1.
The Internet is an example of which type of network?
Correct Answer
C. WAN
Explanation
The Internet is an example of a WAN (Wide Area Network) because it connects computers and networks across large geographic areas, such as cities, countries, or even continents. WANs are used to connect local networks (such as LANs or WLANs) over long distances, allowing users to access resources and communicate with each other from different locations. The Internet is a global network that connects millions of computers worldwide, making it the largest WAN in existence.
2.
What is the suggested maximum number of PC's in a peer-to-peer network?
Correct Answer
D. 10
Explanation
A peer-to-peer network is a decentralized network where each computer, or peer, has equal status and can act as both a client and a server. In such a network, the maximum number of PCs is typically limited to ensure efficient communication and resource sharing among the peers. Having too many PCs in a peer-to-peer network can lead to performance issues, such as slower data transfer speeds and increased network congestion. Therefore, the suggested maximum number of PCs in a peer-to-peer network is 10, to maintain optimal network performance and usability.
3.
Which method of data transfer allows information to be sent and received at the same time?
Correct Answer
full duplex
Explanation
Full duplex is a method of data transfer that allows information to be sent and received simultaneously. In full duplex communication, data can flow in both directions at the same time, enabling real-time two-way communication. This is achieved by using separate channels for sending and receiving data, thereby eliminating the need for one party to wait for the other to finish transmitting before sending their own data. Full duplex is commonly used in telecommunications and computer networks to enable efficient and seamless communication between devices.
4.
Latency is the amount of time it takes to travel from_____ to _______.
Correct Answer
source destination
Explanation
Latency refers to the time it takes for data to travel from the source to the destination. It measures the delay or lag in the transmission of information between these two points.
5.
Half Duplex allows data to be sent and received at the same time.
Correct Answer
B. False
Explanation
The statement is incorrect. Half Duplex mode allows data to be sent and received, but not at the same time. In Half Duplex, communication can only occur in one direction at a time. It requires the sender to stop transmitting before the receiver can start receiving, and vice versa. Therefore, data cannot be sent and received simultaneously in Half Duplex mode.
6.
How many bits are in an IP address?
Correct Answer
32
32 bits
thirty two
thirty two bits
Explanation
An IP address is a numerical label assigned to each device connected to a computer network. It is used to identify and locate devices on the network. An IP address consists of 32 bits, which are divided into four groups of 8 bits each, separated by periods. Each group can have a value between 0 and 255, resulting in a total of 4,294,967,296 possible unique IP addresses. Therefore, the correct answer is 32 bits, as it accurately represents the number of bits in an IP address.
7.
What is another name for Logical Address?
Correct Answer
D. IP address
Explanation
The correct answer is IP address. An IP address is a unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. It serves as a logical address because it identifies the network and host of a device, allowing for proper routing and communication within the network. Physical address refers to the MAC address, which is a unique identifier assigned to the network interface card of a device.
8.
In dotted decimal notation, 32 bits are grouped into 8-bit bytes called ______.
Correct Answer
octets
Explanation
In dotted decimal notation, 32 bits are grouped into 8-bit bytes called octets. Octets are used to represent IP addresses in IPv4 format. Each octet contains 8 bits, allowing for a range of values from 0 to 255. The four octets in an IP address are separated by dots, hence the term "dotted decimal notation." This notation is commonly used to identify and communicate IP addresses on computer networks.
9.
Which IP class is used for experimental testing?
Correct Answer
E. Class E
Explanation
Class E is used for experimental testing. It is a reserved IP class that is not intended for normal use in the internet. It is used for research and development purposes, allowing experimentation with new technologies and protocols without disrupting the existing network infrastructure. Class E addresses are not assigned to any organization and are not routable on the internet.
10.
What is the default subnet mask for Class A?
Correct Answer
B. 255.0.0.0
Explanation
The default subnet mask for Class A is 255.0.0.0. In the classful IP addressing scheme, Class A addresses have a default subnet mask of 255.0.0.0. This means that the first octet of the IP address is used to identify the network, while the remaining three octets are used to identify the host. This allows for a large number of hosts to be connected to a Class A network.
11.
What is the communication protocol that establishes a connection on the internet?
Correct Answer
D. HTTP
Explanation
HTTP (Hypertext Transfer Protocol) is the correct answer because it is the communication protocol that establishes a connection on the internet. It is the foundation for data communication on the World Wide Web and allows for the retrieval and display of web pages. HTTP uses a client-server model, where the client (usually a web browser) sends a request to the server (where the web page is hosted) and the server responds with the requested data. This protocol is widely used for accessing websites, transferring files, and other internet-related activities.
12.
What is the protocol that provides services for file transfer and manipulation?
Correct Answer
C. FTP
Explanation
FTP stands for File Transfer Protocol, which is a protocol that provides services for file transfer and manipulation. It allows users to upload, download, and manage files on a remote server. FTP is commonly used for transferring files over a network, such as the internet. It provides a reliable and efficient way to transfer files between different systems.
13.
______ is a protocol used to send email in a TCP/IP network.
Correct Answer
SMTP
Simple Mail Transfer Protocol
Explanation
SMTP, or Simple Mail Transfer Protocol, is the correct answer because it is the protocol used to send email in a TCP/IP network. SMTP is responsible for the transmission of email messages between servers, allowing for the reliable delivery of emails across different networks. It operates on port 25 and uses a client-server architecture, where the client initiates the connection and sends the email, while the server receives and delivers it to the intended recipient. SMTP is widely used and supported by most email servers and clients, making it a crucial component of email communication.
