Which wireless standard operates at both 2.4 GHz and 5 GHz frequencies?
a) 802.11b b) 802.11g c) 802.11n d) 802.11a
Correct Answer: c) 802.11n
Explanation: 802.11n operates on both 2.4 GHz and 5 GHz frequency bands, offering better performance and flexibility than earlier wireless standards.
Question 42
What does the tracert command do?
a) Tests connectivity between two devices b) Shows the path data takes from one device to another c) Resolves IP addresses to domain names d) Displays the network configuration of a device
Correct Answer: b) Shows the path data takes from one device to another
Explanation: The tracert command displays the route data takes from the source to the destination, showing each hop along the way.
Question 43
What is the function of a network switch?
a) To encrypt data between devices b) To forward data to all devices on the network c) To route data based on IP addresses d) To forward data only to the intended recipient
Correct Answer: d) To forward data only to the intended recipient
Explanation: A switch forwards data only to the intended device on the network using MAC addresses, ensuring efficient data transmission.
Question 44
What is the primary difference between TCP and UDP?
a) TCP is faster than UDP b) TCP is connection-oriented, while UDP is connectionless c) UDP provides encryption, while TCP does not d) UDP is used for email, while TCP is used for web browsing
Correct Answer: b) TCP is connection-oriented, while UDP is connectionless
Explanation: TCP establishes a connection before transmitting data, ensuring reliable delivery, while UDP is connectionless and faster but less reliable.
Question 45
What is a Denial of Service (DoS) attack?
a) An attack that floods a server with requests, making it unavailable b) An attack that intercepts communication between two devices c) An attack that sends phishing emails to users d) An attack that alters DNS records to redirect traffic
Correct Answer: a) An attack that floods a server with requests, making it unavailable
Explanation: In a Denial of Service attack, the attacker floods the target with traffic, rendering it unavailable to legitimate users.
Question 46
Which OSI layer handles encryption and decryption of data?
a) Application b) Presentation c) Network d) Data Link
Correct Answer: b) Presentation
Explanation: The Presentation layer is responsible for encryption, decryption, and data formatting to ensure data is properly interpreted by applications.
Question 47
What is a network protocol?
a) A set of rules governing data communication b) A device that forwards data between networks c) A method for encrypting data d) A system for assigning IP addresses
Correct Answer: a) A set of rules governing data communication
Explanation: A network protocol is a set of rules and conventions that devices use to communicate with each other across a network.
Question 48
What is the main function of a wireless access point (WAP)?
a) To assign IP addresses to devices b) To extend the range of a wireless network c) To connect wireless devices to a wired network d) To monitor network traffic
Correct Answer: c) To connect wireless devices to a wired network
Explanation: A wireless access point connects wireless devices to a wired network, enabling communication between the two.
Question 49
What is the role of DNS (Domain Name System) in networking?
a) To assign IP addresses to devices b) To translate IP addresses into MAC addresses c) To translate domain names into IP addresses d) To encrypt network traffic
Correct Answer: c) To translate domain names into IP addresses
Explanation: DNS translates human-readable domain names (likewww.example.com) into IP addresses, allowing devices to locate each other on the internet.
Question 50
Which protocol is used to securely transfer files over the internet?
a) FTP b) SSH c) SFTP d) HTTP
Correct Answer: c) SFTP
Explanation: SFTP (Secure File Transfer Protocol) is used to securely transfer files over the internet by encrypting data during transmission.