1.
(201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data and the physical characteristics of the network hardware. This layer ensures that the signals sent over the network are properly transmitted and received.
2.
(201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer is responsible for error control, flow control, and framing. It provides a reliable link between the network layer and the MAC sublayer. The MAC sublayer is responsible for controlling access to the physical media, managing data transmission, and addressing. Together, these two sublayers ensure efficient and reliable data transmission over a network.
3.
(201) At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes, such as switches and bridges. It provides error detection and correction, as well as the addressing of devices on a local network. Network switches and bridges use MAC addresses to forward data packets within a local area network (LAN), making them essential components at the Data Link layer.
4.
(201) At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network
Explanation
Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing and forwarding data packets between different networks. Routers make decisions about the best path for data packets to reach their destination based on network addresses. They use routing protocols to exchange information with other routers and build a routing table, which helps them make these decisions. Therefore, routers play a crucial role in connecting different networks and ensuring efficient data transmission.
5.
(201) At what Open System Interconnect layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for formatting and encrypting data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving system. Data compression reduces the size of the data to optimize transmission, while encryption ensures the security and confidentiality of the data. Therefore, the correct answer is Presentation.
6.
(201) What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application
Explanation
The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system. The OSI model consists of seven layers, each responsible for specific tasks. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with the user and serves as the interface between the user and the underlying network protocols.
7.
(201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
Correct Answer
D. Protocol
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of the data transmission. By following a protocol, computers can communicate effectively and ensure that the information is transmitted accurately and reliably.
8.
(202) What topology defines the layout of a network's devices and media?
Correct Answer
A. pHysical
Explanation
The correct answer is "Physical." Physical topology refers to the physical arrangement of devices and media in a network. It defines how the devices are connected to each other and how they are physically laid out. This includes the placement of devices such as computers, routers, switches, and cables. It does not involve any logical or conceptual aspects of the network, but rather focuses on the actual physical connections and locations of the devices.
9.
(202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
Correct Answer
B. Logical
Explanation
Logical topology defines the way in which devices communicate and data is transmitted throughout the network. It describes the logical connections between devices, such as how data flows from one device to another, without considering the physical layout or arrangement of the devices. This includes concepts like bus, ring, and mesh topologies, which determine how devices are interconnected and how data is routed between them.
10.
(202) What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus
Explanation
The correct answer is Bus. In a bus topology, devices are connected to a common cable called the bus. The bus acts as a shared communication medium, allowing all devices to transmit and receive data. Each device on the network listens for data packets and only accepts those addressed to it. This topology is relatively simple and cost-effective, but it can suffer from performance issues if multiple devices try to transmit data simultaneously.
11.
(202) What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star
Explanation
A star topology consists of cable segments from each computer connected to a centralized component, typically a switch or hub. In this configuration, all communication between the computers passes through the central component, allowing for easy management and troubleshooting. This topology provides better performance and reliability compared to bus or ring topologies, as a single point of failure does not disrupt the entire network.
12.
(202) What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that it can have a combination of bus, ring, star, or other types of topologies. This allows for greater flexibility and scalability in the network design, as different sections of the network can be configured with different topologies based on their specific requirements.
13.
(203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol
Explanation
The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable and secure transmission of data over networks. It is widely used in the internet and provides a standardized framework for communication between devices. TCP/IP ensures that data packets are delivered in the correct order and that errors in transmission are detected and corrected. It is the foundation of modern networking and is used by a wide range of industries and organizations, including the Department of Defense.
14.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
Correct Answer
B. Address Resolution Protocol
Explanation
The Address Resolution Protocol (ARP) is the correct answer because it is the protocol used to match a known IP address for a destination device to a Media Access Control (MAC) address. ARP is responsible for resolving the IP address to the corresponding MAC address in order to establish communication between devices on a TCP/IP network.
15.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
Correct Answer
C. Reverse Address Resolution Protocol
Explanation
The Reverse Address Resolution Protocol (RARP) is the network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in scenarios where a device does not have a configured IP address and needs to obtain one dynamically based on its MAC address.