14.
What is another name for a hub?(Choose Two)
Correct Answer(s)
A. Concentrator
C. Multiport repeater
Explanation
A hub is a networking device that connects multiple devices in a network. It receives data packets from one device and broadcasts them to all other devices connected to it. A hub is also known as a concentrator because it concentrates or centralizes the network connections. Additionally, a hub can be referred to as a multiport repeater because it amplifies and regenerates the incoming signals before transmitting them to the connected devices. However, a hub is not the same as a bridge or a router, which are different types of networking devices with distinct functionalities.
15.
Which term describes the process of adding headers to data as it moves through the
layers of the OSI model?
Correct Answer(s)
encapsulation
Explanation
Encapsulation is the term that describes the process of adding headers to data as it moves through the layers of the OSI model. This process involves wrapping the data with headers at each layer, starting from the application layer down to the physical layer. Each layer adds its own header information to the data, encapsulating it within a new layer. This allows the data to be transmitted across the network, with each layer's header providing the necessary information for routing and delivery.
16.
When purchasing Cisco components for a network installation, what are three warning
signs that the equipment may be counterfeit?
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above." This means that all three warning signs mentioned in the question - substandard performance, substandard packaging, and a significantly lower price - are indicators that the Cisco equipment may be counterfeit.
17.
Which protocol lacks support for encryption and can be initiated from a computer command prompt?
Correct Answer
C. Telnet
Explanation
Telnet lacks support for encryption and can be initiated from a computer command prompt. Telnet is a network protocol that allows a user to connect to and remotely manage a device or computer over a network. However, it does not provide any encryption or security measures, making it susceptible to unauthorized access and interception of data. This protocol is commonly used for troubleshooting, debugging, and remote administration purposes.
18.
Which network topology will allow all devices to continue to communicate with each other should a network cable fail?
Correct Answer
B. Mesh
Explanation
A mesh network topology is the correct answer because in a mesh network, every device is connected to every other device, forming multiple paths for communication. This redundancy ensures that if a network cable fails, the devices can still communicate through alternate paths. In contrast, in a star topology, all devices are connected to a central hub, so if the cable connected to the hub fails, communication between devices will be disrupted. Similarly, in a bus or ring topology, a cable failure can cause a complete network breakdown.
19.
What are the Two types of fiber-optic cable?(Choose Two)
Correct Answer(s)
C. Multimode
D. Single Mode
Explanation
The correct answer is Multimode and Single Mode. Multimode fiber-optic cable is designed to carry multiple light rays or modes simultaneously. It has a larger core diameter and is typically used for short-distance communication. Single Mode fiber-optic cable, on the other hand, is designed to carry a single mode or ray of light at a time. It has a smaller core diameter and is used for long-distance communication.
20.
In a Bus Topology, what prevents signals from being echoed back through the network?
Correct Answer(s)
terminator
Explanation
In a bus topology, a terminator is used to prevent signals from being echoed back through the network. A terminator is a device or component that absorbs or terminates signals, preventing them from bouncing back and causing interference. By placing terminators at both ends of the bus, the signals are absorbed and prevented from reflecting back, ensuring proper signal transmission and preventing data collisions.
21.
Which Windows XP command displays the route taken by packets crossing an IP network?
Correct Answer
C. Tracert
Explanation
The correct answer is tracert. Tracert is a command in Windows XP that displays the route taken by packets crossing an IP network. It shows the IP addresses of the routers in the path, the round-trip times, and the number of hops taken to reach the destination. This command is useful for troubleshooting network connectivity issues and identifying network latency or packet loss.
22.
Which layer of the OSI model is primarily concerned with accessing the physical media and physical addressing?
Correct Answer
F. Data Link Layer
Explanation
The Data Link Layer of the OSI model is primarily concerned with accessing the physical media and physical addressing. This layer is responsible for the transmission of data packets over the physical network, ensuring error-free and reliable communication between devices. It handles tasks such as framing, error detection and correction, and media access control. By providing a reliable link between the network layer and the physical layer, the Data Link Layer plays a crucial role in establishing and maintaining a connection between devices on a network.
23.
Which three protocols are associated with e-mail? (Choose three.)
Correct Answer(s)
A. POP3
C. SMTP
F. IMAP
Explanation
POP3, SMTP, and IMAP are the three protocols associated with email. POP3 (Post Office Protocol version 3) is used for receiving email messages from a mail server to a client device. SMTP (Simple Mail Transfer Protocol) is used for sending email messages from a client device to a mail server. IMAP (Internet Message Access Protocol) is used for accessing and managing email messages on a mail server from multiple devices. HTTP, Telnet, and ICMP are not directly associated with email protocols.
24.
Which two characteristics describe Ethernet technology? (Choose two.)
Correct Answer(s)
C. Supported by IEEE 802.3 standards
E. Uses a bus logical topology
Explanation
Ethernet technology is supported by IEEE 802.3 standards, which define the physical and data link layer specifications for Ethernet networks. Additionally, Ethernet uses a bus logical topology, where all devices are connected to a central bus or backbone. This allows for easy connectivity and communication between devices on the network.
25.
A _____ controller manages all security related aspects of users and network resources.
Correct Answer(s)
Domain
Explanation
A domain controller is responsible for managing all security-related aspects of users and network resources. It authenticates users, grants access permissions, enforces security policies, and manages user accounts and passwords. It acts as a central authority for managing and controlling access to network resources within a domain, ensuring that only authorized users have the necessary privileges and that security measures are enforced consistently.