- web.groovymark@gmail.com
- November 19, 2024
Question 01
What protocol provides secure, encrypted communication over an insecure network, often used for remote management of devices?
a) FTP
b) SSH
c) Telnet
d) SNMP
Correct Answer: b) SSH
Explanation: SSH (Secure Shell) is a protocol that provides secure, encrypted communication over an insecure network and is often used for remote management of devices.
Question 02
Which command on a Cisco router is used to display the current IP routing table?
a) show ip route
b) show running-config
c) show interfaces
d) show protocol
Correct Answer: a) show ip route
Explanation: The show ip route command displays the current IP routing table on a Cisco router, showing the routes configured and available.
Question 03
What does the acronym MTTR stand for in network management?
a) Mean Time to Repair
b) Maximum Transmission Time Response
c) Mean Total Traffic Routing
d) Managed Transmission Throughput Rate
Correct Answer: a) Mean Time to Repair
Explanation: MTTR (Mean Time to Repair) refers to the average time required to repair a failed component or device in a network or system.
Question 04
Which routing protocol uses a hop count as its metric and is limited to 15 hops?
a) OSPF
b) EIGRP
c) RIP
d) BGP
Correct Answer: c) RIP
Explanation: RIP (Routing Information Protocol) uses hop count as its metric and is limited to a maximum of 15 hops to prevent routing loops.
Question 05
What is the primary function of a proxy server in a network?
a) Route data between subnets
b) Provide a direct connection to the internet
c) Act on behalf of a client to request services from another server
d) Manage network security policies
Correct Answer: c) Act on behalf of a client to request services from another server
Explanation: A proxy server acts as an intermediary between a client and a server, forwarding client requests to other servers.
Question 06
Which OSI layer is responsible for establishing, managing, and terminating sessions between devices?
a) Application layer
b) Presentation layer
c) Session layer
d) Transport layer
Correct Answer: c) Session layer
Explanation: The Session layer (Layer 5) is responsible for establishing, managing, and terminating sessions between devices.
Question 07
What type of wireless attack involves setting up a rogue access point that appears legitimate to users?
a) Evil twin
b) Man-in-the-middle
c) Wardriving
d) Packet sniffing
Correct Answer: a) Evil twin
Explanation: An evil twin attack involves setting up a rogue access point that mimics a legitimate one, tricking users into connecting to it.
Question 08
Which type of network topology provides redundancy by connecting each node to every other node in the network?
a) Star
b) Mesh
c) Bus
d) Ring
Correct Answer: b) Mesh
Explanation: A mesh topology provides redundancy by connecting each node to every other node in the network, ensuring multiple paths for data transmission.
Question 09
Which network device operates at the OSI Network layer and is responsible for routing traffic between different networks?
a) Hub
b) Switch
c) Router
d) Bridge
Correct Answer: c) Router
Explanation: A router operates at the OSI Network layer (Layer 3) and is responsible for routing traffic between different networks based on IP addresses.
Question 10
What command is used on a Windows machine to display the current IP address configuration, including the default gateway?
a) traceroute
b) netstat
c) ipconfig
d) ifconfig
Correct Answer: c) ipconfig
Explanation: The ipconfig command on a Windows machine displays the current IP address configuration, including the default gateway.
Question 11
What type of wireless security protocol is considered outdated due to vulnerabilities and has been replaced by WPA and WPA2?
a) WEP
b) WPA
c) WPA2
d) TKIP
Correct Answer: a) WEP
Explanation: WEP (Wired Equivalent Privacy) is considered outdated due to significant vulnerabilities and has been replaced by more secure protocols like WPA and WPA2.
Question 12
Which protocol is responsible for managing network devices and gathering statistics about network performance?
a) SNMP
b) ICMP
c) FTP
d) DHCP
Correct Answer: a) SNMP
Explanation: SNMP (Simple Network Management Protocol) is used to manage network devices and gather performance statistics such as bandwidth usage and error rates.
Question 13
What is the purpose of a VLAN on a network switch?
a) To increase bandwidth
b) To separate logical network segments on the same physical network
c) To provide network redundancy
d) To manage IP address assignments
Correct Answer: b) To separate logical network segments on the same physical network
Explanation: A VLAN (Virtual Local Area Network) separates logical network segments on the same physical network, improving security and traffic management.
Question 14
Which DNS record type is used to reverse-map an IP address to a domain name?
a) A record
b) PTR record
c) CNAME record
d) MX record
Correct Answer: b) PTR record
Explanation: A PTR (Pointer) record is used in DNS to reverse-map an IP address to its corresponding domain name.
Question 15
What is the primary purpose of a firewall in a network?
a) To route traffic between networks
b) To provide encryption for network communications
c) To filter incoming and outgoing traffic based on security rules
d) To manage IP address assignments
Correct Answer: c) To filter incoming and outgoing traffic based on security rules
Explanation: A firewall filters incoming and outgoing traffic based on security rules, protecting the network from unauthorized access and attacks.
Question 16
Which command displays the routing table on a Linux system?
a) traceroute
b) route
c) netstat
d) ifconfig
Correct Answer: b) route
Explanation: The route command displays the routing table on a Linux system, showing the routes that the system uses to forward network traffic.
Question 17
What is the name of the protocol that maps an IP address to a MAC address on a local network?
a) ARP
b) DHCP
c) DNS
d) ICMP
Correct Answer: a) ARP
Explanation: ARP (Address Resolution Protocol) is used to map an IP address to a MAC address on a local network.
Question 18
Which OSI layer is responsible for data encryption and decryption, ensuring secure transmission of data between applications?
a) Network layer
b) Data Link layer
c) Presentation layer
d) Session layer
Correct Answer: c) Presentation layer
Explanation: The Presentation layer (Layer 6) is responsible for data encryption and decryption, ensuring secure transmission of data between applications.
Question 19
What command is used on a Linux system to display the current IP address configuration?
a) ifconfig
b) ipconfig
c) traceroute
d) netstat
Correct Answer: a) ifconfig
Explanation: The ifconfig command is used on Linux systems to display the current IP address configuration for network interfaces.
Question 20
Which of the following is an example of a tunneling protocol used to create secure connections over a public network?
a) HTTP
b) SSL
c) VPN
d) DNS
Correct Answer: c) VPN
Explanation: VPN (Virtual Private Network) uses tunneling protocols like PPTP, L2TP, or IPsec to create secure connections over a public network like the internet.