1.
What is the minimum and maximum size of the ethernet frame?
Correct Answer
A. 72 bytes, 1526 bytes
Explanation
The minimum and maximum size of an ethernet frame is 72 bytes and 1526 bytes respectively. The ethernet frame is a data packet that is transmitted over an Ethernet network. The minimum size of 72 bytes ensures that the frame contains the necessary headers and control information. The maximum size of 1526 bytes is determined by the maximum payload size allowed in an Ethernet frame, which is 1500 bytes, along with the additional headers and control information.
2.
IEEE is the organization that sets up the standards for electronic items.
Correct Answer
A. True
Explanation
IEEE, which stands for the Institute of Electrical and Electronics Engineers, is indeed the organization responsible for setting up standards for electronic items. They develop and publish technical standards that are widely used in various industries, including electronics. These standards ensure interoperability, safety, and reliability of electronic devices, allowing different manufacturers to produce compatible and high-quality products. Therefore, the statement "IEEE is the organization that sets up the standards for electronic items" is true.
3.
What is 802?
Correct Answer
C. LAN Network Committee
Explanation
802 refers to the set of standards developed by the LAN (Local Area Network) Network Committee. These standards define the specifications for Ethernet and other networking technologies used in local area networks. Therefore, the correct answer is LAN Network Committee.
4.
CSMA/CD does not allow bandwidth sharing.
Correct Answer
B. False
Explanation
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) is a protocol used in Ethernet networks to manage access to the shared medium. It allows multiple devices to share the available bandwidth by using a collision detection mechanism. When two devices transmit data simultaneously and a collision occurs, CSMA/CD detects the collision and initiates a backoff algorithm to retransmit the data. Therefore, CSMA/CD actually enables bandwidth sharing among devices in an Ethernet network. Hence, the given statement is false.
5.
Network interface card digital operations...
Correct Answer
B. Transmits and receives Ethernet frames.
Explanation
A network interface card (NIC) is responsible for transmitting and receiving Ethernet frames. It acts as a communication link between a computer and a network, allowing the computer to send and receive data over the network. The NIC converts the digital data from the computer into a format that can be transmitted over the network, and it also receives incoming data from the network and converts it into a format that the computer can understand. Therefore, the NIC's main function is to transmit and receive Ethernet frames.
6.
Based on 10-mbps Ethernet, which of the following is not one of the first three widely used ethernet technologies:
Correct Answer
C. 10base7
Explanation
10base7 is not one of the first three widely used Ethernet technologies. The first three widely used Ethernet technologies are 10base5, 10base2, and 10baseT. 10base5 uses thick coaxial cable, 10base2 uses thin coaxial cable, and 10baseT uses twisted pair cable. 10base7 does not exist as a widely used Ethernet technology.
7.
What type of coax does 10base5 use?
Correct Answer
A. Thick wire
Explanation
10base5, also known as Thick Ethernet, uses thick wire coaxial cable. This type of coaxial cable has a larger diameter and is more robust compared to thin wire coaxial cable. Thick wire coaxial cable is capable of transmitting data over longer distances and at higher speeds, making it suitable for use in Ethernet networks. It is important to note that while 10base5 originally used thick wire coax, modern Ethernet networks typically use other types of cables, such as Cat 5e or Cat 6 UTP, for improved performance and compatibility with newer technologies.
8.
What 10-mbps ethernet use fiber?
Correct Answer
10baseF
Explanation
10baseF refers to the 10 Mbps Ethernet standard that uses fiber optic cables for data transmission. Fiber optic cables offer high bandwidth and long-distance capabilities, making them suitable for use in scenarios where copper cables may not be feasible. By using fiber optic cables, 10baseF can achieve faster and more reliable data transmission compared to other Ethernet standards that use copper cables.
9.
With regards to 100-mbps ethernet, it is advantageous to have a smaller network diameter than 10-mbps ethernet.
Correct Answer
B. False
Explanation
Having a smaller network diameter is not advantageous for 100-mbps ethernet compared to 10-mbps ethernet. In fact, a larger network diameter is more beneficial for higher-speed networks like 100-mbps ethernet. A larger network diameter allows for more devices to be connected to the network without causing congestion or a decrease in performance. With a smaller network diameter, there is a higher chance of network congestion and slower data transfer speeds. Therefore, the statement is false.
10.
Someone would use 1000-mpbs ethernet because their bandwidth demand excedes 100 mbps.
