1.
File and printer sharing for Microsoft networks is an example of a network protocol.
Correct Answer
B. False
Explanation
File and printer sharing for Microsoft networks is not an example of a network protocol. It is a feature that allows users to share files and printers on a network, but it is not a protocol itself. Network protocols, on the other hand, are sets of rules and conventions that govern how data is transmitted and received over a network. Examples of network protocols include TCP/IP, HTTP, and FTP.
2.
A network that has locations in different countries is considered a WAN.
Correct Answer
A. True
Explanation
A network that has locations in different countries is considered a Wide Area Network (WAN) because a WAN is a network that spans a large geographical area, such as multiple countries. This type of network typically uses public or leased telecommunication lines to connect the different locations, allowing for communication and data sharing between them. Therefore, the statement is true.
3.
In order to find out your MAC address, you should open a command prompt and type ipconfig /all.
Correct Answer
A. True
Explanation
To find out the MAC address of a device, one can open a command prompt and type "ipconfig /all". This command provides detailed information about the network configuration of the device, including the MAC address. Therefore, the given statement is true.
4.
What makes a computer a "server" is the fact that it has a server operating system installed on it.
Correct Answer
A. True
Explanation
A computer is considered a "server" when it has a server operating system installed on it. This means that the computer is configured to provide services and resources to other devices or users on a network. The server operating system allows the computer to handle multiple requests, manage network connections, and provide centralized storage and data management capabilities. Therefore, the statement is true because the presence of a server operating system is what distinguishes a computer as a server.
5.
Each component of a computer is designed to perform only one specific task - either input, processing, or output.
Correct Answer
B. False
Explanation
The statement is false because each component of a computer is not designed to perform only one specific task. Components such as the central processing unit (CPU) can perform multiple tasks, including input, processing, and output. Other components like the motherboard, memory, and storage devices also have multiple functions and can handle various tasks simultaneously. Therefore, the statement is incorrect.
6.
When a NIC is in "promiscuous" mode, it will process only the frames in which the destination MAC address matches its own MAC address.
Correct Answer
B. False
Explanation
When a NIC is in "promiscuous" mode, it will process all frames that it receives, regardless of whether the destination MAC address matches its own MAC address. This mode allows the NIC to capture and analyze all network traffic on the network, including traffic that is not intended for it. This can be useful for network monitoring and troubleshooting purposes. Therefore, the given statement is false.
7.
Routers do not forward broadcast packets.
Correct Answer
A. True
Explanation
Routers do not forward broadcast packets because they operate at the network layer (Layer 3) of the OSI model and are designed to route packets between different networks. Broadcast packets, on the other hand, are intended to be sent to all devices on a specific network. Therefore, routers do not forward these packets as it would go against their purpose of directing traffic between networks.
8.
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured.
Correct Answer
A. True
Explanation
If a router receives a packet and it does not have an entry in its routing table for the destination network, it will send the packet to its default route, if configured. This is because the default route serves as a fallback option for the router when it doesn't have a specific route for a particular destination network. By sending the packet to the default route, the router ensures that the packet is not dropped and has a chance to reach its intended destination.
9.
The function of a repeater is to extend the range of an existing network.
Correct Answer
A. True
Explanation
A repeater is a device that amplifies and retransmits signals in a network. It is used to extend the range of an existing network by receiving weak signals and boosting them to reach a wider area. Therefore, the statement "The function of a repeater is to extend the range of an existing network" is true.
10.
You cannot connect a hub to another hub unless it has an uplink port.
Correct Answer
B. False
Explanation
This statement is incorrect. Hubs can be connected to each other without the need for an uplink port. In fact, connecting hubs in a daisy-chain fashion is a common practice in networking. In this setup, each hub extends the network by providing additional ports for connecting devices. However, it is important to note that connecting hubs in this manner can lead to network congestion and reduced performance due to the shared bandwidth of the hubs.
11.
