1.
What network protocol is used to access information in the Windows directory service?
Correct Answer
D. LDAP
Explanation
LDAP (Lightweight Directory Access Protocol) is the correct answer because it is a network protocol specifically designed for accessing and managing information within a directory service, such as the Windows directory service. LDAP allows clients to query and modify directory entries, making it the appropriate protocol for accessing information in the Windows directory service. IMAP, NMAP, and ODBC are not network protocols used for directory service access, making them incorrect choices.
2.
What is the amount of time that a DHCP server loans an IP address to a client?
Correct Answer
B. DHCP Lease
Explanation
A DHCP server loans an IP address to a client for a specific period of time, known as the DHCP lease. During this lease period, the client is allowed to use the assigned IP address. Once the lease expires, the client must renew the lease if it wants to continue using the same IP address. The DHCP lease duration can be configured by the network administrator and can vary depending on the network requirements.
3.
Which type of protocol is used to share routes between autonomous systems?
Correct Answer
A. Exterior Gateway Protocol (EGP)
Explanation
Exterior Gateway Protocol (EGP) is the correct answer because it is the protocol used to share routes between autonomous systems. EGP is an inter-domain routing protocol that allows different autonomous systems to exchange routing information and determine the best path for data transmission between them. It is specifically designed for communication between routers in different autonomous systems, making it the appropriate choice for sharing routes between them. Interior Gateway Routing Protocol (IGRP) and Routing Information Protocol (RIP) are examples of interior gateway protocols used within a single autonomous system, while Interior Gateway Protocol (IGP) is a general term that encompasses all interior routing protocols.
4.
How is enhanced category 5 cabling denoted in shorthand?
Correct Answer
B. CAT5E
Explanation
Enhanced category 5 cabling is denoted in shorthand as CAT5E. This is because CAT5E stands for Category 5 Enhanced, indicating that it is an improved version of the standard CAT5 cable. The "E" signifies the enhanced capabilities and performance of the cable, which includes higher data transfer speeds and reduced crosstalk.
5.
What command is issued when beginning an ESMTP connection with a mail server?
Correct Answer
C. Ehlo
Explanation
The correct answer is "Ehlo". When beginning an ESMTP (Extended Simple Mail Transfer Protocol) connection with a mail server, the "Ehlo" command is issued. This command is used to identify the client to the server and to initiate the ESMTP session. It allows the client to request extended features and capabilities from the server, such as authentication methods and supported extensions.
6.
What is another term for "Ethernet Address"?
Correct Answer
A. MAC Address
Explanation
The correct answer is MAC Address. This term refers to the unique identifier assigned to a network interface card (NIC) by the manufacturer. It is used to identify devices on a local network and is essential for communication between devices. The MAC address is a 48-bit hexadecimal number, typically written in the format of six pairs of two-digit numbers separated by colons or hyphens.
7.
Which IEEE standard defines Fast Ethernet?
Correct Answer
C. 802.3u
Explanation
IEEE standard 802.3u defines Fast Ethernet. This standard specifies the physical layer and the media access control (MAC) layer of Ethernet networks operating at a speed of 100 Mbps. Fast Ethernet is an improvement over the original Ethernet standard, which operated at 10 Mbps. The 802.3u standard allows for faster data transmission rates and is widely used in local area networks (LANs) for high-speed data transfer.
8.
Which fiber optic cable connector type conforms to EIA/TIA standards?
Correct Answer
A. ST
Explanation
The ST fiber optic cable connector type conforms to EIA/TIA standards.
9.
Which governing body has defined and standardized Fibre Channel?
Correct Answer
D. ANSI
Explanation
ANSI, or the American National Standards Institute, is the governing body that has defined and standardized Fibre Channel. ANSI is responsible for developing and maintaining standards across various industries, including technology. In the case of Fibre Channel, ANSI has established the specifications and protocols that ensure compatibility and interoperability among different devices and systems using this high-speed data transfer technology.
10.
What type of IPv4 packet is sent to the source if a destination is overly congested?
Correct Answer
B. Source Quench
Explanation
When a destination is overly congested, a Source Quench packet is sent to the source. This packet is a type of ICMP (Internet Control Message Protocol) packet that informs the source to reduce the rate at which it is sending packets. By receiving this packet, the source can slow down its transmission and help alleviate the congestion in the network.
11.
What is the mechanism that controls the rate of received data from a modem?
Correct Answer
B. Flow Control
Explanation
Flow control is the mechanism that controls the rate of received data from a modem. It ensures that the sender and receiver are synchronized in terms of data transmission. Flow control techniques like sliding window and stop-and-wait prevent data overflow and ensure that the receiver can handle the incoming data at a manageable rate. By regulating the flow of data, flow control helps to maintain reliable and efficient communication between the modem and the receiving device.
