1.
What is the most common central device used today to connect computers to a network?
Correct Answer
B. Switch
Explanation
A switch is the most common central device used today to connect computers to a network. Unlike a hub, which broadcasts data to all connected devices, a switch intelligently routes data only to the intended recipient, making the network more efficient. A SOHO router is typically used in small office or home office environments to connect multiple devices to the internet. A VPN router is specifically designed to securely connect remote networks or users to a private network over the internet.
2.
What is the most common adapter or connector used to connect a computer to a wired network?
Correct Answer
C. RJ45
Explanation
The most common adapter or connector used to connect a computer to a wired network is RJ45. RJ45 is a standard connector that is widely used for Ethernet connections. It has eight pins and is commonly used for connecting computers, routers, switches, and other network devices to a local area network (LAN). RJ45 connectors are easy to use, durable, and provide a reliable connection for high-speed data transmission.
3.
Which of the following does a switch use for increased performance?
Correct Answer
C. Full duplex
Explanation
A switch uses full duplex for increased performance. Full duplex allows simultaneous two-way communication between devices, enabling data to be sent and received at the same time. This eliminates the need for devices to wait for their turn to transmit data, resulting in faster and more efficient data transfer. In contrast, simplex only allows data to be transmitted in one direction, half duplex allows data transmission in both directions but not simultaneously, and sliding duplex is not a recognized term in networking.
4.
What do you use to create VLANs?
Correct Answer
B. Switch
Explanation
Switches are used to create VLANs. VLANs, or Virtual Local Area Networks, are used to segment a network into smaller logical networks. Switches are capable of assigning ports to specific VLANs, allowing for the separation of traffic and the creation of isolated networks within a larger network infrastructure. Routers, firewalls, and proxy servers may be used in conjunction with switches to provide additional network functionality, but switches are specifically designed for VLAN creation.
5.
What standard describes CSMA/CD?
Correct Answer
B. 802.3
Explanation
The correct answer is 802.3. This standard describes CSMA/CD, which stands for Carrier Sense Multiple Access with Collision Detection. CSMA/CD is a protocol used in Ethernet networks to regulate access to the network medium and handle collisions when multiple devices try to transmit data simultaneously. The 802.3 standard specifies the physical layer and the data link layer of the Ethernet protocol, providing guidelines for the implementation and operation of Ethernet networks.
6.
What mechanism do wireless networks use to access the network?
Correct Answer
B. CSMA/CA
Explanation
Wireless networks use the CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism to access the network. CSMA/CA is a protocol that helps avoid collisions in wireless networks by requiring devices to listen and check if the channel is clear before transmitting data. This mechanism helps prevent multiple devices from transmitting at the same time, reducing the chances of collisions and improving network efficiency.
7.
What type of server does Active Director run on?
Correct Answer
D. Network controller
Explanation
Active Directory is a directory service developed by Microsoft that is used to manage and organize resources in a network. It runs on a network controller server, which is responsible for managing and controlling network resources such as user accounts, security policies, and network devices. The network controller server acts as the central point for managing and coordinating network operations within an Active Directory environment. Therefore, the correct answer is network controller.
8.
What model promises the most processing power?
Correct Answer
B. Distributive computing
Explanation
Distributive computing promises the most processing power because it involves the use of multiple computers or processors working together to solve a problem or complete a task. This allows for parallel processing, where each computer or processor can handle a portion of the workload, resulting in faster and more efficient processing. In contrast, centralized computing relies on a single computer or server to handle all the processing, which may limit the overall processing power. Switching computing and dumb computing do not specifically address the concept of processing power in the same way as distributive computing.
9.
What type of communication is sent to a single designated host?
Correct Answer
A. Unicast
Explanation
Unicast communication is sent to a single designated host. In this type of communication, a message is transmitted from one sender to one specific receiver. It is a point-to-point communication where the sender and receiver are directly connected. Unicast is commonly used in most communication networks, such as email, telephone calls, and web browsing, where the information is intended for a specific recipient.
10.
A ___________ is a single computer or device that connects to a TCP/IP network.
Correct Answer
A. Host
Explanation
A host is a single computer or device that connects to a TCP/IP network. It acts as the source or destination of data packets within the network. The term "host" is often used to refer to any computer or device that is connected to a network and provides services or resources to other devices on the network.
11.
What is the central device used in wireless LANs?
Correct Answer
A. Wireless Access Point
Explanation
A wireless access point is the central device used in wireless LANs. It acts as a bridge between wireless devices and a wired network. It allows devices to connect to the network without the need for physical cables. The access point receives and transmits wireless signals, enabling communication between devices within its range. It also provides security features such as encryption and authentication to protect the network. Overall, a wireless access point is essential for establishing a wireless network and enabling connectivity for wireless devices.
12.
What command do you use to test the TCP/IP stack on a computer?
Correct Answer
A. Ping localhost
Explanation
The command "Ping localhost" is used to test the TCP/IP stack on a computer. The "Ping" command sends a small packet of data to the specified destination and waits for a response. In this case, "localhost" refers to the loopback address 127.0.0.1, which is the IP address assigned to the local machine. By pinging localhost, we can verify if the TCP/IP stack is functioning properly on the computer.