1.
In a token-passing network, bandwidth will be lost due to time-costly collision recovery.
Correct Answer
B. False
Explanation
In a token-passing network, bandwidth will not be lost due to time-costly collision recovery. This is because in a token-passing network, only one device at a time is allowed to transmit data using a token. This eliminates the possibility of collisions and ensures efficient use of bandwidth.
2.
In the OSI reference model, the ____ layer finds the best route for packets that must be transferred between different networks.
Correct Answer
D. Network
Explanation
In the OSI reference model, the Network layer is responsible for finding the best route for packets that need to be transferred between different networks. This layer handles the addressing and routing of data packets, ensuring that they are properly delivered to their destination across multiple networks. The Network layer uses protocols such as IP (Internet Protocol) to accomplish this task.
3.
In a ____ topology, computers are connected to the same cable.
Correct Answer
C. Bus
Explanation
In a bus topology, computers are connected to the same cable. This means that all computers on the network share the same communication medium, which is a single cable. Each computer is connected to the cable through a connector, allowing them to send and receive data. This type of topology is commonly used in Ethernet networks, where multiple computers are connected to a central cable, enabling them to communicate with each other.
4.
____ cable is a high-end medium that uses light pulses rather than electrical pulses to transmit data.
Correct Answer
B. Fiber-optic
Explanation
Fiber-optic cable is a high-end medium that uses light pulses to transmit data. Unlike UTP (Unshielded Twisted Pair) and Coax (Coaxial) cables that use electrical pulses, fiber-optic cables use thin strands of glass or plastic to transmit data in the form of light. This allows for faster and more reliable data transmission over longer distances, making it suitable for high-speed internet connections and long-distance communication. STP (Shielded Twisted Pair) cables, on the other hand, are similar to UTP cables in terms of using electrical pulses for data transmission.
5.
The ____ field in the ICMP packet header verifies the integrity of the ICMP packet.
Correct Answer
B. Checksum
Explanation
The checksum field in the ICMP packet header verifies the integrity of the ICMP packet. This field contains a computed value that is used to check if the packet has been corrupted during transmission. By comparing the computed checksum with the received checksum, the recipient can determine if the packet has been altered or damaged. This helps ensure the reliability and accuracy of ICMP communications.
6.
Each computer on an Ethernet network requires a network ____ that connects the computer with the network.
Correct Answer
A. Interface
Explanation
Each computer on an Ethernet network requires a network interface that connects the computer with the network. An interface is a hardware component or a software program that allows the computer to communicate with the network. It provides the necessary connections and protocols for data transmission and reception. Without a network interface, the computer would not be able to connect to the Ethernet network and communicate with other devices on the network.
7.
In the CIDR generated IP address 192.168.12.254/24, ____ bits of the address are the host ID.
Correct Answer
B. 8
Explanation
In the CIDR generated IP address 192.168.12.254/24, the last 8 bits of the address are the host ID. The /24 indicates that the first 24 bits are used for the network ID, leaving the remaining 8 bits for the host ID.
8.
PCs can function as terminals if they run terminal emulation programs.
Correct Answer
A. True
Explanation
PCs can function as terminals if they run terminal emulation programs. This means that a PC can mimic the functionality of a terminal by using software that emulates the behavior of a terminal device. This allows the PC to connect to and communicate with other systems or networks as if it were a terminal. Therefore, the statement "PCs can function as terminals if they run terminal emulation programs" is true.
9.
IPv6 supports over 100 ____ addresses.
Correct Answer
D. Undecillion
Explanation
IPv6 supports over 100 undecillion addresses. Undecillion is a mathematical term that represents the number 10 raised to the power of 36. This huge number of addresses is necessary due to the increasing number of devices connected to the internet. IPv6 was developed to replace IPv4, which had a limited number of addresses available. With undecillion addresses, IPv6 ensures that there are enough unique addresses for every device, allowing for continued growth and expansion of the internet.
10.
The default ____ is an IP address configured on a host computer
that identifies the computer to which packets should be sent when their
network is not otherwise known to the host.
Correct Answer
A. Route
Explanation
The default route is an IP address configured on a host computer that identifies the computer to which packets should be sent when their network is not otherwise known to the host. When a host receives a packet with a destination IP address that does not match any known network, it will forward the packet to the default route, which is the next hop for sending the packet towards its destination. This allows the host to communicate with networks that are not directly connected to it.
11.
Both an IP address and a MAC address are assigned to each network interface.