Correct Answer
A. True
Explanation
The explanation for the given correct answer is that someone would use 1000-mbps ethernet because their bandwidth demand exceeds 100 mbps. This means that their network requires a higher speed connection in order to handle the amount of data being transmitted. A 1000-mbps ethernet connection, also known as Gigabit Ethernet, is capable of providing a much faster and more efficient network connection compared to a 100-mbps ethernet connection. Therefore, if someone's bandwidth demand exceeds 100 mbps, they would need to use a 1000-mbps ethernet connection to meet their requirements.
11.
What is frame bursting?
Correct Answer
D. Sending multiple frames into a burst of transmission.
Explanation
Frame bursting is a technique used in networking where multiple frames are sent together in a burst of transmission. This helps to increase network efficiency and speed by reducing the overhead associated with transmitting individual frames. By sending multiple frames at once, the network can make better use of available bandwidth and improve overall throughput. This technique is commonly used in wireless networks to optimize data transmission and improve network performance.
12.
Wireless eithernet is ethernet over ____________ (RF) or ___________ (IR).
Correct Answer
radio frequency, infrared
Explanation
The correct answer is radio frequency, infrared. Wireless Ethernet refers to the transmission of Ethernet signals using radio frequency (RF) or infrared (IR) technology. RF technology uses radio waves to transmit data wirelessly, while IR technology uses infrared light waves. Both RF and IR enable wireless communication, allowing devices to connect to a network without the need for physical Ethernet cables.
13.
What does CSMA/CA stand for?
Correct Answer
Carrier Sense Multiple Access/Collision Avoidance
Carrier Sense Multiple Access/ Collision Avoidance
Explanation
CSMA/CA stands for Carrier Sense Multiple Access/Collision Avoidance. This protocol is used in wireless networks to avoid collisions between multiple devices trying to access the same channel simultaneously. The "Carrier Sense" part refers to the devices sensing the channel to check if it is busy before transmitting data. The "Multiple Access" part means that multiple devices can access the channel. The "Collision Avoidance" part refers to the mechanism used to avoid collisions by using random backoff times before retransmitting data.
14.
Which of the following is NOT a way that CSMA/CA differs from CSMA/CD?
Correct Answer
C. Avoid collisions by sending faster signals
Explanation
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) and CSMA/CD (Carrier Sense Multiple Access with Collision Detection) are both protocols used in Ethernet networks to avoid collisions. One way in which CSMA/CA differs from CSMA/CD is that in CSMA/CA, the wireless transceiver cannot listen for other transmissions while transmitting. This is because in wireless networks, multiple devices may be sharing the same medium (airwaves) and it is not possible to simultaneously transmit and receive. Therefore, CSMA/CA uses a mechanism where stations attempt to avoid collisions by using random backoff delays, rather than listening for other transmissions. The option "Avoid collisions by sending faster signals" is incorrect because it does not accurately describe the difference between CSMA/CA and CSMA/CD.
15.
Signals propagate through objects (walls) . Name what type of signal it is:
Correct Answer
A. RF Based
Explanation
RF (Radio Frequency) signals are able to propagate through objects such as walls. This type of signal is commonly used in wireless communication systems, including Wi-Fi, Bluetooth, and cellular networks. RF signals have a longer wavelength compared to IR (Infrared) signals, allowing them to penetrate obstacles like walls more effectively. IR signals, on the other hand, are typically used for short-range communication and require line-of-sight between the transmitter and receiver. Therefore, the correct answer is RF Based.
16.
Uses spread spectrum technologies frequency hopping and direct sequence
Correct Answer
B. RF - Based
Explanation
The correct answer is RF - Based. This means that the technology being referred to uses radio frequency (RF) for its operation. RF-based systems are commonly used in various wireless communication applications, such as Wi-Fi, Bluetooth, and cellular networks. They allow for the transmission of data over long distances and through obstacles, making them suitable for a wide range of devices and environments.
17.
Bounces signals off walls, ceilings, floors
Correct Answer
B. Diffused IR
Explanation
Diffused IR refers to the use of infrared signals that are scattered or spread out in various directions. This allows the signals to bounce off walls, ceilings, and floors, providing a wider coverage area for communication. In contrast, point-to-point IR involves a direct line of sight between the transmitter and receiver, while diffused IR allows for more flexibility in signal transmission and reception. Therefore, diffused IR is the correct answer as it describes the ability to bounce signals off surfaces.
18.
Point-to-point
Correct Answer
A. IR Based
Explanation
The correct answer is "IR Based". This suggests that the method being referred to is based on Infrared (IR) technology. This technology involves the use of infrared signals to transmit data or control devices wirelessly. It is commonly used in remote controls for televisions, DVD players, and other electronic devices.
19.
IEEE 802.5 specification is the _____________ most popular networking technology.
