-
web.groovymark@gmail.com
- November 24, 2024
Question 21
Which wireless encryption protocol is now considered insecure and should not be used?
a) WPA
b) WEP
c) WPA2
d) WPA3
Correct Answer: b) WEP
Explanation: WEP (Wired Equivalent Privacy) has known vulnerabilities and is no longer considered secure.
Question 22
What type of attack involves overwhelming a system with traffic to prevent legitimate access?
a) Spoofing
b) Phishing
c) Denial of Service (DoS)
d) Man-in-the-middle
Correct Answer: c) Denial of Service (DoS)
Explanation: A DoS attack floods a system with traffic, making it unavailable to legitimate users.
Question 23
In networking, what does NAT stand for?
a) Network Address Translation
b) Network Access Technology
c) Network Address Tunneling
d) Network Access Transfer
Correct Answer: a) Network Address Translation
Explanation: NAT translates private IP addresses into public IP addresses for devices to access external networks.
Question 24
What is the function of the Data Link layer in the OSI model?
a) To manage data encryption
b) To handle physical addressing and error detection
c) To route data between networks
d) To control data flow
Correct Answer: b) To handle physical addressing and error detection
Explanation: The Data Link layer manages MAC addresses and ensures error detection in transmitted frames.
Question 25
What wireless standard operates on both 2.4 GHz and 5 GHz frequencies?
a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11n
Correct Answer: d) 802.11n
Explanation: 802.11n supports both 2.4 GHz and 5 GHz frequencies for wireless communication.
Question 26
Which command is used to view network connections in real-time on a Windows computer?
a) nslookup
b) ping
c) netstat
d) ipconfig
Correct Answer: c) netstat
Explanation: The netstat command displays active network connections and their status in real-time.
Question 27
What does IP stand for in networking?
a) Internet Protocol
b) Internet Protection
c) Internal Program
d) Information Packet
Correct Answer: a) Internet Protocol
Explanation: IP (Internet Protocol) is responsible for addressing and routing data across networks.
Question 28
What is a subnet mask used for?
a) To assign IP addresses
b) To route data between networks
c) To divide a network into smaller sub-networks
d) To monitor network traffic
Correct Answer: c) To divide a network into smaller sub-networks
Explanation: A subnet mask divides an IP address into the network and host portions, allowing for the creation of smaller subnetworks.
Question 29
Which OSI layer is responsible for packet sequencing and data segmentation?
a) Application
b) Transport
c) Data Link
d) Network
Correct Answer: b) Transport
Explanation: The Transport layer handles packet sequencing, segmentation, and reassembly to ensure reliable data transmission.
Question 30
What is the purpose of ARP (Address Resolution Protocol)?
a) To translate domain names into IP addresses
b) To route data between networks
c) To resolve IP addresses to MAC addresses
d) To assign IP addresses
Correct Answer: c) To resolve IP addresses to MAC addresses
Explanation: ARP translates IP addresses to MAC addresses so that data can be delivered to the correct device within a local network.
Question 31
Which device connects multiple networks and directs network traffic based on IP addresses?
a) Switch
b) Router
c) Repeater
d) Hub
Correct Answer: b) Router
Explanation: A router connects multiple networks and forwards data between them using IP addresses.
Question 32
What is the maximum theoretical data transfer rate of a CAT5e cable?
a) 100 Mbps
b) 1 Gbps
c) 10 Gbps
d) 100 Gbps
Correct Answer: b) 1 Gbps
Explanation: CAT5e cables support up to 1 Gbps (Gigabit Ethernet) data transfer rates over a maximum length of 100 meters.
Question 33
What does the ping command test in networking?
a) IP address resolution
b) DNS lookup
c) Connectivity between devices
d) File transfer speed
Correct Answer: c) Connectivity between devices
Explanation: The ping command tests whether two devices on a network can communicate with each other by sending an ICMP echo request.
Question 34
Which OSI layer is responsible for managing data exchange between applications?
a) Session
b) Presentation
c) Network
d) Transport
Correct Answer: a) Session
Explanation: The Session layer manages communication sessions, establishing, maintaining, and terminating connections between applications.
Question 35
What is the function of a proxy server in a network?
a) To manage IP addresses
b) To encrypt data
c) To act as an intermediary between a client and a server
d) To monitor network traffic
Correct Answer: c) To act as an intermediary between a client and a server
Explanation: A proxy server acts as an intermediary between a client and a server, often used to improve security or load balancing.
Question 36
Which network topology connects all devices to a single central point?
a) Star
b) Ring
c) Bus
d) Mesh
Correct Answer: a) Star
Explanation: In a star topology, all devices are connected to a central hub or switch.
Question 37
What type of attack involves pretending to be someone else to gain unauthorized access?
a) Phishing
b) Spoofing
c) Denial of Service
d) Man-in-the-middle
Correct Answer: b) Spoofing
Explanation: Spoofing is a technique where an attacker pretends to be someone else to gain unauthorized access to a system or data.
Question 38
What is the function of a switch in a network?
a) To connect multiple networks
b) To broadcast data to all devices
c) To forward data to the correct device based on MAC addresses
d) To encrypt data
Correct Answer: c) To forward data to the correct device based on MAC addresses
Explanation: A switch forwards data based on MAC addresses, ensuring it is sent only to the intended device.
Question 39
What is the purpose of port forwarding in a router?
a) To block unauthorized access
b) To allow external devices to access internal network services
c) To encrypt data transmissions
d) To filter network traffic
Correct Answer: b) To allow external devices to access internal network services
Explanation: Port forwarding directs traffic from external devices to specific internal network services, such as a web server.
Question 40
What is a VPN used for in networking?
a) To monitor network activity
b) To block unauthorized access
c) To provide secure remote access over the internet
d) To assign IP addresses
Correct Answer: c) To provide secure remote access over the internet
Explanation: A VPN (Virtual Private Network) provides a secure, encrypted connection for users accessing a network remotely over the internet.