A network's physical topology refers to the arrangement of the cabling and how the devices connect to eachother.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that the physical topology of a network indeed refers to the arrangement of the cabling and how the devices are connected to each other. This includes the physical layout of the network, such as the placement of routers, switches, and other networking equipment, as well as the type of cabling used to connect these devices. Understanding the physical topology is important for designing and troubleshooting network infrastructure.
12.
The physical bus topology is no longer used because it required extra cable to connect all the computers and required a central device.
Correct Answer
B. False
Explanation
The physical bus topology is still used in some cases, despite its drawbacks. While it does require extra cable to connect all the computers and a central device, it can still be a cost-effective option for small networks. Additionally, the bus topology allows for easy expansion and troubleshooting as devices can be added or removed without disrupting the entire network. Therefore, the statement that the physical bus topology is no longer used is false.
13.
A point-to-point topology is typically used for WAN connections.
Correct Answer
A. True
Explanation
A point-to-point topology is commonly used for WAN connections because it allows for a direct connection between two locations without the need for any intermediate devices. This type of topology is ideal for WAN connections as it provides a dedicated and secure connection between the two endpoints, ensuring efficient and reliable communication.
14.
A network's logical topology often depends on the central device's electronics.
Correct Answer
A. True
Explanation
The statement is true because the central device in a network, such as a router or switch, plays a crucial role in determining the logical topology. The central device controls the flow of data and manages the connections between different devices in the network. It determines how data is transmitted, received, and routed between devices. Therefore, the electronics and configuration of the central device greatly influence the logical topology of the network.
15.
A collision can occur on a switch only if the switch is operating in full-duplex mode.
Correct Answer
A. True
Explanation
In full-duplex mode, a switch can send and receive data simultaneously on different channels, which eliminates the possibility of collisions. Therefore, it is true that a collision can only occur on a switch if it is operating in full-duplex mode.
16.
What is one of the disadvantages of a peer-to-peer network compared to a server-based network?
Correct Answer
D. Limited security
Explanation
One of the disadvantages of a peer-to-peer network compared to a server-based network is limited security. In a peer-to-peer network, each device is responsible for its own security, making it more vulnerable to attacks and unauthorized access. Unlike a server-based network, where security measures can be centralized and controlled by a dedicated server, a peer-to-peer network lacks the same level of security infrastructure and control. This can pose a higher risk of data breaches and compromises, making it a disadvantage in terms of network security.
17.
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
Correct Answer
B. Net view
Explanation
The correct answer is "net view". This command is used to see a listing of the computers in your workgroup. It displays a list of all the computers that are currently connected to the same workgroup as the one you are currently on.
18.
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
Correct Answer
A. Additional costs
Explanation
A server-based network requires the purchase and maintenance of servers, which can be expensive. This includes the cost of the server hardware, software licenses, and IT staff to manage and maintain the servers. In contrast, a peer-to-peer network does not require dedicated servers, resulting in lower costs. Therefore, the additional costs associated with a server-based network make it a disadvantage compared to a peer-to-peer network.
19.
When data is being prepared for transmission onto the network, it is broken into small pieces and a header and trailer are added to each piece to help identify it. What is this process called?
Correct Answer
C. Encapsulation
Explanation
The process described in the question is called encapsulation. Encapsulation involves breaking data into smaller pieces and adding a header and trailer to each piece to help identify it during transmission on the network. This process ensures that the data is organized and can be easily identified and reassembled correctly at the receiving end.
20.
Every NIC is embedded with a unique address that consits of a 12-digit hexadecimal value. What is this address called?
Correct Answer
C. MAC address
Explanation
The unique address embedded in every NIC that consists of a 12-digit hexadecimal value is called the MAC address. The MAC address is used to identify a device on a network and is assigned by the manufacturer of the network interface card (NIC). It is different from an IP address, which is used for network communication at the internet protocol level. Subnet mask and default gateway are also network-related terms, but they are not specific to identifying the unique address of a NIC.
