-
web.groovymark@gmail.com
- November 24, 2024
Question 21
What is the primary function of a proxy server?
a) To filter and control network traffic
b) To assign IP addresses
c) To resolve domain names
d) To route packets between networks
Correct Answer: a) To filter and control network traffic
Explanation: A proxy server acts as an intermediary, filtering network traffic and improving security by hiding the client’s identity.
Question 22
Which protocol is used for sending emails?
a) FTP
b) DNS
c) SMTP
d) HTTP
Correct Answer: c) SMTP
Explanation: SMTP (Simple Mail Transfer Protocol) is the standard protocol used for sending emails across the internet.
Question 23
What type of cable is used for high-speed data transmission over long distances?
a) Twisted pair
b) Coaxial
c) Fiber optic
d) CAT5
Correct Answer: c) Fiber optic
Explanation: Fiber optic cables use light to transmit data over long distances at very high speeds, making them ideal for high-bandwidth communication.
Question 24
What is the function of a MAC address in networking?
a) It identifies the network location of a device
b) It encrypts data during transmission
c) It uniquely identifies devices on a local network
d) It assigns IP addresses to devices
Correct Answer: c) It uniquely identifies devices on a local network
Explanation: A MAC (Media Access Control) address is a unique identifier assigned to each network interface for communication within a local network.
Question 25
Which of the following is a characteristic of a mesh topology?
a) All devices are connected to a central hub
b) Devices are connected in a linear sequence
c) Every device is connected to every other device
d) Devices are connected in a loop
Correct Answer: c) Every device is connected to every other device
Explanation: In a mesh topology, all devices are interconnected, providing high redundancy and reliability.
Question 26
Which layer of the OSI model is responsible for data compression and encryption?
a) Physical
b) Presentation
c) Session
d) Transport
Correct Answer: b) Presentation
Explanation: The Presentation layer (Layer 6) handles the formatting, compression, and encryption of data to ensure it is readable by the receiving system.
Question 27
What is the function of a DHCP server?
a) To resolve domain names
b) To assign dynamic IP addresses to devices
c) To filter network traffic
d) To establish VPN connections
Correct Answer: b) To assign dynamic IP addresses to devices
Explanation: A DHCP (Dynamic Host Configuration Protocol) server automatically assigns IP addresses to devices on a network, simplifying network management.
Which type of malware disguises itself as legitimate software?
a) Worm
b) Virus
c) Trojan horse
d) Spyware
Correct Answer: c) Trojan horse
Explanation: A Trojan horse is malware that pretends to be a legitimate application while secretly performing malicious activities on the system.
Question 29
What is the main purpose of a VLAN (Virtual Local Area Network)?
a) To separate network devices physically
b) To divide a network into smaller, logical segments
c) To encrypt data transmissions
d) To assign static IP addresses
Correct Answer: b) To divide a network into smaller, logical segments
Explanation: VLANs allow network administrators to segment a network logically, improving security and traffic management.
Question 30
Which OSI layer is responsible for routing packets between different networks?
a) Data Link
b) Network
c) Transport
d) Application
Correct Answer: b) Network
Explanation: The Network layer (Layer 3) is responsible for determining the best path to route packets across different networks, using logical addressing like IP addresses.
Question 31
Which of the following is a disadvantage of a bus topology?
a) High cabling costs
b) Difficulty in troubleshooting
c) Redundancy issues
d) High latency
Correct Answer: b) Difficulty in troubleshooting
Explanation: In a bus topology, if there is a failure in the main cable, the entire network is affected, making it difficult to troubleshoot and fix.
Question 32
Which protocol is used to access a remote device securely over the internet?
a) Telnet
b) FTP
c) SSH
d) HTTP
Correct Answer: c) SSH
Explanation: SSH (Secure Shell) allows secure access to remote devices over the internet by encrypting communication between the client and the server.
Question 33
Which network device operates at Layer 2 of the OSI model and forwards frames based on MAC addresses?
a) Hub
b) Switch
c) Router
d) Firewall
Correct Answer: b) Switch
Explanation: A switch operates at the Data Link layer (Layer 2) and forwards data based on MAC addresses, ensuring data is sent to the correct device.
Question 34
What is a firewall rule that blocks all incoming traffic by default and only allows specific traffic through called?
a) Blacklist
b) Whitelist
c) NAT
d) Proxy
Correct Answer: b) Whitelist
Explanation: A whitelist is a security approach where only pre-approved traffic is allowed through the firewall, blocking all other traffic by default.
Question 35
What is the primary purpose of a subnet mask?
a) To encrypt network traffic
b) To divide an IP address into network and host portions
c) To assign dynamic IP addresses
d) To route packets across networks
Correct Answer: a) To connect an Azure App Service to an on-premises resource over TCP
Explanation: Azure App Service Hybrid Connections allows you to connect Azure App Services to on-premises resources, such as databases, over TCP.
Question 36
Which type of cable is used to connect similar devices, such as switch-to-switch?
a) Cross-over cable
b) Patch cable
c) Fiber optic cable
d) Coaxial cable
Correct Answer: a) Cross-over cable
Explanation: A cross-over cable is used to connect two similar devices, such as switch-to-switch or computer-to-computer, by reversing the transmission and receiving wires.
Question 37
Which wireless technology provides the fastest data transmission speed?
a) 802.11a
b) 802.11b
c) 802.11g
d) 802.11ac
Correct Answer: d) 802.11ac
Explanation: The 802.11ac wireless standard provides the fastest data transmission speed, supporting gigabit speeds over short distances.
Question 38
What is the primary function of a router?
a) To forward data based on IP addresses
b) To filter network traffic
c) To assign IP addresses
d) To connect devices in a local network
Correct Answer: a) To forward data based on IP addresses
Explanation: A router forwards data packets between different networks based on IP addresses, ensuring data reaches its intended destination.
Question 39
Which protocol is responsible for ensuring the reliability of data transmission by managing retransmissions?
a) TCP
b) UDP
c) ICMP
d) ARP
Correct Answer: a) TCP
Explanation: TCP (Transmission Control Protocol) ensures the reliable delivery of data by managing retransmissions in case of packet loss or errors.
Question 40
Which of the following is a private IP address?
a) 192.168.1.1
b) 172.15.0.1
c) 8.8.8.8
d) 128.0.0.1
Correct Answer: a) 192.168.1.1
Explanation: 192.168.x.x is a private IP address range used for local networks, not routable on the internet.