1.
How does ARP protocol convert IP address to MAC address?
Correct Answer
D. Using Lookup Table
Explanation
The ARP protocol converts IP address to MAC address by using a lookup table. This table contains mappings between IP addresses and corresponding MAC addresses. When a device needs to send data to another device on the same network, it checks the lookup table to find the MAC address associated with the destination IP address. This allows the device to correctly address the data packet and ensure it is delivered to the intended recipient.
2.
What is "tunneling" used for in private networks?
Correct Answer
A. Port Forwarding
Explanation
Tunneling is used for port forwarding in private networks. This technique allows the transmission of data packets from one network protocol to another, enabling communication between different network segments. By forwarding specific ports, network administrators can redirect incoming traffic to a specific destination within the private network, enhancing security and facilitating access to network resources.
3.
What measurement shows how much traffic a particular query server is handling at a given time?
Correct Answer
A. QPS
Explanation
QPS stands for Queries Per Second, which is a measurement that shows how much traffic a particular query server is handling at a given time. It indicates the number of queries or requests that the server is processing every second. A higher QPS value indicates a heavier workload on the server, while a lower QPS value suggests a lighter workload. Monitoring QPS is crucial for optimizing server performance and ensuring that it can handle the incoming traffic effectively.
4.
What technology does the acronym "NAC" refer to?
Correct Answer
B. Network Access Control
Explanation
The acronym "NAC" refers to Network Access Control. This technology is used to manage and control access to a network. It ensures that only authorized devices and users are granted access to the network, while preventing unauthorized access. Network Access Control helps to enhance network security by enforcing policies and regulations, monitoring network activity, and detecting and mitigating potential threats.
5.
Which of the following is a requirement in an OSPF network?
Correct Answer
B. Area 0
Explanation
In an OSPF network, one of the requirements is the presence of Area 0. Area 0, also known as the backbone area, is a mandatory component of OSPF. It serves as the central hub for all other areas in the network. All other areas must connect to Area 0 in order to exchange routing information. Failure to have Area 0 in the network can result in routing issues and the inability to establish connectivity between different areas.
6.
What was the first LAN technology, introduced by Datapoint Corporation in 1968?
Correct Answer
B. ARCNET
Explanation
ARCNET was the first LAN technology introduced by Datapoint Corporation in 1968. ARCNET stands for Attached Resource Computer Network and it was a local area network technology that allowed computers to communicate and share resources within a limited area. It used a token-passing mechanism to control access to the network and had a data transfer rate of 2.5 Mbps. ARCNET was widely used in the 1980s and 1990s, particularly in industrial and manufacturing environments. However, it has been largely replaced by Ethernet as the dominant LAN technology.
7.
In 1995, Bay Networks merged with what company?
Correct Answer
B. NORTEL
Explanation
Bay Networks merged with NORTEL in 1995.
8.
What does TFTP stand for?
Correct Answer
C. Trivial File Transfer Protocol
Explanation
TFTP stands for Trivial File Transfer Protocol. It is a simple file transfer protocol used to transfer files between devices on a network. TFTP is often used for transferring firmware updates or configuration files to network devices such as routers or switches. It is called "trivial" because it lacks some of the more advanced features of other file transfer protocols, such as FTP.
9.
Which organization designed the "next generation" IPv6?
Correct Answer
B. IETF
Explanation
The correct answer is IETF. The Internet Engineering Task Force (IETF) is responsible for designing and developing the "next generation" Internet Protocol version 6 (IPv6). IPv6 was created to address the limitations of the previous version, IPv4, and to provide a larger address space to accommodate the growing number of devices connected to the internet. The IETF is a global organization that consists of volunteers who collaborate to develop and maintain internet standards.
10.
What is the name given to a document that describes Internet and TCP/IP standards?
Correct Answer
C. Request For Comments
Explanation
A document that describes Internet and TCP/IP standards is called "Request For Comments". This document is used to propose new standards, protocols, and technologies for the Internet. It allows experts and stakeholders to review and provide feedback on these proposals, leading to the development and implementation of new standards. The term "Request For Comments" is derived from the initial practice of distributing these documents among researchers and engineers who were invited to comment and provide suggestions for improvement.
11.
What network company was founded in 1984 by a group of Stanford computer scientists?
Correct Answer
C. Cisco Systems
Explanation
Cisco Systems was founded in 1984 by a group of Stanford computer scientists. They initially started the company with the goal of connecting computers through the use of routers and switches. Over the years, Cisco Systems has become a leading networking company, providing a wide range of networking solutions and services to businesses and organizations worldwide. Their innovative technologies and products have made them a dominant player in the networking industry.
