-
web.groovymark@gmail.com
- November 24, 2024
Question 21
Which wireless frequency band offers greater range but slower speeds?
a) 2.4 GHz
b) 5 GHz
c) 10 GHz
d) 15 GHz
Correct Answer: a) 2.4 GHz
Explanation: The 2.4 GHz band offers longer range but slower speeds compared to the 5 GHz band, which provides faster speeds but a shorter range.
Question 22
What does ICMP stand for?
a) Internet Control Message Protocol
b) Internet Configuration Management Protocol
c) Internal Communication Management Protocol
d) Internet Connection Monitoring Protocol
Correct Answer: a) Internet Control Message Protocol
Explanation: ICMP is used for sending error messages and operational information, such as with the ping command.
Question 23
What is the purpose of port forwarding in a router?
a) To block unauthorized access
b) To monitor network traffic
c) To allow external access to specific internal devices
d) To assign IP addresses
Correct Answer: c) To allow external access to specific internal devices
Explanation: Port forwarding directs external traffic to a specific internal device or service, such as a web server.
Question 24
Which OSI layer is responsible for routing data between different networks?
a) Application
b) Transport
c) Network
d) Physical
Correct Answer: c) Network
Explanation: The Network layer is responsible for logical addressing and routing data across different networks.
Question 25
What does NAT (Network Address Translation) do?
a) Translates domain names into IP addresses
b) Converts private IP addresses into public IP addresses
c) Encrypts network traffic
d) Assigns MAC addresses to devices
Correct Answer: b) Converts private IP addresses into public IP addresses
Explanation: NAT converts private internal IP addresses into public IP addresses, allowing devices on a private network to access external networks like the internet.
Question 26
Which command would you use to trace the route packets take to reach a destination?
a) ping
b) traceroute
c) netstat
d) nslookup
Correct Answer: b) traceroute
Explanation: The traceroute command shows the path packets take from the source to the destination, listing all intermediate hops along the way.
Question 27
Which network topology provides the highest level of fault tolerance?
a) Star
b) Ring
c) Mesh
d) Bus
Correct Answer: c) Mesh
Explanation: In a mesh topology, each device is connected to every other device, offering high redundancy and fault tolerance.
Question 28
Which protocol is used for secure communication over the internet?
a) FTP
b) HTTP
c) HTTPS
d) SNMP
Correct Answer: c) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) is used for secure communication over the internet by encrypting data between the client and server.
Question 29
What is the primary purpose of a proxy server?
a) To encrypt network traffic
b) To monitor network traffic
c) To act as an intermediary between a client and server
d) To assign IP addresses
Correct Answer: c) To act as an intermediary between a client and server
Explanation: Proxy servers act as intermediaries between clients and servers, often used to enhance security or control access.
Question 30
Which layer of the OSI model is responsible for error detection and correction?
a) Physical
b) Data Link
c) Network
d) Presentation
Correct Answer: b) Data Link
Explanation: The Data Link layer ensures data is transmitted error-free across the physical network by handling error detection and correction.
Question 31
What type of cable is commonly used for Ethernet networking?
a) Coaxial
b) Fiber-optic
c) Twisted pair
d) HDMI
Correct Answer: c) Twisted pair
Explanation: Twisted pair cables, such as CAT5e and CAT6, are commonly used for Ethernet networking due to their balance of speed, range, and cost.
Question 32
What is the purpose of a honeypot in network security?
a) To encrypt sensitive data
b) To attract attackers and study their behavior
c) To monitor network performance
d) To filter network traffic
Correct Answer: b) To attract attackers and study their behavior
Explanation: A honeypot is a decoy system used to attract attackers and analyze their actions without putting real network resources at risk.
Question 33
What does SSL stand for in secure communications?
a) Secure Sockets Layer
b) Secure System Layer
c) System Security Layer
d) Socket Secure Layer
Correct Answer: a) Secure Sockets Layer
Explanation: SSL (Secure Sockets Layer) is a protocol used to establish secure connections between web servers and browsers, ensuring data is encrypted.
Question 34
What type of attack involves overwhelming a system with traffic to render it unavailable?
a) Phishing
b) Man-in-the-middle
c) Denial of Service
d) Spoofing
Correct Answer: c) Denial of Service
Explanation: A Denial of Service (DoS) attack floods a system with traffic, making it unavailable to legitimate users.
Question 35
Which OSI layer is responsible for data formatting and encryption?
a) Application
b) Session
c) Presentation
d) Network
Correct Answer: c) Presentation
Explanation: The Presentation layer is responsible for data formatting, encryption, and compression, ensuring data is presented correctly to applications.
Question 36
What does DHCP stand for?
a) Data Host Control Protocol
b) Domain Host Configuration Protocol
c) Dynamic Host Configuration Protocol
d) Dynamic Hyper Control Protocol
Correct Answer: c) Dynamic Host Configuration Protocol
Explanation: DHCP dynamically assigns IP addresses and other network configuration settings to devices on a network.
Question 37
What is the primary function of a switch in a network?
a) To broadcast data to all devices
b) To forward data only to the intended device based on MAC addresses
c) To route data between different networks
d) To encrypt network traffic
Correct Answer: b) To forward data only to the intended device based on MAC addresses
Explanation: A switch forwards data only to the correct device on the network by using MAC addresses to make forwarding decisions.
Question 38
Which protocol is responsible for resolving domain names into IP addresses?
a) DNS
b) DHCP
c) ARP
d) ICMP
Explanation: DNS (Domain Name System) resolves domain names (such as www.example.com) into IP addresses, allowing devices to locate each other on the network.
Question 39
What is the purpose of a MAC address?
a) To identify devices on a network at the physical layer
b) To assign IP addresses to devices
c) To encrypt network traffic
d) To route data between networks
Correct Answer: a) To identify devices on a network at the physical layer
Explanation: MAC addresses are unique hardware identifiers assigned to network devices, used to ensure proper data delivery at the Data Link layer.
Question 40
What is a man-in-the-middle attack?
a) An attack where a hacker intercepts and alters communication between two parties
b) An attack that floods a server with requests
c) An attack that sends phishing emails to obtain sensitive information
d) An attack that spoofs the IP address of a legitimate server
Correct Answer: a) An attack where a hacker intercepts and alters communication between two parties
Explanation: In a man-in-the-middle attack, the attacker intercepts and possibly alters communication between two parties without their knowledge.