1.
A MAC address is comprised of _____ sets of numbers that identify _____
Correct Answer
C. 2; the manufacturer and the device.
Explanation
Every device from the same manufacturer will have the same first set of numbers.
2.
In programming a device, the number is created by activating switches representing numbers from
Correct Answer
B. 1 to 128.
Explanation
The correct answer is 1 to 128 because the question states that the number is created by activating switches representing numbers from 2 to 256. Since the switches represent numbers from 2 to 256, it implies that the number can range from 2 to 256. However, the given options only include ranges that start from 1, so the only option that fits the given information is 1 to 128.
3.
Standards for networking are created by
Correct Answer
C. IEEE.
Explanation
IEEE, also known as the Institute of Electrical and Electronics Engineers, is responsible for creating standards in the field of networking. The organization develops and publishes various standards that are widely used in the industry, including those related to Ethernet, Wi-Fi, and other networking technologies. ANSI, NFPA, ASIS, and UL are also involved in creating standards, but they are not specifically focused on networking.
4.
The seven-layer model defines how everything from hardware to software is supposed to work in a network.
Correct Answer
A. True
Explanation
The statement is true because the seven-layer model, also known as the OSI model, is a conceptual framework that describes the functions of a network system. It breaks down the network communication process into seven layers, each responsible for specific tasks. These layers include physical, data link, network, transport, session, presentation, and application layers. By defining how hardware and software should work together, the seven-layer model provides a standardized approach for network communication and interoperability.
5.
The lower levels of the OSI networking model are _____ protocols, and the upper levels deal primarily with _____
Correct Answer
B. Hardware-centric; software.
Explanation
The lower levels of the OSI networking model are hardware-centric protocols, meaning they focus on the physical aspects of networking such as electrical signals and data transmission. On the other hand, the upper levels deal primarily with software, which includes tasks like data formatting, encryption, and error detection. This division between hardware-centric and software functions helps to ensure that the networking model operates efficiently and effectively.
6.
An IP address consists of _____ sets of numbers.
Correct Answer
B. 4
Explanation
Four sets of numbers separated by a period.
7.
The purchaser of the network device must program the MAC address into the device prior to activating it.
Correct Answer
B. False
Explanation
The statement is false because the MAC address is a unique identifier assigned to a network device by the manufacturer. It is not something that the purchaser can program into the device. The MAC address is already programmed into the device when it is manufactured and cannot be changed by the purchaser.
8.
Which of the following is not a type of protocol?
Correct Answer
C. RSP
Explanation
RSP is not a type of protocol. TCP (Transmission Control Protocol), UDP (User Datagram Protocol), IP (Internet Protocol), and DHCP (Dynamic Host Configuration Protocol) are all well-known protocols used in computer networks. However, RSP is not a recognized protocol and therefore is not a correct answer to the question.
9.
A MAC address is _____ bits long, written as _____ pairs of hexadecimal digits.
Correct Answer
B. 8; 24
Explanation
8 bits x 6 groups = 48, 6 groups hexadecimal = 0-F
10.
An IP address is _____ bits long and written as _____ numbers in a “dotted-decimal-notation” format.
Correct Answer
A. 32; 4
Explanation
An IP address is 32 bits long and written as 4 numbers in a "dotted-decimal-notation" format. This means that the IP address is divided into 4 sections, with each section representing 8 bits. Each section is separated by a period, creating the dotted-decimal-notation format. The 32-bit length allows for a large number of unique IP addresses to be created, which is necessary for the vast number of devices connected to the internet.
11.
MAC addresses are used for network routing.
Correct Answer
B. False
Explanation
MAC addresses, also known as Media Access Control addresses, are used for identifying network devices at the data link layer of the network protocol stack. They are not directly used for network routing, which is typically done using IP addresses at the network layer. MAC addresses are used for local communication within a network segment, while IP addresses are used for routing packets across different networks. Therefore, the statement that MAC addresses are used for network routing is false.
12.
IP addresses are assigned to the computer by the _____ as a static address or automatically using _____.
Correct Answer
B. Network administration; DHCP
Explanation
IP addresses are assigned to the computer by network administration using DHCP. DHCP stands for Dynamic Host Configuration Protocol, which is a network protocol that allows network administrators to allocate and manage IP addresses dynamically. This means that the IP addresses can be assigned automatically to computers on the network, making it easier for network administrators to manage and configure IP addresses without manually assigning static addresses.
13.
A NAT is
Correct Answer
D. The Network Address Translator.
Explanation
A Network Address Translator allows you to have a single IP address assigned to your LAN by your ISP, but it allows many hosts within the network to access the Internet.
14.
A(n) _____ has a(n) _____ address programmed into it when manufactured.
Correct Answer
D. NIC; MAC
Explanation
A NIC (Network Interface Card) has a MAC (Media Access Control) address programmed into it when manufactured. The MAC address is a unique identifier assigned to the NIC, which allows it to communicate with other devices on the network.
15.
SSL authentication is a two-way communication method.
Correct Answer
B. False
Explanation
SSL authentication is not a two-way communication method. It is a one-way communication method where the client verifies the authenticity of the server through a digital certificate. The server does not authenticate the client in this process. Therefore, the correct answer is False.