16.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol
Explanation
The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging to help with troubleshooting. It is used by network devices to send error messages and operational information to indicate network problems or to diagnose network connectivity issues. ICMP messages include information about unreachable hosts, network congestion, and time exceeded. By using ICMP, network administrators can identify and troubleshoot network problems more efficiently.
17.
(203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol
Explanation
The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without any errors. TCP uses various mechanisms such as acknowledgment, retransmission, and flow control to ensure reliable data transmission. It is widely used in applications that require guaranteed delivery of data, such as web browsing, file transfer, and email.
18.
(203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
Correct Answer
A. File Transfer Protocol
Explanation
The correct answer is File Transfer Protocol (FTP). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a simple and reliable way to send and receive files, allowing users to upload, download, and manage files on remote servers. FTP operates on the application layer of the TCP/IP protocol suite and uses separate control and data connections to perform file transfers.
19.
(204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network
Explanation
A Wide Area Network (WAN) is the correct answer because it connects networks that are separated by large geographical distances, such as between cities, states, countries, or even worldwide. Unlike a Local Area Network (LAN) which connects devices within a limited area like a home or office, a WAN allows for communication and data transfer over long distances. Virtual Private Network (VPN) is a technology that creates a secure connection over a public network, while Metropolitan Area Network (MAN) connects networks within a specific geographic area like a city.
20.
(204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual Private Network
Explanation
A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to enable communication between two or more computer systems over the public Internet. It creates a secure and encrypted connection, allowing users to access resources on a private network remotely. VPNs are commonly used by businesses to provide secure remote access for their employees, as well as by individuals to protect their online privacy and bypass geographical restrictions.
21.
(204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080
Explanation
Port 8080 is commonly used for hosting Hyper Text Transfer Protocol (HTTP) servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative when the standard port is already occupied or when additional HTTP servers need to be hosted on the same machine. It allows for the communication of web browsers and servers, enabling the transfer of hypertext documents over the internet.
22.
(205) How many bits are in an IPv4 address?
Correct Answer
B. 32 bits
Explanation
An IPv4 address is made up of 32 bits. This means that there are a total of 2^32 (4,294,967,296) possible unique addresses in the IPv4 addressing system. Each bit in the address represents a binary value of either 0 or 1, resulting in a 32-bit binary number that uniquely identifies a device connected to a network.
23.
(205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four octets, separated by dots. Each octet represents a decimal value ranging from 0 to 255, making it easier for users to read and understand the address. This format is widely used and familiar to most people, making it the preferred way to express IPv4 addresses.
24.
(205) Using a range of 1-136 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A
Explanation
An IPv4 address is divided into different classes based on the range of the first octet. Class A addresses have a range of 1-126 in the first octet, so an IPv4 address with a range of 1-136 in the first octet belongs to Class A.
25.
(205) What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C
Explanation
Class C is the correct answer because it is typically used for networks with about 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for a maximum of 254 usable host addresses. This makes it suitable for small to medium-sized networks, such as small businesses or home networks. Class D is used for multicast addresses, Class E is reserved for experimental use, and Class F is not defined and therefore not used.
26.
(205) What iPv4 class address is used for multicast addressing?
Correct Answer
B. Class D
Explanation
Class D addresses in IPv4 are reserved for multicast addressing. Multicast addressing is a method of sending IP packets to a group of hosts on a network simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255.
27.
(205) What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1
Explanation
The loopback address is a reserved IPv4 address that is used to test network connectivity on a local device. The correct answer is 127.0.0.1. This address is commonly referred to as the localhost address and is used to send network packets back to the device itself. It can be used to troubleshoot network issues or test network applications without actually sending data over a physical network.
28.
(205) What is a mechanism that allows a network device to divide an IP address into a network and host number?
Correct Answer
A. Subnet mask
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is a 32-bit number used to determine which part of the IP address belongs to the network and which part belongs to the host. By using the subnet mask, the device can determine if a destination IP address is on the same network or a different network, allowing for proper routing and communication between devices.
29.
(205) What is the default classful subnet mask on class B networks?
Correct Answer
A. 255.255.0.0
Explanation
The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for 16 bits of network address and 16 bits of host address, giving a total of 65,536 possible networks and 65,534 possible hosts per network.