Correct Answer
second
Explanation
The given correct answer for this question is "second." This implies that the IEEE 802.5 specification is the second most popular networking technology. However, without further context or options provided, it is difficult to determine the absolute popularity or ranking of the IEEE 802.5 specification among other networking technologies.
20.
Which of the following are considered advantages of token-ring?
Correct Answer(s)
A. No collisions
B. Performs better than Ethernet under heavy traffic loads
Explanation
Token-ring networks have the advantage of no collisions because only one device can transmit data at a time, as it requires a token to do so. This ensures that there is no overlapping of data transmission, reducing the chances of collisions. Additionally, token-ring networks are known to perform better than Ethernet under heavy traffic loads. This is because the token passing mechanism allows for efficient utilization of network bandwidth, preventing congestion and ensuring smoother data transmission. However, the statement regarding the maximum number of nodes available compared to Ethernet is not mentioned in the given options.
21.
What does MAU stand for?
Correct Answer
C. Multistation access unit
Explanation
MAU stands for Multistation access unit. This is a device used in computer networks to connect multiple stations or devices to a local area network (LAN). It serves as a central hub or switch that allows multiple devices to access the network simultaneously. The other options, multiple access unit and multiple available units, do not accurately represent the meaning of MAU in the context of computer networking. The last option, "It's an abbreviation for Maui, Hawaii," is not a valid explanation as it does not relate to the topic of computer networking.
22.
MAU connects stations.
Correct Answer
A. True
Explanation
The statement "MAU connects stations" is true. MAU stands for Media Access Unit, which is a device used in computer networks to connect multiple stations or nodes together. It acts as a central hub or switch that allows communication between different devices connected to it. Therefore, the statement is correct as MAU plays a crucial role in connecting stations in a network.
23.
Typical wiring for MAU are STP cables but UTP and Fiber obtic cables are also supported.
Correct Answer
A. True
Explanation
The statement suggests that the typical wiring for MAU (Media Attachment Unit) is done using STP (Shielded Twisted Pair) cables. However, it also acknowledges that UTP (Unshielded Twisted Pair) and Fiber Optic cables are also supported options for wiring MAUs. Therefore, the statement is true as it confirms that STP cables are the typical choice for MAU wiring, but alternative options such as UTP and Fiber Optic cables can also be used.
24.
The number of MAUs has no affects on maximum distance between MAUs.
Correct Answer
B. False
Explanation
The given statement is false. The number of Monthly Active Users (MAUs) can indeed have an effect on the maximum distance between MAUs. A higher number of MAUs may result in a larger geographical spread, leading to a greater distance between individual MAUs. Conversely, a lower number of MAUs may indicate a more concentrated user base, resulting in a smaller maximum distance between MAUs. Therefore, the number of MAUs can impact the maximum distance between them.
25.
FDDI (fiber-distributed data interface) is
Correct Answer(s)
A. Self-healing baseband network technology
B. Popular in LAN
C. Similar to token-ring
Explanation
FDDI (fiber-distributed data interface) is a self-healing baseband network technology that is popular in LANs and is similar to token-ring. This means that FDDI is a type of network technology that uses fiber optics to transmit data, and it has the ability to automatically detect and repair faults in the network. It is commonly used in local area networks (LANs) and operates in a similar manner to token-ring networks, where data is passed around the network in a sequential manner using a token.
26.
FDDI-II (or hybrid ring control) supports voice, video, and other multimedia applications.
Correct Answer
A. True
Explanation
FDDI-II, also known as hybrid ring control, is a networking standard that is capable of supporting voice, video, and other multimedia applications. This means that it can handle the transmission of data for these types of applications effectively. Therefore, the statement that FDDI-II supports voice, video, and other multimedia applications is true.
27.
Bluetooth networks use a topology called piconet
Correct Answer
A. True
Explanation
Bluetooth networks use a topology called piconet. In a piconet, one device acts as the master and other devices act as slaves. The master device controls the communication and synchronization between the devices in the network. This topology allows for efficient and flexible connections between devices, making it suitable for applications such as wireless headphones, speakers, and other short-range wireless communication devices. Therefore, the statement "Bluetooth networks use a topology called piconet" is true.
28.
Using piconet topology, what is the max amount of bluetooth enabled devices that can communicate?
Correct Answer
B. 8
Explanation
In a piconet topology, the maximum number of Bluetooth enabled devices that can communicate is 8. This is because a piconet is formed by one master device and up to seven slave devices. The master device controls the communication and the slave devices can only communicate with the master device. Therefore, the maximum number of devices that can be part of a piconet is 8.