12.
For which of these is "mbps" an acronym?
Correct Answer
A. Megabits Per Second
Explanation
"Mbps" is an acronym for "Megabits Per Second". The term "Mbps" is commonly used to measure the speed of data transfer in computer networks and internet connections. It represents the number of megabits (a unit of digital information) that can be transmitted per second. This acronym is widely recognized and used in the field of telecommunications and networking.
13.
What is the name given to a large internetwork under a single administrative control?
Correct Answer
D. Autonomous System
Explanation
An Autonomous System refers to a large internetwork that is managed and controlled by a single entity or organization. It is typically used in the context of the Internet, where it represents a collection of connected networks that operate under a common routing policy. Autonomous Systems are assigned unique identification numbers, known as Autonomous System Numbers (ASNs), which are used for routing and communication purposes. This term is widely used in the field of networking to describe a network infrastructure that is independently operated and managed.
14.
What was the original Ethernet network topology?
Correct Answer
D. Bus
Explanation
The original Ethernet network topology was a Bus. In a bus topology, all devices are connected to a single cable, known as the backbone. Data travels along the backbone and is received by all devices on the network. This topology is relatively simple and easy to set up, but it can be prone to collisions and network congestion.
15.
What are routers that border areas within an OSPF autonomous system called?
Correct Answer
B. Area Border Routers
Explanation
Area Border Routers are routers that connect different OSPF areas within an autonomous system. They serve as a gateway between different areas, exchanging routing information and maintaining a database of the entire OSPF domain. Area Border Routers ensure efficient communication between areas by summarizing and distributing routing information. They play a crucial role in OSPF network design and help in reducing network traffic and improving scalability.
16.
RIP is characterized as what type of routing protocol?
Correct Answer
C. Distance Vector
Explanation
RIP (Routing Information Protocol) is characterized as a distance vector routing protocol. Distance vector protocols determine the best path for data packets by considering the distance or number of hops to the destination. RIP uses the hop count as the metric to determine the best route. It periodically exchanges routing information with neighboring routers, allowing them to update their routing tables. RIP is a simple and easy-to-configure protocol, but it has limitations such as slow convergence and limited scalability.
17.
OSPF is characterized as what type of routing protocol?
Correct Answer
A. Link State
Explanation
OSPF is characterized as a link state routing protocol. Link state protocols use a database of network topology information to determine the best path for routing packets. OSPF routers exchange information about their directly connected links, including their state and cost, to build a complete map of the network. This information is then used to calculate the shortest path to reach a destination. Link state protocols provide faster convergence, better scalability, and more accurate routing decisions compared to distance vector or path vector protocols. Hybrid routing protocols combine characteristics of both link state and distance vector protocols.
18.
What is the IETF standard tunneling protcol for encapsulating PPP frames in TCP/IP?
Correct Answer
A. L2TP
Explanation
L2TP (Layer 2 Tunneling Protocol) is the IETF standard tunneling protocol used for encapsulating PPP (Point-to-Point Protocol) frames in TCP/IP. L2TP provides a secure and reliable method for transmitting PPP frames over an IP network, allowing for the creation of virtual private networks (VPNs) and remote access connections. It combines the best features of PPTP (Point-to-Point Tunneling Protocol) and L2F (Layer 2 Forwarding) to ensure efficient and secure data transmission. L2TP is widely used in various network applications, including VPN services and remote access solutions.
19.
What ATM mode allows LAN traffic to be carried over an ATM network?
Correct Answer
B. LANE
Explanation
LANE (LAN Emulation) is the ATM mode that allows LAN traffic to be carried over an ATM network. LANE provides a way for Ethernet or Token Ring LANs to operate over an ATM network without requiring any changes to the existing LAN protocols. It emulates a LAN environment over an ATM network, allowing LAN devices to communicate with each other as if they were connected directly to a traditional LAN. LANE uses ATM cells to transport LAN frames, providing a seamless integration between the LAN and ATM networks.
20.
Of which naming convention is "\\%Servername%\%sharename%" an example?
Correct Answer
A. Universal
Explanation
The naming convention "\\%Servername%\%sharename%" is an example of the Universal naming convention. This convention is commonly used in network environments to access shared resources such as files and folders. The "\\%Servername%" part represents the server name or IP address, while the "%sharename%" part represents the name of the shared resource on that server. The Universal naming convention allows for accessing shared resources across different platforms and operating systems.