- web.groovymark@gmail.com
- December 3, 2024
Question 01
Which of the following protocols is responsible for discovering the MAC address associated with a known IP address?
a) TCP
b) ICMP
c) ARP
d) IP
Correct Answer: c) ARP
Explanation: ARP (Address Resolution Protocol) is used to map a known IP address to a MAC address on a local network.
Question 02
A network technician needs to troubleshoot a physical connection between a workstation and a switch. Which tool would best help in testing the connection?
a) Cable tester
b) Packet sniffer
c) Bandwidth monitor
d) Port scanner
Correct Answer: a) Cable tester
Explanation: A cable tester is used to test the integrity of cables, checking for faults, shorts, or miswiring.
Question 03
What type of firewall inspects incoming and outgoing packets and allows or blocks them based on preconfigured security rules?
a) Stateless firewall
b) Proxy firewall
c) Stateful firewall
d) Application firewall
Correct Answer: c) Stateful firewall
Explanation: A stateful firewall monitors the state of active connections and makes decisions based on the context of the traffic.
Question 04
A network administrator is configuring a wireless network for a business. To ensure the highest level of security, which encryption protocol should be used?
a) WEP
b) WPA2
c) WPA
d) TKIP
Correct Answer: b) WPA2
Explanation: WPA2 is currently the most secure wireless encryption protocol commonly used in networks.
Question 05
A company is expanding and needs to implement redundancy in its network to prevent downtime in case of a link failure. Which of the following can be used to prevent loops in this network design?
a) OSPF
b) RIP
c) STP
d) EIGRP
Correct Answer: c) STP
Explanation: STP (Spanning Tree Protocol) is used to prevent loops in a network with redundant links.
Question 06
A network technician is tasked with diagnosing intermittent issues on a network. What tool would be best suited for capturing packets and analyzing them in real time?
a) Cable tester
b) Wireshark
c) Tracert
d) IP scanner
Correct Answer: b) Wireshark
Explanation: Wireshark is a packet analyzer used to capture and analyze network traffic in real time.
Question 07
Which of the following protocols allows devices to discover each other on a local network and share resources such as printers and files?
a) FTP
b) SMB
c) DNS
d) SNMP
Correct Answer: b) SMB
Explanation: SMB (Server Message Block) is a protocol that allows sharing of resources like files and printers on a local network.
Question 08
What is the function of a Content Delivery Network (CDN)?
a) To provide network security
b) To distribute web content across multiple servers for faster access
c) To assign IP addresses to devices
d) To monitor network traffic for anomalies
Correct Answer: b) To distribute web content across multiple servers for faster access
Explanation: A CDN distributes web content across multiple servers to reduce latency and improve load times for users.
Question 09
Which of the following allows a device to obtain an IP address automatically when joining a network?
a) DNS
b) DHCP
c) NAT
d) ARP
Correct Answer: b) DHCP
Explanation: DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.
Question 10
What is the primary purpose of a demilitarized zone (DMZ) in network architecture?
a) To isolate public-facing services from the internal network
b) To prevent DoS attacks
c) To filter traffic between VLANs
d) To create a secure virtual network
Correct Answer: a) To isolate public-facing services from the internal network
Explanation: A DMZ is used to provide an additional layer of security by isolating public-facing servers from the internal network.
Question 11
Which command is used in Linux to display network interfaces and their configurations?
a) ipconfig
b) netstat
c) ifconfig
d) ping
Correct Answer: c) ifconfig
Explanation: The ifconfig command is used to display or configure network interfaces in Linux.
Question 12
What is the primary function of NAT (Network Address Translation)?
a) To allocate bandwidth
b) To map private IP addresses to public IP addresses for internet communication
c) To encrypt traffic on the network
d) To assign MAC addresses to devices
Correct Answer: b) To map private IP addresses to public IP addresses for internet communication
Explanation: NAT translates private IP addresses to public IP addresses, allowing devices with private IPs to communicate over the internet.
Question 13
Which of the following DNS record types is used to define the mail server responsible for receiving email for a domain?
a) A record
b) MX record
c) CNAME record
d) PTR record
Correct Answer: b) MX record
Explanation: MX (Mail Exchange) records specify the mail servers responsible for receiving email for a domain.
Question 14
A network administrator is troubleshooting why a workstation cannot reach a specific website. Which command can be used to check if the DNS server is resolving the website’s domain name to an IP address?
a) tracert
b) ipconfig
c) nslookup
d) netstat
Correct Answer: c) nslookup
Explanation: The nslookup command is used to query DNS servers and check domain name resolution.
Question 15
What is the primary purpose of a subnet mask in an IP address configuration?
a) To encrypt data
b) To define the network and host portions of an IP address
c) To map IP addresses to MAC addresses
d) To assign IP addresses dynamically
Correct Answer: b) To define the network and host portions of an IP address
Explanation: The subnet mask defines which part of an IP address represents the network and which part represents the host.
Question 16
A network technician is tasked with setting up a secure remote connection for a user working from home. Which of the following technologies would be most appropriate for this?
a) Telnet
b) VPN
c) SSH
d) FTP
Correct Answer: b) VPN
Explanation: VPN (Virtual Private Network) provides a secure connection to a remote network over the internet.
Question 17
Which of the following protocols is used to securely transfer files over the internet?
a) FTP
b) TFTP
c) SFTP
d) HTTP
Correct Answer: c) SFTP
Explanation: SFTP (Secure File Transfer Protocol) securely transfers files over the internet using SSH encryption.
Question 18
What type of device typically operates at Layer 2 of the OSI model and forwards data based on MAC addresses?
a) Router
b) Switch
c) Firewall
d) Gateway
Correct Answer: b) Switch
Explanation: A switch operates at Layer 2 (Data Link Layer) and forwards data based on MAC addresses.
Question 19
A technician is configuring a switch to support multiple VLANs. Which protocol is used to allow VLAN traffic to traverse between switches?
a) SNMP
b) 802.1Q
c) ARP
d) TCP
Correct Answer: b) 802.1Q
Explanation: 802.1Q is a VLAN tagging protocol that allows VLAN traffic to be carried over trunk links between switches.
Question 20
A network engineer needs to encrypt communication between two remote offices. Which of the following protocols would be the best choice for securing the connection?
a) HTTP
b) IPsec
c) FTP
d) RIP
Correct Answer: b) IPsec
Explanation: IPsec (Internet Protocol Security) is used to secure communications over IP networks by encrypting data at the network layer.