- web.groovymark@gmail.com
- November 18, 2024
Question 01
What does a switch primarily do in a network?
a) Amplifies network signals
b) Filters and forwards data packets based on MAC addresses
c) Assigns IP addresses to devices
d) Encrypts data traffic for secure transmission
Correct Answer: b) Filters and forwards data packets based on MAC addresses
Explanation: A switch operates at Layer 2 of the OSI model and uses MAC addresses to filter and forward data to the appropriate device within a network.
Question 02
Which type of topology connects each network device to every other network device?
a) Star topology
b) Mesh topology
c) Bus topology
d) Ring topology
Correct Answer: b) Mesh topology
Explanation: In a mesh topology, each device is connected to every other device in the network, providing high redundancy and fault tolerance.
Question 03
What is the function of a UPS (Uninterruptible Power Supply)?
a) To regulate network traffic
b) To supply electrical power to a network during a power outage
c) To assign IP addresses to devices on a network
d) To amplify weak signals in a network
Correct Answer: b) To supply electrical power to a network during a power outage
Explanation: A UPS provides backup power in the event of a power failure, ensuring critical systems remain operational during short outages.
Question 04
Which protocol provides a secure method of accessing a remote computer over a network?
a) Telnet
b) SSH
c) HTTP
d) FTP
Correct Answer: b) SSH
Explanation: Secure Shell (SSH) provides a secure method for accessing remote systems over a network by encrypting communication, unlike Telnet, which is not secure.
Question 05
What is the primary use of a “punch down tool”?
a) To crimp RJ-45 connectors
b) To insert twisted-pair cables into network terminations
c) To test network cable continuity
d) To strip the insulation from network cables
Correct Answer: b) To insert twisted-pair cables into network terminations
Explanation: A punch down tool is used to securely connect twisted-pair wires into patch panels and keystone jacks, ensuring a proper connection.
Question 06
What does MAC address filtering do in network security?
a) It filters data packets based on IP addresses
b) It restricts network access based on the MAC address of a device
c) It encrypts data transmissions to prevent unauthorized access
d) It assigns IP addresses dynamically
Correct Answer: b) It restricts network access based on the MAC address of a device
Explanation: MAC address filtering is a security feature that allows or blocks devices from accessing the network based on their unique physical MAC address.
Question 07
What is the primary benefit of using VLANs (Virtual Local Area Networks)?
a) They increase the range of wireless signals
b) They allow logical segmentation of a network, improving security and management
c) They encrypt data to prevent unauthorized access
d) They automatically assign IP addresses to devices
Correct Answer: b) They allow logical segmentation of a network, improving security and management
Explanation: VLANs allow administrators to segment a physical network into multiple logical networks, enhancing security and simplifying network management.
Question 08
What does the acronym FTP stand for?
a) File Transport Protocol
b) File Transfer Protocol
c) Fast Transmission Protocol
d) File Transmission Path
Correct Answer: b) File Transfer Protocol
Explanation: FTP stands for File Transfer Protocol, a standard network protocol used to transfer files between a client and a server over a network.
Question 09
What is the primary function of a repeater in a network?
a) To route data between networks
b) To extend the range of a network by amplifying signals
c) To filter traffic based on IP addresses
d) To assign dynamic IP addresses
Correct Answer: b) To extend the range of a network by amplifying signals
Explanation: A repeater regenerates and amplifies signals to extend the distance data can travel over a network without signal degradation.
Question 10
Which OSI model layer is responsible for addressing and routing data between networks?
a) Data link layer
b) Transport layer
c) Network layer
d) Physical layer
Correct Answer: c) Network layer
Explanation: The network layer (Layer 3) is responsible for addressing and routing data packets between different networks using IP addresses.
Question 11
Which wireless security protocol is considered outdated and vulnerable to attacks?
a) WPA2
b) WPA
c) WEP
d) AES
Correct Answer: c) WEP
Explanation: WEP (Wired Equivalent Privacy) is an older wireless security protocol that has known vulnerabilities and is no longer considered secure.
Question 12
What does attenuation cause in a network cable?
a) Increased signal strength
b) Loss of signal strength over distance
c) Signal encryption for security
d) Improved network speed
Correct Answer: b) Loss of signal strength over distance
Explanation: Attenuation refers to the weakening of a signal as it travels over a long distance, reducing the effectiveness of data transmission.
Question 13
What is a man-in-the-middle attack?
a) An attack where data is intercepted and altered before reaching its destination
b) An attack that floods a network with excessive traffic
c) An attack where malware is installed on a computer
d) An attack that involves sending phishing emails
Correct Answer: a) An attack where data is intercepted and altered before reaching its destination
Explanation: A man-in-the-middle attack involves intercepting and potentially altering communications between two parties without their knowledge.
Question 14
What is the role of a Domain Name System (DNS)?
a) To assign IP addresses automatically
b) To resolve domain names to IP addresses
c) To filter network traffic based on security rules
d) To encrypt data transmissions
Correct Answer: b) To resolve domain names to IP addresses
Explanation: DNS translates human-readable domain names (e.g., www.example.com) into numerical IP addresses used for communication on the internet.
Question 15
What type of network uses radio waves to transmit data over short distances?
a) Local Area Network (LAN)
b) Wide Area Network (WAN)
c) Personal Area Network (PAN)
d) Virtual Private Network (VPN)
Correct Answer: c) Personal Area Network (PAN)
Explanation: A PAN typically uses technologies like Bluetooth to transmit data over short distances between personal devices such as smartphones, tablets, and laptops.
Question 16
Which type of firewall inspects the state of packets over a connection?
a) Stateless packet inspection firewall
b) Stateful packet inspection firewall
c) Proxy firewall
d) Application-layer firewall
Correct Answer: b) Stateful packet inspection firewall
Explanation: A stateful packet inspection firewall examines the state of each packet in the context of the ongoing connection, allowing it to filter traffic based on connection state and security rules.
Question 17
What does PoE (Power over Ethernet) allow network cables to do?
a) Transfer data faster over a wired connection
b) Provide power to devices like IP cameras or access points
c) Assign IP addresses dynamically
d) Increase the range of wireless signals
Correct Answer: b) Provide power to devices like IP cameras or access points
Explanation: PoE enables Ethernet cables to supply electrical power to devices such as IP cameras, wireless access points, and VoIP phones, eliminating the need for separate power cables.
Question 18
What is the purpose of a VLAN trunk?
a) To connect multiple VLANs using a single network link
b) To assign dynamic IP addresses to devices
c) To filter traffic based on MAC addresses
d) To encrypt wireless network signals
Correct Answer: a) To connect multiple VLANs using a single network link
Explanation: A VLAN trunk allows data from multiple VLANs to travel over a single network link between network devices like switches.
Question 19
Which device is typically used to amplify a weak signal in a fiber-optic network?
a) Switch
b) Repeater
c) Router
d) