1.
Which of the following is an invalid MAC address?
Correct Answer(s)
B. 00-12-ED-AG-K7-0E
E. MM:00:48::F5:12349102
2.
What of the following is Class C address?
Correct Answer
D. 193.10.160.45
Explanation
The given IP address 193.10.160.45 belongs to Class C. Class C addresses have the first three octets (192-223) as the network portion and the last octet as the host portion. In this case, the first three octets (193.10.160) fall within the range of Class C addresses, making it the correct answer.
3.
What is the correct URL of a website using the SSL protocol?
Correct Answer
B. Https://www.google.com
Explanation
The correct URL of a website using the SSL protocol is "https://www.google.com". The "https" protocol indicates that the website is using SSL (Secure Sockets Layer) encryption to establish a secure connection between the web server and the user's browser. This ensures that any data transmitted between the two is encrypted and cannot be intercepted or tampered with by malicious actors. The "www.google.com" portion of the URL specifies the specific website or domain.
4.
The subnet mask is ..........
Correct Answer
D. It is used to separate the network the network address from the host address within an IP address
Explanation
The subnet mask is used to separate the network address from the host address within an IP address. This allows for efficient routing of data by identifying the network segment that the host belongs to. It does not directly forward data or block undesired traffic, but it plays a crucial role in enabling computers to communicate in different operating systems. Therefore, the correct answer is that the subnet mask is used to separate the network address from the host address within an IP address.
5.
Linux system uses which of the following command to verify TCP/IP configuration.
Correct Answer
E. Ifconfig
Explanation
The correct answer is ifconfig. Ifconfig is a command-line tool used in Linux systems to verify and configure TCP/IP network interfaces. It displays the current configuration of all active network interfaces, including IP addresses, netmasks, and other relevant information. By using ifconfig, users can easily check and manage their TCP/IP configuration settings in a Linux environment.
6.
Which of the following uses a MAC address as part of the host address
Correct Answer
B. IPX/SPX
Explanation
IPX/SPX is the correct answer because it is a networking protocol that uses a MAC address as part of the host address. MAC addresses are unique identifiers assigned to network devices, and they are used by IPX/SPX to identify and communicate with hosts on a network. TCP/IP, NetBEUI, AppleTalk, and Windows Talk do not use MAC addresses in the same way as IPX/SPX.
7.
You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?
Correct Answer
D. 443
Explanation
Port 443 is the correct answer because it is the default port for secure HTTP (HTTPS) traffic. By opening port 443 on the firewall, you would allow secure internet traffic to pass through, ensuring that any data transmitted between your company network and external servers is encrypted and protected. This port is commonly used for secure online transactions, secure web browsing, and other secure internet communication protocols.
8.
Acronym for RAID
Correct Answer
A. Redundant Array of Independent Disk
Explanation
RAID stands for Redundant Array of Independent Disk. This acronym refers to a data storage technology that combines multiple physical disk drives into a single logical unit for improved performance, data redundancy, and/or increased storage capacity. The term "independent" refers to the fact that the drives in a RAID array are separate and can function independently, while "redundant" implies that data is duplicated across multiple drives to ensure data availability in case of a drive failure. The use of RAID can enhance data reliability and system performance in various applications.
9.
Which of the following is associated with a power outage for a long time?
Correct Answer
D. Blackout
Explanation
A blackout is associated with a power outage for a long time. During a blackout, there is a complete loss of electrical power in a specific area or even a whole region. This can be caused by various factors such as severe weather conditions, equipment failure, or a deliberate action. Unlike other options such as sag, spike, or brownout, a blackout refers to a total loss of power, resulting in a prolonged period without electricity.
10.
Windowing is provided at what layer of the OSI reference model?
Correct Answer
D. Transport layer
Explanation
Windowing is a flow control mechanism that allows the sender to transmit a certain number of packets without waiting for an acknowledgment from the receiver. This mechanism is provided at the Transport layer of the OSI reference model. At this layer, the sender and receiver negotiate the size of the window, which determines the number of packets that can be sent before an acknowledgment is required. This helps in optimizing the transmission process and ensuring efficient delivery of data.