30.
(205) What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
B. Classless Inter-Domain Routing
Explanation
Classless Inter-Domain Routing (CIDR) is a method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more efficient allocation of IP addresses by allowing variable-length subnet masks. This means that instead of being limited to the fixed subnet masks used in classful subnet masking, CIDR allows for more flexibility in dividing IP address space into smaller subnets.
31.
(206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format
Explanation
IPv6 addresses are expressed in a more user-friendly way using the Colon Hexadecimal Format. In this format, the address is divided into eight groups of four hexadecimal digits, separated by colons. This format allows for a larger address space compared to IPv4, which uses dotted decimal notation. The use of hexadecimal digits makes it easier for users to read and understand the address, as hexadecimal numbers are commonly used in computing.
32.
(206) What notation is expressed in leading zero compression for IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234
Explanation
Leading zero compression in IPv6 notation allows consecutive blocks of zeros to be represented with a double colon "::". In the given answer, the notation 1234:1234:0:0:1234:0:0:1234 is expressed in leading zero compression because the consecutive blocks of zeros are compressed using "::".
33.
(206) What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678
Explanation
The correct answer is 10AB::3:0:1234:5678. This is an example of zero compression notation in IPv6. In zero compression, consecutive blocks of zeros are replaced with a double colon (::). This is done to simplify and shorten the representation of IPv6 addresses. In the given answer, the consecutive blocks of zeros between 10AB and 3 are compressed using double colon (::).
34.
(206) What Unicast address scope operates within a network segment, and will not originate from, or to be destined to, an interface that requires a router to direct traffic?
Correct Answer
B. Link-local
Explanation
A link-local address operates within a network segment and does not require a router to direct traffic. It is used for communication within the local network and cannot be routed outside of the network segment. Therefore, it meets the criteria mentioned in the question. Site-local, aggregatable local, and aggregatable global addresses may require a router for traffic to be directed, so they are not the correct answer.
35.
(206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
Correct Answer
A. Site-local
Explanation
The correct answer is Site-local. Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique or routable on the internet. They provide a way for devices within a site to communicate with each other without exposing their addresses to the outside world.
36.
(206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global
Explanation
Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is divided into different areas, enabling hierarchical design and allocation. This allows for efficient management and organization of IP addresses on a global scale.
37.
(207) The computing part of the computer is the central processing unit, also called the
Correct Answer
C. Microprocessor.
Explanation
The computing part of a computer refers to the component that carries out the actual processing of data and instructions. The central processing unit (CPU) is responsible for this task, and it consists of several subunits, including the control unit, arithmetic logic unit, and the microprocessor. However, the microprocessor is the specific component within the CPU that performs the actual computation and controls the overall operation of the computer. Therefore, the correct answer is microprocessor.
38.
(207) What two main components make up the central processing unit?
Correct Answer
B. Control unit and arithmetic logic unit.
Explanation
The central processing unit (CPU) is composed of two main components, namely the control unit and the arithmetic logic unit (ALU). The control unit is responsible for coordinating and managing the operations of the CPU, including fetching instructions from memory, decoding them, and executing them. On the other hand, the ALU performs arithmetic and logical operations, such as addition, subtraction, and comparison, required by the instructions. Therefore, the correct answer is control unit and arithmetic logic unit.
39.
(207) What is the type of memory that retains data after power is removed or lost?
Correct Answer
B. Nonvolatile
Explanation
Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which loses its data when power is turned off, nonvolatile memory stores information permanently. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory. It allows for the long-term storage and retrieval of data, making it essential for preserving information even during power outages or system shutdowns.
40.
(207) Which landline transmission medium is the primary carrier of voice communications?
Correct Answer
A. Twisted pair cable
Explanation
Twisted pair cable is the primary carrier of voice communications because it is a type of copper cable that consists of pairs of insulated wires twisted together. This design helps to reduce interference and crosstalk, ensuring clear and reliable transmission of voice signals. Twisted pair cable is widely used in telephone networks and is capable of carrying analog voice signals efficiently over long distances. It is a cost-effective and readily available transmission medium for voice communication.
41.
