- web.groovymark@gmail.com
- December 4, 2024
Question 01
Which protocol is responsible for assigning IP addresses automatically to devices on a network?
a) DNS
b) DHCP
c) FTP
d) SNMP
Correct Answer: b) DHCP
Explanation: DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.
Question 02
Which of the following devices operates at the data link layer (Layer 2) of the OSI model?
a) Router
b) Switch
c) Firewall
d) Hub
Correct Answer: b) Switch
Explanation: Switches operate at Layer 2 (Data Link layer) of the OSI model and manage data flow between devices.
Question 03
What is the purpose of Network Address Translation (NAT) in a network?
a) To assign MAC addresses
b) To filter IP traffic
c) To translate private IP addresses into public IP addresses
d) To prevent routing loops
Correct Answer: c) To translate private IP addresses into public IP addresses
Explanation: NAT translates private IP addresses used in a local network into public IP addresses for internet communication.
Question 04
A technician needs to remotely manage a router securely. Which protocol should be used?
a) Telnet
b) FTP
c) SSH
d) SNMP
Correct Answer: c) SSH
Explanation: SSH (Secure Shell) provides secure remote management of network devices, including routers.
Question 05
Which of the following addresses is used for broadcast traffic within a local subnet?
a) 192.168.1.1
b) 127.0.0.1
c) 0.0.0.0
d) 255.255.255.255
Correct Answer: d) 255.255.255.255
Explanation: 255.255.255.255 is the broadcast address for sending traffic to all devices within the local subnet.
Question 06
What type of attack involves overwhelming a network or system with excessive traffic to cause service disruption?
a) Phishing
b) Man-in-the-middle
c) DDoS
d) Spoofing
Correct Answer: c) DDoS
Explanation: DDoS (Distributed Denial of Service) attacks involve overwhelming a network or system with traffic to cause service outages.
Question 07
Which protocol is used to securely transfer files between a client and server?
a) FTP
b) TFTP
c) SFTP
d) POP3
Correct Answer: c) SFTP
Explanation: SFTP (Secure File Transfer Protocol) is used to transfer files securely over a network.
Question 08
A network administrator needs to monitor network traffic in real time. Which tool should be used?
a) Wireshark
b) nslookup
c) traceroute
d) ping
Correct Answer: a) Wireshark
Explanation: Wireshark is a tool used to capture and analyze network traffic in real time.
Question 09
What is the maximum number of usable host addresses in a subnet with a subnet mask of 255.255.255.240 (/28)?
a) 14
b) 16
c) 30
d) 62
Correct Answer: a) 14
Explanation: A /28 subnet allows for 16 addresses, but 2 addresses are reserved for network and broadcast, leaving 14 usable host addresses.
Question 10
Which protocol is used to provide email retrieval from a remote server?
a) SMTP
b) IMAP
c) FTP
d) DHCP
Correct Answer: b) IMAP
Explanation: IMAP (Internet Message Access Protocol) allows users to retrieve email from a remote server while keeping the messages on the server.
Question 11
What feature of routers enables the connection between two or more different IP networks?
a) Switching
b) NAT
c) Routing
d) VLAN
Correct Answer: c) Routing
Explanation: Routers connect multiple IP networks by determining the best path for data packets to travel.
Question 12
Which of the following wireless security protocols is considered the weakest and should not be used?
a) WPA2
b) WPA3
c) WEP
d) 802.1x
Correct Answer: c) WEP
Explanation: WEP (Wired Equivalent Privacy) is an outdated and insecure wireless encryption protocol.
Question 13
Which type of address is used to communicate with all devices on a local network?
a) Unicast
b) Multicast
c) Broadcast
d) Anycast
Correct Answer: c) Broadcast
Explanation: A broadcast address is used to send traffic to all devices on the local network.
Question 14
What type of cable is commonly used for high-speed data transfer over long distances?
a) Coaxial
b) Fiber optic
c) Twisted pair
d) Serial
Correct Answer: b) Fiber optic
Explanation: Fiber optic cables are commonly used for long-distance, high-speed data transfer due to their immunity to electromagnetic interference.
Question 15
Which of the following is a primary function of a firewall?
a) Assigning IP addresses
b) Filtering network traffic
c) Monitoring performance
d) Encrypting data
Correct Answer: b) Filtering network traffic
Explanation: Firewalls filter incoming and outgoing network traffic based on security rules.
Question 16
What device is used to extend a network segment and reduce the number of collision domains?
a) Switch
b) Repeater
c) Bridge
d) Hub
Correct Answer: c) Bridge
Explanation: Bridges are used to divide network segments, reducing the number of collisions by creating separate collision domains.
Question 17
Which of the following IP addresses is reserved for a loopback test?
a) 192.168.1.1
b) 10.0.0.1
c) 127.0.0.1
d) 0.0.0.0
Correct Answer: c) 127.0.0.1
Explanation: The loopback address 127.0.0.1 is used for testing network interfaces on a local device.
Question 18
Which protocol allows multiple devices to share a single IP address when connecting to the internet?
a) DHCP
b) DNS
c) NAT
d) SNMP
Correct Answer: c) NAT
Explanation: NAT (Network Address Translation) allows multiple devices on a local network to share a single public IP address.
Question 19
What is the purpose of VLANs in a network?
a) To provide internet access
b) To create multiple physical networks
c) To divide a network into logical segments
d) To route traffic between different networks
Correct Answer: c) To divide a network into logical segments
Explanation: VLANs (Virtual Local Area Networks) allow network administrators to segment a network logically, even if devices share the same physical infrastructure.
Question 20
A network administrator wants to prevent unauthorized access to network devices. Which authentication method should be used?
a) LDAP
b) SNMP
c) HTTP
d) Telnet
Correct Answer: a) LDAP
Explanation: LDAP (Lightweight Directory Access Protocol) is commonly used for authenticating users and devices in a network.