21.
What was the primary reason to create a network?
Correct Answer
D. All of the above
Explanation
The primary reason to create a network is to achieve multiple objectives. By creating a network, users can share resources such as printers, files, and software, which promotes efficiency and cost-effectiveness. Additionally, a network allows users to communicate with each other through email, facilitating quick and convenient information exchange. Furthermore, sharing information is another crucial benefit of a network, enabling users to access and distribute data easily. Therefore, the correct answer is "all of the above" as all these reasons contribute to the creation of a network.
22.
You are the network administrator for a company and you want to separate the traffic from the accounting department from the rest of the network. However, the accounting department still needs to have access to other network resources. What type of network do you need to implement?
Correct Answer
B. Internetwork
Explanation
To separate the traffic from the accounting department while still allowing access to other network resources, the network administrator needs to implement an internetwork. An internetwork, also known as an interconnected network, is a collection of individual networks connected together using routers. By implementing an internetwork, the accounting department's traffic can be isolated from the rest of the network while still maintaining connectivity to other resources. This allows for better security and control over the network traffic.
23.
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don't have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
Correct Answer
C. Peer-to-peer network
Explanation
A peer-to-peer network would be the most appropriate for this situation because it allows for easy sharing of files and a printer among a small number of workstations without the need for a dedicated server. In a peer-to-peer network, each workstation can act as both a client and a server, allowing for cost savings as there is no need to purchase and maintain a separate server. Additionally, since security is not a major concern, a peer-to-peer network can provide sufficient functionality at a lower cost compared to other types of networks.
24.
Why would you need to use a repeater?
Correct Answer
D. You need to add a group of computers to your network, and the distance is too far for normal means of communication.
Explanation
A repeater is used when you need to add a group of computers to your network, but the distance is too far for normal means of communication. A repeater extends the reach of a network by amplifying and regenerating the signals, allowing data to travel longer distances without degradation. This is especially useful in situations where running cables or establishing direct connections between the computers is not feasible due to distance limitations.
25.
Why is the use of a switch preferred over a hub?
Correct Answer
D. All of the above
Explanation
The use of a switch is preferred over a hub because devices on a hub have to share the available bandwidth, whereas switches are intelligent and can read the frame to determine where to send it. Additionally, switches can operate in full-duplex mode, allowing for simultaneous communication in both directions.
26.
What does a switch store in its switching table?
Correct Answer
A. The source MAC address of a frame and the port it was received on
Explanation
A switch stores the source MAC address of a frame and the port it was received on in its switching table. This allows the switch to efficiently forward frames to their intended destination by looking up the destination MAC address in the table and sending the frame out of the corresponding port. By keeping track of the source MAC address, the switch can also update its table in case the device moves to a different port.
27.
What is a packet called that is intended for only one indivdual computer?
Correct Answer
B. Unicast
Explanation
A packet that is intended for only one individual computer is called a unicast packet. Unicast refers to a type of communication where data is sent from one sender to one specific receiver. In this case, the packet is directed to a single computer, ensuring that only that computer receives and processes the data. Unlike broadcast or multicast, unicast packets are not intended for multiple recipients but rather for a single, targeted destination.
28.
What does it usually mean when the activity light on a switch is blinking?
Correct Answer
C. It is communication with the network
Explanation
When the activity light on a switch is blinking, it typically means that the switch is actively communicating with the network. This blinking light indicates that data is being transmitted or received by the switch, showing that it is functioning properly and actively engaged in network communication.
29.
What component of the computer provides it with a MAC address?
Correct Answer
B. NIC
Explanation
The NIC (Network Interface Card) is the component of the computer that provides it with a MAC address. A MAC address is a unique identifier assigned to the NIC, allowing it to communicate on a network. The motherboard is the main circuit board of the computer, responsible for connecting all the components together. The CPU (Central Processing Unit) is the brain of the computer, responsible for executing instructions. The BIOS (Basic Input/Output System) is firmware that initializes the hardware and software components of the computer during startup. None of these components are directly responsible for providing the computer with a MAC address.
