1.
"IEEE 802.3" refers to what collection of network standards?
Correct Answer
D. Ethernet
Explanation
IEEE 802.3 refers to the collection of network standards known as Ethernet. Ethernet is a widely used technology for local area networks (LANs) that allows devices to communicate with each other over a wired connection. The IEEE 802.3 standards define the specifications for the physical and data link layers of Ethernet networks, including the protocols and technologies used for transmitting data packets. Ethernet has evolved over time, with different versions and speeds, but it remains a fundamental and widely adopted networking standard.
2.
What is the official TCP port for an outgoing email from an end user's email client?
Correct Answer
B. 587
Explanation
The official TCP port for an outgoing email from an end user's email client is 587. This port is specifically designated for email message submission, allowing end users to send emails through their email client to the email server. Port 587 is commonly used when the email client is configured to use the SMTP (Simple Mail Transfer Protocol) protocol with TLS (Transport Layer Security) encryption for secure email transmission.
3.
What is the port number used by SSL?
Correct Answer
C. 443
Explanation
SSL (Secure Sockets Layer) is a protocol that provides secure communication over the internet. It uses port number 443 to establish a secure connection between a client and a server. This port is designated specifically for HTTPS (HTTP over SSL) traffic. Therefore, the correct answer is 443.
4.
What is the "Reverse DNS Lookup" used for?
Correct Answer
A. Convert IP Address To The Host Name
Explanation
Reverse DNS Lookup is used to convert an IP address to the corresponding host name. This process allows users to identify the domain name associated with a specific IP address. This is particularly useful in network troubleshooting, security analysis, and spam filtering, as it provides information about the origin and ownership of an IP address. By performing a Reverse DNS Lookup, users can gain insights into the identity and location of a server or device connected to a specific IP address.
5.
What is the maximum data rate for CAT 5 twisted pair cable?
Correct Answer
B. 1000 Mbps
Explanation
The maximum data rate for CAT 5 twisted pair cable is 1000 Mbps. CAT 5 cable is capable of transmitting data at speeds up to 1000 Mbps, making it suitable for high-speed Ethernet networks. This type of cable is commonly used for internet connections, local area networks (LANs), and other data transmission applications.
6.
What is the name of the self-maintaining routing protocol for wireless networks?
Correct Answer
C. DSR
Explanation
DSR stands for Dynamic Source Routing, which is a self-maintaining routing protocol for wireless networks. It allows nodes in a network to dynamically discover and maintain routes to other nodes in the network. With DSR, each packet carries the complete route information, eliminating the need for a centralized routing table. This protocol is commonly used in ad hoc wireless networks, where nodes can join or leave the network at any time.
7.
What is the name of a packet sent out from a router to establish network adjacency relationships?
Correct Answer
A. HELLO
Explanation
The correct answer is "HELLO". In networking, a "HELLO" packet is sent out from a router to establish network adjacency relationships. This packet is used to discover and establish connections with neighboring routers in order to exchange routing information and maintain network connectivity.
8.
What class of the network is reserved and not used?
Correct Answer
B. Class E
Explanation
Class E is the correct answer because it is a reserved class of network addresses that are not used for normal network operations. Class E addresses range from 240.0.0.0 to 255.255.255.255 and are reserved for future use or experimental purposes. These addresses are not assigned to any specific organization or used in the current internet infrastructure.
9.
What is the size of the biggest ICMP packet possible?
Correct Answer
A. 76 Bytes
Explanation
The correct answer is 76 Bytes because the maximum size of an ICMP packet, including the header, is 76 bytes. ICMP (Internet Control Message Protocol) is a network protocol used for diagnostic and error reporting purposes in IP networks. The maximum size of an ICMP packet is determined by the maximum size of the IP packet, which is 65,535 bytes, minus the size of the IP and ICMP headers. Therefore, the largest ICMP packet possible is 76 bytes.
10.
What is an FTP connection which does not require authentication called?
Correct Answer
C. Anonymous
Explanation
An FTP connection which does not require authentication is called "Anonymous". This means that anyone can connect to the FTP server without providing any credentials or authentication. It is commonly used for public file sharing or downloading files from public repositories.
