1.
What is the physical address of a network interface card?
Correct Answer
B. MAC
Explanation
The physical address of a network interface card is commonly referred to as the MAC (Media Access Control) address. The MAC address is a unique identifier assigned to each network interface card by the manufacturer. It is used to identify devices on a network at the hardware level. The MAC address is a combination of six pairs of alphanumeric characters, separated by colons or hyphens. Unlike IP addresses, MAC addresses are assigned to the hardware itself and do not change, making them a reliable way to identify network devices.
2.
In a class B IP address, which two octets are reserved for the host?
Correct Answer
D. Third and Fourth
Explanation
In a class B IP address, the third and fourth octets are reserved for the host. Class B IP addresses have a default subnet mask of 255.255.0.0, which means the first two octets represent the network portion, while the last two octets represent the host portion. Therefore, the third and fourth octets are used to identify individual hosts within the network.
3.
What are the characteristics of TCP?
Correct Answer
A. Connection-oriented, error-checking, reliable
Explanation
TCP (Transmission Control Protocol) is a reliable and connection-oriented protocol used for transmitting data over a network. It ensures that data is delivered in the correct order and without errors. TCP uses error-checking mechanisms such as checksums to verify the integrity of data during transmission. It also establishes a connection between the sender and receiver before data transfer, ensuring that data is delivered in the correct sequence. Therefore, the characteristics of TCP are connection-oriented, error-checking, and reliable.
4.
Which of the following is a class B address?
Correct Answer
B. 190.152.60.32
Explanation
A class B address is identified by the first two octets, which range from 128 to 191. In the given options, the address 190.152.60.32 falls within this range, making it a class B address.
5.
What OSI layer does a switch reside on?
Correct Answer
A. Datalink
Explanation
A switch is a networking device that operates at the data link layer of the OSI model. This layer is responsible for the reliable transmission of data between adjacent network nodes. Switches use MAC addresses to forward data packets within a local area network (LAN). Therefore, the correct answer is "Datalink."
6.
Which of the following ports use TCP?
Correct Answer
C. FTP
Explanation
FTP (File Transfer Protocol) is a standard network protocol used for transferring files from one host to another over a TCP-based network, such as the internet. TCP (Transmission Control Protocol) is a reliable, connection-oriented protocol that ensures the delivery of data packets in the correct order and without errors. Therefore, FTP uses TCP as its underlying transport protocol to establish a reliable connection between the client and server, ensuring the successful transfer of files. TFTP (Trivial File Transfer Protocol), DHCP (Dynamic Host Configuration Protocol), and NTP (Network Time Protocol) do not use TCP as their transport protocol.
7.
At what OSI layer does a hub reside?
Correct Answer
A. pHysical
Explanation
A hub operates at the physical layer of the OSI model. The physical layer is responsible for the transmission and reception of raw data bits over a physical medium, such as cables. Hubs simply receive incoming data and broadcast it to all connected devices without any intelligence or filtering. They do not analyze or interpret the data at higher layers of the OSI model. Therefore, a hub is considered to be a physical layer device.
8.
Which of the following would be used to detect attacks?
Correct Answer
B. IDS
Explanation
An IDS (Intrusion Detection System) is a security tool used to detect attacks on a network or system. It monitors network traffic and analyzes it for any suspicious or malicious activity. IDS can detect various types of attacks, such as unauthorized access attempts, malware infections, and unusual network behavior. It alerts the system administrators or security personnel when an attack is detected, allowing them to take appropriate action to protect the network or system. Unlike a firewall, which mainly focuses on blocking unauthorized access, an IDS is specifically designed to identify and respond to attacks.
9.
What is the function of ARP?
Correct Answer
D. Converts an IP address to a pHysical address
Explanation
ARP (Address Resolution Protocol) is responsible for converting an IP address to a physical address, also known as a MAC address. This is necessary because IP addresses are used for routing data over the internet, while MAC addresses are used for communication within a local network. ARP allows devices to find the MAC address of another device on the same network by sending an ARP request. Once the MAC address is obtained, the device can establish a direct connection and communicate with the intended recipient.
10.
Which of the following would be used to connect two geographically separated addresses?