30.
A MAC address is composed of two 24-bit numbers. What does the first 24-bit number represent
Correct Answer
D. It's the organizationally unique identifier for the manufacturer of the device
Explanation
The first 24-bit number in a MAC address represents the organizationally unique identifier for the manufacturer of the device. This identifier is assigned by the Institute of Electrical and Electronics Engineers (IEEE) and is unique to each manufacturer. It helps in identifying the manufacturer of the device based on the MAC address.
31.
What command issued from the command prompt will show the route that a packet travels from the issuing computer to another computer?
Correct Answer
B. Tracert
Explanation
The correct answer is "tracert". The tracert command, when issued from the command prompt, allows the user to trace the route that a packet takes from the issuing computer to another computer. It displays a list of all the routers (or hops) that the packet passes through, showing the IP addresses and response times for each hop. This command is useful for troubleshooting network connectivity issues and determining the path taken by network traffic.
32.
What is the purpose of the default route?
Correct Answer
C. It's where the router sends all packets with destinations of which it has no knowledge.
Explanation
The purpose of the default route is to serve as a destination for all packets that the router does not have specific knowledge about. When a router receives a packet with a destination address that it does not have a corresponding route for, it will forward the packet to the default route. This allows the router to handle any packets that do not match any specific routes in its routing table.
33.
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
Correct Answer
C. Hub
Explanation
A wireless access point is most like a hub in that all computers send signals through it to communicate with other computers. A hub is a networking device that connects multiple devices in a network, allowing them to communicate with each other. Similarly, a wireless access point acts as a central connection point for wireless devices, enabling them to connect to a network and communicate with other devices. Both devices serve as intermediaries for data transmission between computers in a network.
34.
The SSID is configured on which of the following so that it can be distinguished form other available wireless networks?
Correct Answer
B. Access point
Explanation
An access point is configured with a unique Service Set Identifier (SSID) so that it can be distinguished from other available wireless networks. The SSID is a name assigned to a wireless network and is used by devices to connect to a specific network. By configuring the SSID on the access point, it ensures that devices can identify and connect to the correct network amidst multiple available options. A router, switch, and repeater may also be part of the network infrastructure, but they do not specifically handle the configuration of the SSID.
35.
Which of the following is the physical topology that is daisychained like a bus and in which the cabling is brought around from the last device to the first device?
Correct Answer
C. pHysical ring
Explanation
A physical ring topology is a network configuration in which devices are connected in a circular manner, forming a ring. In this topology, the cabling is brought around from the last device to the first device, creating a continuous loop. This daisy-chained setup allows data to flow in one direction only, from one device to the next. Each device in the ring acts as a repeater, regenerating the signal and passing it along to the next device. This topology is commonly used in token ring networks, where a token is passed around the ring to control access to the network.
36.
What is the main advantage of a point-to-point topology?
Correct Answer
A. Data travels on a dedicated link
Explanation
The main advantage of a point-to-point topology is that data travels on a dedicated link. In this type of network, each device is connected directly to another device, creating a direct and exclusive communication path. This ensures that the data being transmitted does not have to compete with other devices for bandwidth, resulting in faster and more reliable communication. Additionally, because the link is dedicated, there is less risk of interference or congestion from other devices, further enhancing the reliability of the network.
37.
What type of logical topology is at work when using an Ethernet hub?
Correct Answer
A. Logical bus
Explanation
When using an Ethernet hub, a logical bus topology is at work. In this topology, all devices are connected to a central cable, known as the bus. The data is transmitted in a sequential manner, where each device receives the data and checks if it is intended for them. If not, the device simply ignores the data. This allows for easy connectivity and communication between devices, but it also means that if the bus fails, the entire network will be affected.