11.
What networking term defines an attack that takes advantage of a vulnerability?
Correct Answer
B. Exploit
Explanation
An exploit is a term used in networking to define an attack that takes advantage of a vulnerability. It refers to the act of using a weakness or flaw in a system or software to gain unauthorized access, cause damage, or extract sensitive information. Exploits can be used to launch various types of attacks, such as gaining control over a system, executing malicious code, or bypassing security measures. Unlike DDoS (Distributed Denial of Service), DoS (Denial of Service), and Trojan, which are different types of attacks, an exploit specifically refers to the method used to carry out an attack.
12.
Which Ethernet standard uses thick RG8 coaxial cable with an AUI connector?
Correct Answer
C. 10base5
Explanation
10base5 is the correct answer because it is the Ethernet standard that uses thick RG8 coaxial cable with an AUI connector. This standard, also known as Thicknet or Thick Ethernet, supports a maximum data transfer rate of 10 Mbps and uses a thick coaxial cable for transmission. The AUI (Attachment Unit Interface) connector is used to connect the thick coaxial cable to the network interface card (NIC) of a device.
13.
What type of twisted pair can transmit data at 10 Mbps or faster?
Correct Answer
D. Categories 3, 4, 5
Explanation
Categories 3, 4, and 5 twisted pair cables can transmit data at 10 Mbps or faster. This is because these categories of cables have higher bandwidth capabilities compared to lower categories like Category 1 and 2. Category 3 cables can support data transmission up to 10 Mbps, while Category 4 and 5 cables can support even higher speeds. Therefore, the correct answer is Categories 3, 4, 5.
14.
Which layer of the OSI model does a NIC fall under?
Correct Answer
B. Data Link
Explanation
A NIC (Network Interface Card) falls under the Data Link layer of the OSI model. This layer is responsible for the reliable transmission of data between two nodes on a network. The NIC handles the physical connection to the network and also performs functions such as framing, error detection, and MAC address assignment. Therefore, the Data Link layer is the correct layer in which a NIC operates.
15.
What is the first field in the header of a TCP segment?
Correct Answer
B. Source Port
Explanation
The first field in the header of a TCP segment is the Source Port. This field identifies the port number of the sender's application or process. It is used to establish a connection between the sender and the receiver, allowing them to communicate effectively. The Source Port is crucial in the TCP header as it helps in the proper routing and delivery of the data packets.
16.
What company was the first to patent ethernet technology?
Correct Answer
A. Xerox
Explanation
Xerox was the first company to patent Ethernet technology. Ethernet is a widely used networking technology that enables devices to communicate with each other within a local area network (LAN). Xerox's invention of Ethernet in the 1970s revolutionized computer networking and laid the foundation for the modern internet. Their patent on Ethernet technology allowed them to establish their dominance in the networking industry and paved the way for further advancements in networking technology.
17.
What the first version number of HTTP (Hyper Text Transfer Protocol)?
Correct Answer
D. 0.9
Explanation
The first version number of HTTP is 0.9. This version was a simple protocol that allowed for the transfer of hypertext documents between a client and a server. It only supported GET requests and did not have headers or status codes. This version was later replaced by HTTP 1.0, which introduced more features and improvements to the protocol.
18.
What is the size of UDP header?
Correct Answer
D. 8 Bytes
Explanation
The size of the UDP header is 8 bytes.
19.
What is the size of TCP header?
Correct Answer
B. 20 Bytes
Explanation
The size of the TCP header is 20 Bytes. The TCP (Transmission Control Protocol) header is a part of the TCP segment and contains important information such as source and destination port numbers, sequence and acknowledgment numbers, and control flags. The TCP header is fixed in size and always consists of 20 Bytes. This fixed size allows for efficient processing and interpretation of the TCP segment by network devices and applications.
20.
What is the size of a standard IP address?
Correct Answer
D. 32 Bits
Explanation
An IP address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. The size of a standard IP address is 32 bits. This means that an IP address consists of four sets of 8 bits each, separated by periods. Each set can have a value ranging from 0 to 255, resulting in a total of 4,294,967,296 unique IP addresses.