Correct Answer
A. Router
Explanation
A router would be used to connect two geographically separated addresses. Routers are networking devices that forward data packets between networks. They determine the best path for data to travel from one network to another, which makes them ideal for connecting geographically separated addresses. Routers can also provide security features such as firewall protection. Switches, hubs, and bridges are also networking devices, but they are typically used to connect devices within a local network rather than connecting geographically separated addresses.
11.
What is the 2nd layer of the OSI model?
Correct Answer
A. Datalink
Explanation
Physical is the 1st layer. Presentation is the 6th layer. Internet is a TCP/IP model layer, not an OSI layer
12.
Which protocol uses port 23?
Correct Answer
C. Telnet
Explanation
FTP uses port 21. SMTP uses port 25. HTTP uses port 80
13.
The Transport layer of the OSI model communicates with which two layers?
Correct Answer
C. Session, Network
Explanation
An OSI layer only communicate with the immediately adjacent layers. Therefore, the 4th layer (Transport) only communicates with the 5th (Session) and 3rd (Network) layers.
14.
Which of the following is a private IP address
Correct Answer
A. 192.168.0.0
Explanation
The IP address 192.168.0.0 is a private IP address because it falls within the range of private IP addresses defined by the Internet Assigned Numbers Authority (IANA). These private IP addresses are reserved for use within private networks and are not routable on the public internet. The other three IP addresses mentioned (11.0.0.0, 173.12.0.0, and 190.170.0.0) do not fall within the range of private IP addresses and are therefore not considered private.
15.
How many bits does an IPv6 address use?
Correct Answer
D. 128
Explanation
IPv6 uses 128 bits while IPv4 uses 32 bits
16.
Which subnet mask will allow for 16 hosts?
Correct Answer
B. 255.255.255.240
Explanation
The subnet mask that will allow for 16 hosts is 255.255.255.2401. This subnet mask provides 16 addresses, but keep in mind that in a subnet, the first address is reserved for the network address and the last address is reserved for the broadcast address, leaving 14 usable addresses for hosts. So, the correct answer to your question is 255.255.255.240.
17.
What is the first step of the TCP three-way handshake?
Correct Answer
D. Send SYN
Explanation
The three-way handshake is as follows: host sends SYN, server sends ACK, host sends SYN-ACK
18.
What would UDP be used for?
Correct Answer
D. VoIP
Explanation
File-sharing, downloading, and e-mail require error-free guaranteed delivery so they use TCP. VoIP needs fast data transmission and does not require error-checking so it uses UDP
19.
What is the function of DNS?
Correct Answer
C. Translates name to numerical IP address
Explanation
DHCP allocates IP address
20.
Which of the following does not encrypt data?
Correct Answer
B. Telnet
Explanation
Telnet does not encrypt data. Telnet is a network protocol that allows remote access to computers over a network. It is an unsecured protocol, meaning that the data transmitted over Telnet is sent in plain text and can be easily intercepted and read by anyone with access to the network. In contrast, SSH, SSL, and IPsec are all encryption protocols that provide secure communication by encrypting the data transmitted between devices, ensuring privacy and preventing unauthorized access.
21.
Which command will display all connections and listening ports?
Correct Answer
C. Netstat -a
Explanation
netstat -n will display addresses and port numbers in numerical form. nbtstat -a will list the remote machine's name table given its name. trace -n is not a valid command
22.
Which of the following options is used to set a ping's TTL?
Correct Answer
A. -i
Explanation
-t pings the destination host until interrupted. -a resolves addresses to hostnames. -w sets timeout in milliseconds to wait for each reply
23.
Which command will traceroute and provide network latency and packet loss for each router and link in the path?
Correct Answer
D. Pathping
Explanation
ping will test a network connection. route will manipulate network routing tables. tracert will trace route to a remote host
24.
Which command will query all records on a name server?
Correct Answer
A. Nslookup -d
Explanation
nslookup -a will list aliases and canonical names. get-dns is not a CMD command. netview -a is not a valid command
25.
Which of the following will refresh all DHCP leases?
Correct Answer
A. Ipconfig /renew
Explanation
The correct answer is ipconfig /renew because it is the command in Windows that initiates the process of refreshing DHCP leases. When you run ipconfig /renew, your computer sends a request to the DHCP server to extend or renew its current DHCP lease. This is important because DHCP leases have a limited duration, and by renewing them, your computer can continue to use the same IP address and network configuration without interruption.