CSMA/CD, which stands for Carrier Sense Multiple Access with Collision Detection. CSMA/CD is a protocol used in Ethernet networks to avoid collisions when multiple devices attempt to transmit data simultaneously. The 802.3 standard specifies the physical and data link layer specifications for Ethernet networks, including the CSMA/CD protocol.
10.
What mechanism do wireless networks use to access the network?
Correct Answer
B. CSMA/CA
Explanation
Wireless networks use CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism to access the network. CSMA/CA is a protocol that helps avoid collisions in wireless networks by having devices listen for traffic on the network before transmitting data. If the network is clear, the device can transmit its data. If it detects traffic, it waits for a random period of time before attempting to transmit again. This helps prevent collisions and ensures efficient access to the network for multiple devices.
11.
What model promises the most processing power?
Correct Answer
B. Distributive computing
Explanation
Distributive computing promises the most processing power because it involves dividing a task among multiple computers or processors, allowing them to work simultaneously. This parallel processing capability increases the overall processing power and enables faster execution of complex tasks. In contrast, centralized computing relies on a single computer or server, limiting the processing power to that specific device. Switching computing refers to network switching and does not directly relate to processing power. Dumb computing is not a recognized term in the context of computing power.
12.
Which model users a central database for authentication?
Correct Answer
C. Client/server
Explanation
The client/server model is an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7 or Windows Vista machines. It also distributes the necessary processing power. This is extremely common in today’s LANs and with most applications an average user would utilize when connecting to the Internet.
13.
What type of server does Active Director run on?
Correct Answer
D. Network controller
Explanation
Active Directory is a directory service developed by Microsoft that is used to manage and organize network resources. It is designed to run on a network controller server, which is responsible for managing and controlling various network services and devices. Active Directory relies on the network controller server to authenticate and authorize users, manage network policies, and provide directory services. Therefore, the correct answer is network controller.
14.
Which model has each host have their own security database?
Correct Answer
A. Peer-to-peer
Explanation
In a peer-to-peer model, each host has its own security database. This means that each individual device in the network is responsible for managing its own security measures, such as authentication and access control. Unlike a client/server model where a central server manages the security database for all connected clients, a peer-to-peer model distributes this responsibility to each individual host, allowing for a more decentralized and independent network structure.
15.
What type of communication is sent to a single designated host?
Correct Answer
A. Unicast
Explanation
Unicast communication is sent to a single designated host. In this type of communication, a message is sent from one sender to one specific recipient. It is a point-to-point communication where the sender and receiver have a one-to-one relationship. Unicast is commonly used in most network communication scenarios, such as sending emails, browsing websites, or making a phone call to a specific person. Unlike broadcast or multicast communication, unicast ensures that the message is only delivered to the intended recipient, providing a more targeted and efficient form of communication.
16.
What is used to uniquely identify a host on a TCP/IP network?
Correct Answer
A. IP address
Explanation
An IP address is used to uniquely identify a host on a TCP/IP network. This address is a numerical label assigned to each device connected to the network, allowing it to be identified and communicate with other devices. The IP address consists of a series of numbers separated by periods, such as 192.168.0.1, and it serves as the host's identifier on the network. The MAC address, on the other hand, is a unique identifier assigned to the network interface card of a device, while a bit pattern refers to a sequence of 0s and 1s. A router name is not used for identification purposes on a TCP/IP network.
17.
A ________ is a single computer or device that connects to a TCP/IP network.
Correct Answer
Host
host
host
Explanation
A host is a single computer or device that connects to a TCP/IP network. It serves as a source or destination of data transmission within the network. The repetition of the word "host" in the answer options emphasizes that a host is the correct term to fill in the blank.