-
web.groovymark@gmail.com
- November 24, 2024
Question 21
Which protocol provides connectionless communication in the transport layer?
a) TCP
b) UDP
c) IP
d) FTP
Correct Answer: b) UDP
Explanation: UDP provides connectionless communication, making it faster but less reliable than TCP.
Question 22
A topology where devices are connected directly to each other in a loop.
a) Star
b) Ring
c) Bus
d) Mesh
Correct Answer: b) Ring
Explanation: In a ring topology, each device is connected to two others, forming a closed loop.
Question 23
What type of attack intercepts communication between two parties?
a) Phishing
b) Man-in-the-middle
c) Denial of service
d) Spoofing
Correct Answer: b) Man-in-the-middle
Explanation: In a man-in-the-middle attack, the attacker intercepts communication between two parties to steal or alter data.
Question 24
The process of sending unwanted emails to users is called?
a) Spoofing
b) Phishing
c) Spamming
d) Hacking
Correct Answer: c) Spamming
Explanation: Spamming involves sending unsolicited emails, often for advertising purposes.
Question 25
What does the term “spoofing” refer to in network security?
a) Overloading a server with traffic
b) Gaining unauthorized access
c) Faking the identity of a user or device
d) Intercepting network traffic
Correct Answer: c) Faking the identity of a user or device
Explanation: Spoofing involves falsifying the identity of a device or user to gain unauthorized access.
Question 26
Which OSI layer is responsible for end-to-end connections and reliability?
a) Session
b) Transport
c) Data Link
d) Application
Correct Answer: b) Transport
Explanation: The transport layer is responsible for ensuring end-to-end communication and reliability between devices.
Question 27
A device that amplifies and retransmits signals over long distances is called?
a) Router
b) Repeater
c) Switch
d) Firewall
Correct Answer: b) Repeater
Explanation: A repeater extends the distance over which a signal can travel by amplifying it.
Question 28
The layer responsible for translating data between the network and the application.
a) Application
b) Presentation
c) Data Link
d) Session
Correct Answer: b) Presentation
Explanation: The presentation layer translates data between the application and network layers, ensuring compatibility.
Question 29
What is the function of an intrusion detection system (IDS)?
a) To prevent attacks
b) To detect unauthorized activity
c) To manage network traffic
d) To assign IP addresses
Correct Answer: b) To detect unauthorized activity
Explanation: IDS monitors network traffic to detect and alert administrators to suspicious or unauthorized activity.
Question 30
What is the benefit of using a VPN?
a) It increases network speed
b) It provides a secure connection over public networks
c) It assigns IP addresses automatically
d) It filters network traffic
Correct Answer: b) It provides a secure connection over public networks
Explanation: A Virtual Private Network (VPN) encrypts data and provides a secure connection, even over public networks.
Question 31
Which wireless encryption protocol is considered the most secure?
a) WEP
b) WPA
c) WPA2
d) WPA3
Correct Answer: d) WPA3
Explanation: WPA3 is the latest and most secure wireless encryption protocol, offering better protection than WPA and WPA2.
Question 32
Which OSI layer is involved in creating the sessions between applications?
a) Session
b) Presentation
c) Network
d) Transport
Correct Answer: a) Session
Explanation: The session layer is responsible for setting up, managing, and terminating sessions between applications.
Question 33
What is a firewall’s role in network security?
a) To manage IP addresses
b) To monitor user activity
c) To block unauthorized access
d) To speed up network connections
Correct Answer: c) To block unauthorized access
Explanation: Firewalls block unauthorized access and help protect networks from attacks.
Question 34
A wireless standard that operates in the 5 GHz frequency range.
a) 802.11b
b) 802.11g
c) 802.11a
d) 802.11n
Correct Answer: c) 802.11a
Explanation: 802.11a operates in the 5 GHz frequency band and offers higher data rates.
Question 35
What is the recommended API for accessing Azure Cosmos DB with a graph-based data structure?
a) To assign IP addresses
b) To route data packets between networks
c) To filter traffic based on MAC addresses
d) To broadcast data to all connected devices
Correct Answer: c) To filter traffic based on MAC addresses
Explanation: A switch uses MAC addresses to filter and forward traffic to the correct destination.
Question 36
Which OSI layer handles flow control and error correction?
a) Network
b) Transport
c) Data Link
d) Physical
Correct Answer: b) Transport
Explanation: The transport layer handles flow control and error correction to ensure reliable data transmission.
Question 37
A topology where each device is connected to every other device.
a) Mesh
b) Star
c) Ring
d) Bus
Correct Answer: a) Mesh
Explanation: In a mesh topology, each device is connected to every other device, providing redundancy and fault tolerance.
Question 38
What does a router do in a network?
a) Filters MAC addresses
b) Amplifies signals
c) Routes data between networks
d) Blocks unauthorized access
Correct Answer: c) Routes data between networks
Explanation: A router directs traffic between different networks by forwarding data packets based on IP addresses.
Question 39
A type of attack where a hacker intercepts communication between two devices.
a) Phishing
b) Man-in-the-middle
c) Denial of service
d) Spoofing
Correct Answer: b) Man-in-the-middle
Explanation: A man-in-the-middle attack occurs when a hacker intercepts and potentially alters communication between two devices
Question 40
The process of dividing data into smaller units for transmission.
a) Encryption
b) Compression
c) Segmentation
d) Routing
Correct Answer: c) Segmentation
Explanation: Segmentation involves dividing data into smaller pieces for more efficient transmission across networks.