29.
Using bluetooth, multiple masters can exist at one time.
Correct Answer
B. False
Explanation
Bluetooth technology operates on a master-slave relationship, where one device acts as the master and the other devices act as slaves. In a Bluetooth network, only one device can be the master, and multiple slaves can connect to it. Therefore, the statement that multiple masters can exist at one time using Bluetooth is false.
30.
Bluetooth is vulnerable to:
Correct Answer(s)
A. Eavesdropping
B. Denial of service attacks
C. Bluejacking
Explanation
Bluetooth is vulnerable to eavesdropping, denial of service attacks, and bluejacking. Eavesdropping refers to the unauthorized interception of Bluetooth signals, allowing an attacker to listen in on conversations or access sensitive information. Denial of service attacks involve overwhelming a Bluetooth device or network with excessive requests, causing it to become unresponsive or crash. Bluejacking is a type of attack where unsolicited messages or spam are sent to Bluetooth-enabled devices, often for the purpose of annoyance or harassment. These vulnerabilities highlight the importance of implementing security measures and keeping Bluetooth devices updated to protect against potential threats.
31.
Bluetooth is supported by all major operating systems and is controlled by the Bluetooth Special Interest Group.
Correct Answer
A. True
Explanation
Bluetooth is indeed supported by all major operating systems, including Windows, macOS, Linux, Android, and iOS. It is a wireless communication technology that allows devices to connect and exchange data over short distances. The Bluetooth Special Interest Group (SIG) is the organization responsible for developing and maintaining the Bluetooth standard. They ensure compatibility and interoperability between different Bluetooth devices, making sure that they work seamlessly across various platforms and operating systems. Therefore, the statement is true.
32.
Select the layers of a TCP/IP network model.
Correct Answer(s)
A. Application
D. Internet
E. Network interface
G. pHysical
H. Transport
Explanation
The TCP/IP network model consists of multiple layers that are responsible for different functions in the network. The application layer provides services to the user and is responsible for protocols such as HTTP, FTP, and SMTP. The internet layer handles the routing of data packets across different networks. The network interface layer deals with the physical connection between a device and the network. The physical layer is responsible for the actual transmission of data over the physical medium. The transport layer ensures the reliable delivery of data between hosts. Therefore, the correct answer includes the layers: application, internet, network interface, physical, and transport.
33.
What does TCP/IP stand for?
Correct Answer(s)
Transmission Control Protocol/Internet Protocol
Explanation
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP is responsible for breaking data into packets, ensuring their reliable delivery, and reassembling them at the destination. IP is responsible for addressing and routing packets across networks. Together, TCP/IP provides a standardized set of rules and protocols for data transmission over networks, enabling devices to communicate with each other on the internet.
34.
TCP/IP is the most commonly used network protocol suite today.
Correct Answer
A. True
Explanation
TCP/IP is the most commonly used network protocol suite today because it provides a reliable and efficient way for devices to communicate over a network. It is widely adopted and supported by various operating systems and network devices. TCP/IP offers a standardized set of protocols that enable data transmission, routing, and addressing on the internet. Its versatility and compatibility have made it the de facto standard for networking, making the statement "True".
35.
TCP/IP has a ________ protocol.
Correct Answer
C. Open
Explanation
TCP/IP is a networking protocol suite that is widely used for communication over the internet. It is an open protocol because it is publicly available and can be implemented by anyone. Being open means that it is not proprietary or restricted to a specific vendor or organization. This allows for interoperability and the development of compatible networking devices and software by different manufacturers.
36.
Internet Protocol is responsible for the _____________ addressing of each packet created by the transport layer.
Correct Answer
logical
Explanation
Internet Protocol is responsible for the logical addressing of each packet created by the transport layer. This means that IP assigns a unique logical address to each packet so that it can be properly routed across the network. The logical address is used to identify the source and destination of the packet, allowing it to be delivered to the correct destination.
37.
IP Datagram transmission may take different routes.
Correct Answer
A. True
Explanation
IP Datagram transmission may take different routes because of the nature of the Internet. When an IP packet is sent from one device to another, it can traverse multiple networks, routers, and links. Each router along the path determines the best route for forwarding the packet based on its own routing table and network conditions. This dynamic routing allows for load balancing, fault tolerance, and efficient use of network resources. As a result, the same IP packet can take different routes to reach its destination, making the statement true.
38.
IP is very reliable and guarantees data delivery.