Correct Answer
A. True
Explanation
Both an IP address and a MAC address are unique identifiers assigned to each network interface. An IP address is a logical address assigned by the network administrator, which allows devices to communicate with each other over the internet. On the other hand, a MAC address is a physical address embedded in the network interface card, which is used for communication within a local network. Therefore, it is true that both an IP address and a MAC address are assigned to each network interface.
12.
MAC addresses are 48-bit binary values expressed in ____ notation.
Correct Answer
D. Hexadecimal
Explanation
MAC addresses are 48-bit binary values expressed in hexadecimal notation. Hexadecimal notation uses a base-16 numbering system, which allows for a more compact representation of the binary values. In hexadecimal, each digit represents four bits, making it easier to read and work with compared to binary or octal.
13.
The length of a User Datagram Protocol (UDP) header is ____ bytes.
Correct Answer
A. 8
Explanation
The length of a User Datagram Protocol (UDP) header is 8 bytes. The UDP header consists of four fields, each of which is 2 bytes in length. These fields include the source port, destination port, length, and checksum. Therefore, the total length of the UDP header is 8 bytes.
14.
The ____ field in an Ethernet frame contains the data payload.
Correct Answer
C. Information
Explanation
The information field in an Ethernet frame contains the data payload. This field is used to carry the actual data being transmitted over the Ethernet network. The preamble field is used to synchronize the timing between the sender and receiver, the type field specifies the protocol being used, and the FCS (Frame Check Sequence) field is used for error detection. However, it is the information field that carries the actual data payload.
15.
The address of the local loopback interface is ____ regardless of operating system.
Correct Answer
A. 127.0.0.1
Explanation
The local loopback interface is a virtual network interface that allows a computer to send and receive network traffic on the same machine. Regardless of the operating system, the address of the local loopback interface is always 127.0.0.1. This address is reserved for loopback testing and is commonly referred to as the loopback address or localhost. It is used to test network applications or troubleshoot network connectivity issues without actually sending data over a physical network.
16.
A kilobyte of computer memory is 1000 bytes.
Correct Answer
B. False
Explanation
A kilobyte of computer memory is actually 1024 bytes, not 1000. This is because computers use a binary system for data storage, where each unit is a power of 2. Therefore, a kilobyte is equal to 2^10 bytes, which is 1024.
17.
The Internet model uses ____ layers,and each layer has specific protocols associated with it.
Correct Answer
B. Four
Explanation
The Internet model uses four layers, namely the application layer, transport layer, internet layer, and network interface layer. Each layer has specific protocols associated with it. These layers help in organizing and managing the flow of data across the internet, ensuring reliable and efficient communication between devices.
18.
A protocol ____ is software designed to receive data in a specific
format from a higher-level protocol and transmit it to a lower-level
protocol.
Correct Answer
A. Stack
Explanation
A protocol stack is a software designed to receive data in a specific format from a higher-level protocol and transmit it to a lower-level protocol. In a protocol stack, the data is organized in a stack-like structure, where each layer of the stack performs specific functions and passes the data to the next layer until it reaches the lower-level protocol for transmission. Therefore, a protocol stack fits the description of receiving data from a higher-level protocol and transmitting it to a lower-level protocol.
19.
______ determines the amount of information that can be transmitted and is usually expressed in megabits per second (Mb/s).
Correct Answer
B. Bandwidth
Explanation
Bandwidth refers to the amount of data that can be transmitted through a network connection within a given time frame. It is typically measured in megabits per second (Mb/s) and determines the capacity of the network to handle data traffic. Higher bandwidth allows for faster and more efficient transmission of information, while lower bandwidth can result in slower and congested connections. Therefore, bandwidth is the correct answer as it directly relates to the amount of information that can be transmitted.
20.
_____ defines seven layers of network functionality that standard protocols would implement.
Correct Answer
C. Open Systems Interconnection (OSI) reference model
Explanation
The Open Systems Interconnection (OSI) reference model is a conceptual framework that defines seven layers of network functionality. These layers include the physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer. Each layer has a specific role and set of protocols that standardize communication between network devices. The OSI model provides a standardized way for different systems to communicate with each other, ensuring compatibility and interoperability.
21.
_____ commonly used routing protocol within organizational networks.
Correct Answer
B. Open Shortest Path First (OSPF) protocol
Explanation
Open Shortest Path First (OSPF) protocol is the most commonly used routing protocol within organizational networks. This protocol is designed to determine the most efficient path for routing data packets through a network. It uses a link-state algorithm to calculate the shortest path and updates its routing table accordingly. OSPF is preferred in organizational networks because it supports large networks, provides scalability, and allows for load balancing and redundancy. It also supports different types of networks and can adapt to changes in the network topology.
22.