38.
In a token ring network, what is the central device called?
Correct Answer
D. Multistation access unity
Explanation
The central device in a token ring network is called a "multistation access unity." This device is responsible for controlling the flow of data in the network by passing a token from one device to another. Each device in the network has the opportunity to transmit data when it receives the token, ensuring fair access to the network resources.
39.
What does the frame trailer consist of in an Ethernet frame?
Correct Answer
D. Cyclic redundancy check
Explanation
The frame trailer in an Ethernet frame consists of a cyclic redundancy check (CRC). The CRC is a mathematical algorithm used to detect errors in the data transmission. It is appended to the end of the frame payload and is used by the receiving device to verify the integrity of the received data. By performing the CRC calculation on the received frame, the receiving device can determine if any errors occurred during transmission.
40.
What is the media access method used by Ethernet?
Correct Answer
A. CSMA/CD
Explanation
Ethernet uses the media access method known as CSMA/CD, which stands for Carrier Sense Multiple Access with Collision Detection. This method allows multiple devices to share the same network medium by listening for carrier signals and checking for collisions before transmitting data. If a collision is detected, the devices involved wait for a random amount of time before retransmitting their data. CSMA/CD helps to minimize collisions and maximize the efficiency of Ethernet networks.
41.
What is the best way to eliminate the possibility of collisions in a network?
Correct Answer
A. Only use switches
Explanation
Using only switches is the best way to eliminate the possibility of collisions in a network. Switches create separate collision domains for each connected device, ensuring that data packets are delivered directly to the intended recipient without any collisions. Unlike hubs, which share bandwidth among connected devices and can cause collisions, switches provide dedicated bandwidth for each device, thereby preventing collisions and improving network performance. Using NICS that operate in full-duplex mode, which allows for simultaneous sending and receiving of data, further enhances network efficiency and eliminates collisions. Therefore, both options a and c are correct.
42.
When discussing Ethernet standards, what does the XBaseY terminology refer to?
Correct Answer
B. The transmission speed, the type of transmissions, and the length or type of cabling
Explanation
The XBaseY terminology in Ethernet standards refers to the transmission speed, the type of transmissions, and the length or type of cabling. This terminology is used to describe different Ethernet standards, where X represents the transmission speed (such as 10, 100, or 1000) and Y represents the type of transmissions (such as BaseT for twisted pair cabling or BaseFX for fiber optic cabling). The order of the terms in the XBaseY notation is important as it provides information about the specific characteristics of the Ethernet standard being referred to.
43.
What is the IEEE standard governning wireless networking?
Correct Answer
D. 802.11
Explanation
The IEEE standard governing wireless networking is 802.11. This standard specifies the protocols and technologies for wireless local area networks (WLANs), commonly known as Wi-Fi. It defines the physical and data link layers of the network, including the frequencies, modulation techniques, and security mechanisms used for wireless communication. 802.11 has evolved over time to support higher data rates, improved security, and better performance, making it the widely adopted standard for wireless networking.
44.
In wireless networks, what type of media access control is used?
Correct Answer
C. CSMA/CA
Explanation
In wireless networks, CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is used as the media access control. This protocol allows multiple devices to share the same wireless channel by avoiding collisions. It works by sensing the channel before transmitting data and if it is clear, the device can transmit. If the channel is busy, the device waits for a random period of time before attempting to transmit again, reducing the chances of collisions. This method is commonly used in Wi-Fi networks to ensure efficient and reliable communication between devices.
45.
What is the main disadvantage of cable modem networking?
Correct Answer
D. It uses a bus topology
Explanation
The main disadvantage of cable modem networking is that it uses a bus topology. In a bus topology, all devices on the network are connected to a single cable, which means that if there is a problem with the cable, the entire network can be affected. Additionally, bus topology can lead to slower network speeds and limited bandwidth, as all devices share the same cable for communication. This can result in slower data transfer rates and reduced network performance.