Which protocol is used to stream real-time voice and video over IP networks?
a) RTP b) FTP c) SMTP d) POP
Correct Answer: a) RTP
Explanation: Real-Time Transport Protocol (RTP) is designed to transmit real-time voice, video, and multimedia data over IP networks.
Question 42
What type of attack involves the use of IP spoofing to flood a network with traffic?
a) Man-in-the-middle attack b) Phishing attack c) Smurf attack d) Replay attack
Correct Answer: c) Smurf attack
Explanation: A Smurf attack uses IP spoofing to send ICMP packets to a broadcast address, overwhelming the network with traffic.
Question 43
What is a typical use of the DMZ (demilitarized zone) in network security?
a) To connect multiple VLANs b) To isolate publicly accessible servers from the internal network c) To provide dynamic IP addressing d) To assign user permissions in Active Directory
Correct Answer: b) To isolate publicly accessible servers from the internal network
Explanation: A DMZ is a network segment that contains systems accessible from the internet, separating them from the internal, private network for security purposes.
Question 44
What is the role of WINS (Windows Internet Naming Service)?
a) It assigns IP addresses automatically b) It maps NetBIOS names to IP addresses c) It encrypts network traffic for secure communication d) It provides VLAN tagging on a network
Correct Answer: b) It maps NetBIOS names to IP addresses
Explanation: WINS resolves NetBIOS names to IP addresses, enabling older systems that use NetBIOS to communicate on modern IP-based networks.
Question 45
What type of signal does fiber-optic cabling transmit?
a) Analog signals b) Radio waves c) Electromagnetic waves d) Light signals
Correct Answer: d) Light signals
Explanation: Fiber-optic cables use light signals to transmit data over long distances at high speeds, making them less prone to interference than copper-based cables.
Question 46
Which wireless security protocol is considered the most secure?
a) WEP b) WPA c) WPA2 d) SSID
Correct Answer: c) WPA2
Explanation: WPA2 is the most secure of the common wireless security protocols, using stronger encryption methods than WEP and WPA.
Question 47
What is the purpose of a VLAN trunk?
a) To connect multiple VLANs together b) To connect wireless devices to the network c) To amplify weak signals d) To encrypt network traffic between VLANs
Correct Answer: a) To connect multiple VLANs together
Explanation: A VLAN trunk connects multiple VLANs over a single physical link, allowing VLAN traffic to pass between network devices.
Question 48
Which tool is used to terminate twisted-pair cabling in a network?
a) Crimping tool b) Punch down tool c) Wire stripper d) Multimeter
Correct Answer: b) Punch down tool
Explanation: A punch down tool is used to insert and secure twisted-pair wires into network terminations, such as patch panels and keystone jacks.
Question 49
What does the term “biometrics” refer to in network security?
a) The use of physical characteristics for authentication b) The use of encryption to secure data c) The use of passwords and PINs for authentication d) The monitoring of network traffic for security purposes
Correct Answer: a) The use of physical characteristics for authentication
Explanation: Biometrics refers to using unique physical traits, such as fingerprints or facial recognition, to verify identity in security systems.
Question 50
What type of network is usually confined to a single building and managed by a single entity?
a) WAN b) MAN c) LAN d) PAN
Correct Answer: c) LAN
Explanation: A local area network (LAN) is typically confined to a single building or location and is managed by a single organization, connecting computers and devices within that space.