-
web.groovymark@gmail.com
- November 19, 2024
Question 21
What is the function of NAT in a network?
a) Assign IP addresses to devices
b) Translate private IP addresses to public IP addresses
c) Route traffic between networks
d) Encrypt network traffic
Correct Answer: b) Translate private IP addresses to public IP addresses
Explanation: NAT (Network Address Translation) translates private IP addresses to public IP addresses, allowing devices on a private network to communicate with the internet.
Question 22
Which protocol uses port 53 to provide name resolution services?
a) HTTP
b) FTP
c) DNS
d) Telnet
Correct Answer: c) DNS
Explanation: DNS (Domain Name System) uses port 53 to provide name resolution services, translating domain names into IP addresses.
Question 23
What type of attack occurs when an attacker sends falsified ARP messages to the network, causing traffic to be misdirected?
a) DNS poisoning
b) ARP poisoning
c) Man-in-the-middle
d) Phishing
Correct Answer: b) ARP poisoning
Explanation: ARP poisoning occurs when an attacker sends falsified ARP messages to the network, causing traffic to be misdirected to the attacker’s machine.
Question 24
Which OSI layer is responsible for controlling how data is transmitted over the physical medium, including framing and error detection?
a) Data Link layer
b) Network layer
c) Transport layer
d) Physical layer
Correct Answer: a) Data Link layer
Explanation: The Data Link layer (Layer 2) is responsible for controlling how data is transmitted over the physical medium, including framing and error detection.
Question 25
Which wireless security protocol is considered the most secure for protecting Wi-Fi networks?
a) WEP
b) WPA
c) WPA2
d) TKIP
Correct Answer: c) WPA2
Explanation: WPA2 (Wi-Fi Protected Access 2) is considered the most secure wireless security protocol and is recommended for protecting Wi-Fi networks.
Question 26
What command is used to display all active network connections and listening ports on a Linux machine?
a) ifconfig
b) traceroute
c) netstat
d) ping
Correct Answer: c) netstat
Explanation: The netstat command displays all active network connections and listening ports on a Linux machine, providing information about network activity.
Question 27
Which protocol is used by the ping command to test network connectivity between devices?
a) ICMP
b) TCP
c) UDP
d) DNS
Correct Answer: a) ICMP
Explanation: The ping command uses ICMP (Internet Control Message Protocol) to send echo requests and receive echo replies to test network connectivity between devices.
Question 28
What is the main purpose of a load balancer in a network?
a) To provide firewall protection
b) To assign IP addresses to devices
c) To distribute network traffic across multiple servers
d) To encrypt network communications
Correct Answer: c) To distribute network traffic across multiple servers
Explanation: A load balancer distributes network traffic across multiple servers to improve performance and prevent any single server from being overwhelmed.
Question 29
Which type of DNS query is typically sent by a DNS resolver to request the best possible answer without expecting further queries?
a) Recursive query
b) Iterative query
c) Reverse query
d) Dynamic query
Correct Answer: b) Iterative query
Explanation: In an iterative query, the DNS resolver asks the server to return the best possible answer, which may include referrals to other DNS servers if needed.
Question 30
Which routing protocol uses the concept of areas to optimize routing efficiency and reduce overhead in large networks?
a) OSPF
b) RIP
c) EIGRP
d) BGP
Correct Answer: a) OSPF
Explanation: OSPF (Open Shortest Path First) uses the concept of areas to optimize routing efficiency and reduce overhead in large networks.
Question 31
Which device is used to connect multiple network segments, manage traffic, and reduce collisions in a network?
a) Hub
b) Repeater
c) Switch
d) Router
Correct Answer: c) Switch
Explanation: A switch connects multiple network segments, manages traffic, and reduces collisions by forwarding frames only to the intended recipient based on MAC addresses.
Question 32
What is the maximum number of hops allowed in the RIP protocol to prevent routing loops?
a) 10
b) 15
c) 20
d) 25
Correct Answer: b) 15
Explanation: The maximum number of hops allowed in the RIP (Routing Information Protocol) is 15 to prevent routing loops and keep networks efficient.
Question 33
What type of device acts as an intermediary between a client and a server, handling requests on behalf of the client?
a) Router
b) Firewall
c) Proxy server
d) Switch
Correct Answer: c) Proxy server
Explanation: A proxy server acts as an intermediary between a client and a server, forwarding client requests to the server and returning responses to the client.
Question 34
Which wireless transmission type does NOT require a clear line of sight (LOS) to function?
a) Wi-Fi
b) Infrared
c) Microwave
d) Satellite
Correct Answer: a) Wi-Fi
Explanation: Wi-Fi does not require a clear line of sight (LOS) to function and can transmit data through walls and other obstacles.
Question 35
What does the acronym DHCP stand for, and what is its primary function?
a) Domain Host Configuration Protocol, used for resolving domain names
b) Dynamic Host Configuration Protocol, used for assigning IP addresses
c) Data Host Control Protocol, used for managing data traffic
d) Domain Handler Communication Protocol, used for email transmission
Correct Answer: b) Dynamic Host Configuration Protocol, used for assigning IP addresses
Explanation: DHCP (Dynamic Host Configuration Protocol) is used for dynamically assigning IP addresses and other network configuration settings to devices.
Question 36
Which network protocol is used to secure web communications by encrypting traffic between a web server and a browser?
a) HTTP
b) FTP
c) HTTPS
d) Telnet
Correct Answer: c) HTTPS
Explanation: HTTPS (Hypertext Transfer Protocol Secure) encrypts web traffic between a web server and a browser, ensuring secure communication.
Question 37
Which command on a Cisco router is used to save the current running configuration to NVRAM?
a) copy running-config startup-config
b) copy running-config flash
c) save config tftp
d) write memory
Correct Answer: a) copy running-config startup-config
Explanation: The copy running-config startup-config command saves the current running configuration to NVRAM on a Cisco router, ensuring it persists after a reboot.
Question 38
What is the primary purpose of using load balancing in a network environment?
a) To encrypt data between servers
b) To distribute traffic across multiple servers
c) To provide IP address resolution
d) To manage VLAN configurations
Correct Answer: b) To distribute traffic across multiple servers
Explanation: Load balancing distributes network traffic across multiple servers to ensure that no single server is overwhelmed and to improve overall network performance.
Question 39
Which protocol allows multiple hosts on a local network to communicate over a single public IP address?
a) DNS
b) NAT
c) DHCP
d) ICMP
Correct Answer: b) NAT
Explanation: NAT (Network Address Translation) allows multiple hosts on a private network to share a single public IP address when communicating with external networks
Question 40
Which network security protocol provides encrypted communication over a network and is commonly used for secure remote logins?
a) Telnet
b) FTP
c) SSH
d) SMTP
Correct Answer: c) SSH
Explanation: SSH (Secure Shell) provides encrypted communication over a network and is commonly used for secure remote logins to devices.