Correct Answer
B. False
Explanation
The statement that "IP is very reliable and guarantees data delivery" is false. While IP (Internet Protocol) is a fundamental protocol used for transmitting data over the internet, it does not guarantee reliable delivery. IP is a best-effort delivery protocol, which means that it does not ensure that data packets will reach their destination reliably or in a specific order. It is up to higher-level protocols or applications to implement mechanisms for reliable data delivery if needed.
39.
With regards to Basic IP datagram transmission, the destination computer may receive packets out of order.
Correct Answer
A. True
Explanation
In Basic IP datagram transmission, packets may be routed through different paths and may arrive at the destination computer in a different order than they were sent. This can happen due to network congestion, routing changes, or other factors. Therefore, it is possible for the destination computer to receive packets out of order.
40.
An IP address is composed of two parts: the _______ ID and the _________ ID. (seperate your answers with a comma (ex: apple, banana))
Correct Answer
network, host
Explanation
An IP address consists of two parts: the network ID and the host ID. The network ID identifies the network to which the device belongs, while the host ID identifies the specific device within that network. These two components work together to route data packets across the internet.
41.
The network ID represents:
Correct Answer
B. The network on which the computer is located
Explanation
The network ID represents the network on which the computer is located. This ID is used to identify and differentiate different networks within a larger network infrastructure. It helps in routing data packets to the correct network and ensures that communication between devices within the same network is efficient.
42.
The host ID represents
Correct Answer
A. The individual computer on a network
Explanation
The host ID represents the individual computer on a network. It is a unique identifier assigned to each device connected to a network. This ID helps in distinguishing one computer from another on the same network. It is used for communication and routing purposes, allowing data to be sent to the correct destination. The host ID is different from the network ID, which represents the network on which the computer is located. The MAC address, on the other hand, is a hardware identifier assigned to the network interface card of a device, but it is not the same as the host ID.
43.
An IP address is unique.
Correct Answer
A. True
Explanation
An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. This address serves as a unique identifier for the device, allowing it to send and receive data across the network. Each device on a network must have a unique IP address to ensure proper communication and routing of data. Therefore, the statement "An IP address is unique" is true.
44.
An IP address has 4 numbers, called octets, that are seperated by comma's.
Correct Answer
B. False
Explanation
They are separated by periods.
45.
Based on the 4 numbers in an IP address, which represent 8 bits, how many bits long is a full IP address?
Correct Answer
32
Explanation
4 numbers x 8 bits each = 32 bits
46.
IP addresses are divided into classes:
Correct Answer
B. A-E
Explanation
IP addresses are divided into classes, which are denoted by letters A through E. Each class represents a range of IP addresses that can be assigned to networks. Class A addresses are used for large networks, with the first octet representing the network portion and the remaining three octets representing the host portion. Class B addresses are used for medium-sized networks, with the first two octets representing the network portion and the remaining two octets representing the host portion. Class C addresses are used for small networks, with the first three octets representing the network portion and the remaining octet representing the host portion. Class D addresses are reserved for multicast groups, and Class E addresses are reserved for experimental purposes.
47.
IP addresses are assigned by software.
Correct Answer
A. True
Explanation
IP addresses are indeed assigned by software. When a device connects to a network, it requests an IP address from a Dynamic Host Configuration Protocol (DHCP) server. The server then assigns an available IP address to the device. This process is automated and handled by software, ensuring that each device on a network has a unique IP address. Therefore, the statement "IP addresses are assigned by software" is true.
48.
ARP stands for ____________ and is used to convert _________ IP addresses to _________ MAC addresses. (seperate your answers with a comma (ex: Coke, Pepsi, Mountain Dew))
Correct Answer
Address Resolution Protocol, logical, physical
Explanation
ARP stands for Address Resolution Protocol and is used to convert logical IP addresses to physical MAC addresses.
49.
ARP is an essential part of the packet delivery process as it obtains the MAC address for a given IP address
Correct Answer
A. True
Explanation
ARP (Address Resolution Protocol) is indeed an essential part of the packet delivery process. When a device wants to send a packet to a specific IP address, it needs to know the MAC address (hardware address) of the destination device. ARP helps in this process by sending out a broadcast message on the local network, asking which device has the specified IP address. The device with the matching IP address responds with its MAC address, allowing the sender to encapsulate the packet with the correct MAC address and deliver it to the intended recipient. Therefore, the statement is true.
50.
TCP is connection oriented and reliable.
Correct Answer
A. True
Explanation
TCP (Transmission Control Protocol) is indeed connection oriented and reliable. This means that TCP establishes a connection between the sender and receiver before transferring data, ensuring that packets are delivered in the correct order and without errors. TCP also provides mechanisms for flow control and error detection, making it a reliable protocol for transmitting data over a network.