_____ used by a computer to establish a TCP connection with another host.
Correct Answer
B. Three-way handshake
Explanation
The correct answer is "three-way handshake." In a TCP connection, the three-way handshake is used by a computer to establish a connection with another host. It involves a series of steps where the client sends a SYN packet to the server, the server responds with a SYN-ACK packet, and finally, the client sends an ACK packet to complete the connection establishment. This process ensures that both the client and server agree on the initial sequence numbers and establishes a reliable connection between them.
23.
_____ process of dividing a network into smaller parts.
Correct Answer
B. Segmentation
Explanation
Segmentation is the process of dividing a network into smaller parts. This is done to improve network performance, security, and manageability. By dividing a network into segments, traffic can be isolated and controlled, reducing congestion and improving overall efficiency. Segmentation also allows for easier troubleshooting and maintenance, as issues can be localized to specific segments rather than affecting the entire network.
24.
_____ series
of numbers that looks like an IP address but contains 1s for the
network ID portion of the address and 0s for the host ID portion of the
address.
Correct Answer
A. Subnet mask
Explanation
A subnet mask is a series of numbers that looks like an IP address but contains 1s for the network ID portion of the address and 0s for the host ID portion of the address. It is used to divide an IP address into two parts, the network ID and the host ID, by determining which bits in the IP address belong to the network and which belong to the host. The subnet mask is used in networking to determine which devices are on the same network and can communicate directly with each other.
25.
_____ portion of Internet supporting IPv6.
Correct Answer
D. 6BONE
Explanation
The 6BONE portion of the Internet is a testing and experimental network that was used to support the transition from IPv4 to IPv6. It provided a platform for researchers and developers to test IPv6 protocols and applications before its widespread adoption. The 6BONE network was decommissioned in 2006 after IPv6 became more widely supported and implemented across the Internet.
26.
_____ consists of a central computer or host with numerous terminals connected.
Correct Answer
D. Terminal network
Explanation
A terminal network consists of a central computer or host with numerous terminals connected. This means that there is a main computer or server that acts as the central hub, and multiple terminals or devices are connected to it. These terminals could be desktop computers, laptops, or any other device that can access the central computer. The central computer manages and controls the communication and data transfer between the terminals.
27.
_____ refers
to the connection that begins at the home or office, goes through the
local neighborhood,and ends at an Internet service provider (ISP) or
other fast service provider.
Correct Answer
B. Last mile connection
Explanation
A last mile connection refers to the connection that begins at the home or office, goes through the local neighborhood, and ends at an Internet service provider (ISP) or other fast service provider. This connection is the final link in the network infrastructure that connects end-users to the internet. It is called the "last mile" because it is the last leg of the network that delivers the internet service to the user's location.
28.
A(n) ____ is a computer on a network that is equal to the other
computers and has the ability to initiate communications, respond to
requests for information, and interact with users independent of other
computer systems.
Correct Answer
C. Peer
Explanation
A peer is a computer on a network that is equal to the other computers and has the ability to initiate communications, respond to requests for information, and interact with users independent of other computer systems. Unlike a server, which provides services to other computers, a peer operates on an equal level with other computers in the network, allowing for decentralized communication and interaction.
29.
____ wireless uses transceivers and antennas mounted on buildings to
transmit up to 18 miles, and they are cheaper to install than
fiber-optic systems.
Correct Answer
A. Fixed
Explanation
Fixed wireless uses transceivers and antennas mounted on buildings to transmit up to 18 miles. This technology is cheaper to install compared to fiber-optic systems.
30.
A 10-Mb/s Ethernet runs at ____ b/s.
Correct Answer
C. 10,000,000
Explanation
The correct answer is 10,000,000. This is because 10-Mb/s Ethernet refers to a network that has a data transfer rate of 10 megabits per second. To convert this to bits per second, we multiply the value by 1,000,000, resulting in 10,000,000 b/s.
31.
The ____ field of a TCP packet header identifies the position within the stream of data for the data in this packet.
Correct Answer
A. Sequence number
Explanation
The sequence number field of a TCP packet header identifies the position within the stream of data for the data in this packet. This field is used to keep track of the order in which the packets are sent and received, allowing the receiving end to reassemble the data in the correct order.
32.
____ reduce network congestion on busy networks.
Correct Answer
D. Switches
Explanation
Switches reduce network congestion on busy networks by using a technique called packet switching. Unlike hubs, which simply broadcast data to all connected devices, switches analyze the data packets and forward them only to the intended recipient. This reduces the amount of unnecessary traffic on the network, leading to less congestion and improved network performance. NICs (network interface cards) and connectors are hardware components that facilitate network connectivity, but they do not directly reduce network congestion.