12.
"H channel" is associated with what networking technology?
Correct Answer
C. BRI-ISDN
Explanation
The "H channel" is associated with BRI-ISDN (Basic Rate Interface Integrated Services Digital Network). BRI-ISDN is a digital telecommunications technology that allows for the transmission of voice and data over existing telephone lines. It consists of two B (bearer) channels and one D (delta) channel. The B channels carry voice or data, while the D channel is used for signaling and control information. The H channel, also known as the hybrid channel, is used for data transmission at a higher rate than the B channels, making it suitable for applications that require faster data transfer speeds.
13.
What flag is set in the last packet of a three-way TCP handshake?
Correct Answer
B. ACK
Explanation
In the last packet of a three-way TCP handshake, the flag that is set is the ACK (Acknowledgement) flag. This flag indicates that the receiving party has successfully received the initial SYN (Synchronize) flag and is ready to establish a connection. The ACK flag acknowledges the receipt of the SYN flag and allows the communication to proceed between the two parties.
14.
What domain is used by DNS servers to resolve IP addresses to host names?
Correct Answer
B. In-addr.arpa
Explanation
DNS servers use the domain "In-addr.arpa" to resolve IP addresses to host names. This domain is used for reverse DNS lookups, where the IP address is used to find the corresponding host name. Reverse DNS lookups are commonly used for security purposes, such as identifying the source of network traffic or verifying the authenticity of an email sender.
15.
What is a logical path through a network that is established automatically as needed?
Correct Answer
B. Switched Virtual Circuit (SVC)
Explanation
A Switched Virtual Circuit (SVC) is a logical path through a network that is established automatically as needed. Unlike Permanent Virtual Circuits (PVCs) which are preconfigured and always active, SVCs are set up on-demand and torn down when no longer needed. This dynamic nature of SVCs allows for efficient utilization of network resources as the circuits are only established when there is a need for communication between two endpoints. Therefore, SVC is the correct answer for the given question.
16.
What are the two modes of IPSec operation?
Correct Answer
D. Tunnel And Transport
Explanation
IPSec (Internet Protocol Security) operates in two modes: Tunnel mode and Transport mode. Tunnel mode encapsulates the entire IP packet within a new IP packet, adding an extra layer of security. It is commonly used for site-to-site VPN connections. Transport mode, on the other hand, only encrypts the data portion of the IP packet, leaving the original IP header intact. It is typically used for host-to-host or end-to-end communication within a network. Therefore, the correct answer is "Tunnel And Transport".
17.
A collection of protocols that work together as a group is called what?
Correct Answer
C. Protocol Suite
Explanation
A collection of protocols that work together as a group is called a protocol suite. This term refers to a set of protocols that are designed to work together to provide a complete networking solution. Each protocol in the suite performs a specific function, and together they enable communication between devices on a network. Examples of protocol suites include TCP/IP, which is the suite of protocols used on the internet, and OSI (Open Systems Interconnection), which is a conceptual framework for understanding and describing network protocols.
18.
SMTP, HTTP and FTP operate at which layer of the OSI reference model?
Correct Answer
D. Application
Explanation
SMTP, HTTP, and FTP are all application layer protocols. The application layer is the top layer of the OSI reference model and is responsible for providing network services to user applications. These protocols are specifically designed to support email transfer (SMTP), web browsing (HTTP), and file transfer (FTP) respectively. They all operate at the application layer as they interact directly with user applications and provide services such as data formatting, encryption, and authentication.
19.
What protocol can resolve an IP address if given a MAC address?
Correct Answer
A. RARP
Explanation
RARP (Reverse Address Resolution Protocol) is the correct answer because it is a protocol that can resolve an IP address if given a MAC address. RARP is used to obtain an IP address when the MAC address is known, which is the reverse process of what is typically done with ARP (Address Resolution Protocol). RARP allows a device to send a broadcast request with its MAC address, and a RARP server responds with the corresponding IP address.
20.
What is a more secure option for securing wireless networks than WEP?
Correct Answer
C. WPA
Explanation
WPA (Wi-Fi Protected Access) is a more secure option for securing wireless networks than WEP (Wired Equivalent Privacy). WEP is an older encryption standard that has several vulnerabilities, making it easier for hackers to crack the encryption and gain unauthorized access to the network. WPA, on the other hand, provides stronger encryption and security features, making it more difficult for attackers to compromise the network. Therefore, WPA is a recommended option for enhancing the security of wireless networks.