(207) An optical communications system is comprised of a
Correct Answer
A. Transmitter, cable, and receiver.
Explanation
An optical communications system requires a transmitter to convert electrical signals into optical signals, a cable to transmit the optical signals, and a receiver to convert the optical signals back into electrical signals. A logic analyzer is not necessary for the basic functioning of an optical communications system. Similarly, a protocol analyzer is not required as it is used for analyzing and debugging communication protocols, which is not directly related to the transmission of optical signals. Therefore, the correct answer is transmitter, cable, and receiver.
42.
(207) Which of the following is not one of the three advantages to using wireless technology?
Correct Answer
C. Safety
Explanation
Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology can provide convenience and flexibility, it also comes with potential security risks and vulnerabilities. Therefore, safety is not considered a primary advantage of using wireless technology.
43.
(207) The ability to move about without being tethered by wires technology is called
Correct Answer
A. Mobility.
Explanation
The correct answer is mobility. Mobility refers to the ability to move about freely without being restricted by wires or cables. This term is commonly used in technology to describe wireless devices or systems that allow for easy movement and portability. In this context, mobility is the most appropriate term to describe the ability to move about without being tethered by wires. Ease of installations, war driving, and motion capture technology are not relevant to the given question.
44.
(207) Which of the following is not one of the four security threats to Wireless Local Area Network?
Correct Answer
B. Direct Connections
Explanation
Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points refer to unauthorized access points that can be set up by attackers to gain access to the network. War Drivers are individuals who drive around with wireless devices to detect and exploit vulnerabilities in wireless networks. Hackers are individuals who attempt to gain unauthorized access to a network. However, Direct Connections do not pose a specific security threat to Wireless Local Area Network as they are typically used for legitimate purposes, such as connecting devices directly to a router or modem.
45.
(207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
Correct Answer
B. Employee
Explanation
An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user with access privileges, an employee can either unintentionally compromise the network by falling victim to social engineering or phishing attacks, or intentionally exploit their privileges for personal gain or to assist external hackers. Employees are considered a potential insider threat as they have insider knowledge and access to sensitive information, making them a significant risk to the security of a network.
46.
(207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?
Correct Answer
A. Institute of Electrical Electronics Engineers
Explanation
The Institute of Electrical Electronics Engineers (IEEE) is the correct answer because it is an organization that has developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. The IEEE is renowned for its work in the field of electrical engineering and is responsible for creating standards such as IEEE 802.11 (Wi-Fi) and IEEE 802.15 (Bluetooth). These standards ensure that wireless devices can communicate with each other effectively and securely.
47.
(208) How many peripherals can a Universal Serial Bus handle at once?
Correct Answer
A. 127
Explanation
A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit address scheme to communicate with devices, allowing for a maximum of 127 unique addresses. Each peripheral connected to the USB is assigned a unique address, and the USB controller can communicate with all of them simultaneously. Therefore, the correct answer is 127.
48.
(208) How many devices can connect to a FireWire bus?
Correct Answer
A. 63
Explanation
A FireWire bus can support up to 63 devices. This is because the FireWire standard allows for a maximum of 63 devices to be connected in a daisy-chain configuration, where each device is connected to the previous one in a linear chain. Each device in the chain has a unique identifier, allowing them to be recognized and communicated with individually. Therefore, the correct answer is 63.
49.
(209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
Correct Answer
B. Voltage
Explanation
Voltage is applied across Liquid Crystal Display (LCD) material to change the alignment and light polarizing property. The application of voltage alters the orientation of liquid crystal molecules, which in turn affects the alignment of the liquid crystal material. This change in alignment allows control over the amount of light passing through the LCD, thus enabling the display of different colors and images. By adjusting the voltage, the desired alignment and polarizing properties can be achieved, resulting in the desired display output.
50.
(210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
Correct Answer
B. Bridge
Explanation
A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of incoming frames and forwarding them only to the appropriate segment, effectively reducing collisions and improving network performance. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently filters and forwards frames based on their destination MAC address. This allows for more efficient and secure communication within a network. A switch is similar to a bridge but typically has more ports and additional features. A router, on the other hand, operates at the Network layer and is responsible for forwarding packets between different networks.