1.
What is a common method of moving files from system to system using TCP/IP?
Correct Answer
D. File Transfer Protocol
Explanation
File Transfer Protocol (FTP) is a common method of moving files from system to system using TCP/IP. FTP allows users to transfer files between a client and a server over a network. It provides a simple and standard way to transfer files, allowing users to upload, download, and manage files on remote systems. FTP uses TCP/IP as the underlying protocol to establish a connection between the client and server, ensuring reliable and secure file transfers.
2.
A 5th generation "Twisted Pair" Ethernet cable is known by what name?
Correct Answer
A. CAT5
Explanation
A 5th generation "Twisted Pair" Ethernet cable is known as CAT5.
3.
What service translates domain names (computer hostnames) to IP addresses?
Correct Answer
C. DNS
Explanation
DNS (Domain Name System) is the service that translates domain names (computer hostnames) to IP addresses. It is responsible for resolving human-readable domain names into machine-readable IP addresses, allowing users to access websites and other online services using memorable domain names instead of numerical IP addresses. Telnet and Usenet are not related to translating domain names to IP addresses, while DSN (Data Source Name) is a database connection string and is also not related to DNS.
4.
What network service is usually supported by cell phones?
Correct Answer
A. GPRS
Explanation
GPRS, or General Packet Radio Service, is a network service that is commonly supported by cell phones. It allows mobile devices to connect to the internet and transmit data packets, enabling activities such as web browsing, email, and instant messaging. GPRS operates on a GSM network and provides a relatively fast and efficient data connection for mobile devices. SSH, IRC, and Telnet are not typically supported by cell phones as they are more commonly used for remote access to servers or computer systems.
5.
What computer network tool tests whether a particular host is reachable across an IP network?
Correct Answer
C. Ping
Explanation
Ping is a computer network tool that tests whether a particular host is reachable across an IP network. It sends a small packet of data to the host and waits for a response. If the host responds, it indicates that the host is reachable. Ping is commonly used to troubleshoot network connectivity issues and measure the response time of a host.
6.
What is the name of the device which joins multiple wired or wireless networks together?
Correct Answer
C. Router
Explanation
A router is a device that joins multiple wired or wireless networks together. It acts as a central hub, directing network traffic between different devices and networks. Routers are commonly used in homes and offices to connect multiple devices to the internet and enable communication between them. They determine the best path for data packets to travel, ensuring efficient and secure transmission of information. Routers also provide network security features such as firewalls and virtual private networks (VPNs).
7.
What is the name of the software item which monitors and limits the flow of information through a computer network?
Correct Answer
A. Firewall
Explanation
A firewall is a software item that monitors and limits the flow of information through a computer network. It acts as a barrier between a trusted internal network and an untrusted external network, controlling incoming and outgoing network traffic based on predetermined security rules. It helps prevent unauthorized access to or from a private network, protecting it from potential threats and attacks. Firewalls are essential in ensuring network security and maintaining the confidentiality, integrity, and availability of information within a computer network.
8.
What is a computer's loopback IP address?
Correct Answer
D. 127.0.0.1
Explanation
The loopback IP address, 127.0.0.1, is a special address that allows a computer to send network packets to itself. It is often used for testing network software or troubleshooting network connectivity issues. When a computer sends a packet to the loopback address, it is immediately routed back to itself without going through any physical network interface. This allows programs to communicate with each other on the same machine using the network stack, even if there is no physical network connection present.
9.
What is the name of a specially-configured subset of a larger network?
Correct Answer
B. Segment
Explanation
A segment is a specially-configured subset of a larger network. It refers to a portion of a network that is separated or divided for specific purposes, such as improving performance, security, or management. Segments are often used to isolate different departments or functions within an organization, allowing for better control and organization of network resources.
10.
What is a name given to malicious network software designed to steal data from the computer?
Correct Answer
C. Trojan
Explanation
A Trojan is a type of malicious network software that is designed to deceive users by disguising itself as a legitimate program. Once installed, it can steal sensitive data from the computer without the user's knowledge. Unlike worms, which are self-replicating and spread without user interaction, Trojans rely on social engineering tactics to trick users into downloading and executing them. Firewalls are security measures that protect against unauthorized access, while FTP clients are software used to transfer files between a computer and a server.
11.
What is the name of the software used to monitor network data?
Correct Answer
B. Sniffer
Explanation
A sniffer is a software used to monitor network data. It captures and analyzes network traffic, allowing users to view and analyze packets of data being transmitted over a network. With a sniffer, network administrators can troubleshoot network issues, detect network intrusions, and monitor network performance. It is a valuable tool for network monitoring and security purposes.
12.
What is the word "modem" short for?
Correct Answer
C. Modulator-Demodulator
Explanation
A modem is a device that modulates and demodulates signals, allowing for the transmission of data over a communication channel. The word "modem" is short for "modulator-demodulator", which accurately describes its function. Modulation refers to the process of converting digital data into analog signals for transmission, while demodulation is the reverse process of converting analog signals back into digital data. Therefore, the correct answer is Modulator-Demodulator.
13.
What is the maximum data rate supported by Gigabit Ethernet?
Correct Answer
A. 1000 Mbps
Explanation
Gigabit Ethernet supports a maximum data rate of 1000 Mbps. This is because "Gigabit" refers to a data transfer rate of 1 billion bits per second, which is equivalent to 1000 Mbps.
14.
What are two modes of data transfer supported by FTP?
Correct Answer
B. ASCII & Binary
Explanation
FTP supports two modes of data transfer: ASCII and Binary. ASCII mode is used for transferring text files, while Binary mode is used for transferring non-text files such as images, executables, and compressed files. In ASCII mode, the data is transferred as plain text, and any line breaks or special characters are converted to the appropriate format. In Binary mode, the data is transferred as-is without any modifications, preserving the integrity of the file. These two modes allow for efficient and accurate transfer of different types of files over FTP.
15.
What is the default FTP port number?
Correct Answer
C. 21
Explanation
The default FTP port number is 21. FTP (File Transfer Protocol) is a standard network protocol used for transferring files from one host to another over a TCP-based network. The default port number for FTP is 21, which is used for establishing the control connection between the client and server. This port is reserved specifically for FTP communication and is commonly used by FTP clients and servers to establish a connection and transfer files.