-
web.groovymark@gmail.com
- November 19, 2024
Question 21
At what OSI Layer are most LAN and WAN protocols defined?
a) Layer 1
b) Layer 2
c) Layer 3
d) Layer 7
Correct Answer: b) Layer 2
Explanation: Most LAN and WAN protocols are defined at Layer 2 (Data Link layer), where the protocols handle the physical addressing and error checking.
Question 22
Which cellular technology is widely implemented across the globe?
a) CDMA
b) TDMA
c) GSM
d) LTE
Correct Answer: c) GSM
Explanation: GSM (Global System for Mobile Communications) is the most widely used cellular technology worldwide.
Question 23
Which type of DNS record is used for spam control?
a) A record
b) MX record
c) CNAME record
d) TXT record
Correct Answer: d) TXT record
Explanation: TXT records are used in DNS to store text information, including SPF and DKIM records for email spam control.
Question 24
What do you configure in DHCP to add the address of the default gateway and DNS server?
a) Lease options
b) Server options
c) Scope options
d) Client options
Correct Answer: c) Scope options
Explanation: In DHCP, scope options are used to define parameters such as the default gateway and DNS server for clients in the specified scope.
Question 25
What connector type is used for ordinary telephone cables?
a) RJ-11
b) RJ-45
c) BNC
d) DB-9
Correct Answer: a) RJ-11
Explanation: RJ-11 connectors are commonly used for telephone lines, while RJ-45 is used for Ethernet cables.
Question 26
Which twisted pair cable category is a cheaper alternative to using CAT 6?
a) CAT 3
b) CAT 5e
c) CAT 7
d) CAT 8
Correct Answer: b) CAT 5e
Explanation: CAT 5e is a cost-effective alternative to CAT 6 for most network installations, providing support for gigabit speeds over shorter distances.
Question 27
What is a generic network term that can either refer to a software switch or any device that connects dissimilar network segments?
a) Switch
b) Router
c) Bridge
d) Gateway
Correct Answer: c) Bridge
Explanation: A bridge is a network device used to connect different network segments, either in hardware or software.
Question 28
RADIUS, TACACS, and TACACS+ are all examples of what type of security system?
a) Intrusion detection
b) Authorization
c) Authentication
d) Accounting
Correct Answer: c) Authentication
Explanation: RADIUS, TACACS, and TACACS+ are used for centralized authentication services in networks.
Question 29
What is the name for the thin layer that sits between the hardware and operating system and controls the virtual environment?
a) Hypervisor
b) Container
c) Kernel
d) Emulator
Correct Answer: a) Hypervisor
Explanation: A hypervisor is software that allows multiple virtual machines to run on a single physical host by abstracting the underlying hardware.
Question 30
How many B and D channels does Primary Rate Interface (PRI) ISDN have?
a) 23 B, 1 D
b) 30 B, 1 D
c) 10 B, 2 D
d) 16 B, 1 D
Correct Answer: a) 23 B, 1 D
Explanation: PRI ISDN provides 23 B channels for data and 1 D channel for signaling, commonly used in T1 lines.
Question 31
What type of demarc allows a telco to conduct remote diagnostics on your phone line?
a) Smart jack
b) Punch-down block
c) Patch panel
d) Cross-connect
Correct Answer: a) Smart jack
Explanation: A smart jack is a type of demarcation point that allows remote diagnostics and troubleshooting by the service provider.
Question 32
What type of diagram shows the placement of devices in an equipment rack?
a) Topology diagram
b) Floor plan diagram
c) Rack diagram
d) Network diagram
Correct Answer: c) Rack diagram
Explanation: A rack diagram illustrates the arrangement and placement of devices in a network equipment rack.
Question 33
What term refers to the expected time for a device or system to be back in service after a failure?
a) Mean Time to Repair (MTTR)
b) Mean Time Between Failures (MTBF)
c) Recovery Point Objective (RPO)
d) Service Level Agreement (SLA)
Correct Answer: a) Mean Time to Repair (MTTR)
Explanation: MTTR refers to the average time it takes to repair a device or system after it fails.
Question 34
What type of security system examines the logs of many network devices, looking for event correlation and trends?
a) Intrusion Detection System (IDS)
b) Security Information and Event Management (SIEM)
c) Network Access Control (NAC)
d) Data Loss Prevention (DLP)
Correct Answer: b) Security Information and Event Management (SIEM)
Explanation: SIEM systems aggregate and analyze logs from various network devices to identify potential security threats.
Question 35
A site-to-site VPN between two routers typically uses which VPN protocol?
a) L2TP
b) IPSEC
c) SSL
d) PPTP
Correct Answer: b) IPSEC
Explanation: IPSEC is the most commonly used protocol for establishing secure site-to-site VPNs between routers.
Question 36
Uncontrolled use of proprietary software can lead to what type of violations?
a) Bandwidth violations
b) Service Level violations
c) Licensing restrictions
d) Firewall violations
Correct Answer: c) Licensing restrictions
Explanation: Uncontrolled use of proprietary software can violate licensing agreements, leading to legal and financial penalties.
Question 37
Traditional biometrics (something you are) have been extending to include what authentication factor?
a) Something you know
b) Something you do
c) Something you have
d) Something you read
Correct Answer: b) Something you do
Explanation: Biometric authentication has evolved to include "something you do," such as behavioral biometrics like typing patterns or gait.
Question 38
What two encryption protocols are used in WPA2?
a) TKIP and WEP
b) AES and CCMP
c) DES and RC4
d) RSA and SHA
Correct Answer: b) AES and CCMP
Explanation: WPA2 uses AES (Advanced Encryption Standard) for encryption and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) for message integrity.
Question 39
What key management protocol was introduced in WPA?
a) AES
b) TKIP
c) CCMP
d) IPSec
Correct Answer: b) TKIP
Explanation: TKIP (Temporal Key Integrity Protocol) was introduced in WPA to improve encryption key management and address weaknesses in WEP.
Question 40
What type of attack replaces good ARP cache entries with malicious ones?
a) DNS spoofing
b) ARP poisoning/spoofing
c) Man-in-the-middle attack
d) Buffer overflow
Correct Answer: b) ARP poisoning/spoofing
Explanation: ARP poisoning/spoofing involves sending false ARP messages to a network, causing incorrect IP-to-MAC address mappings in the ARP cache.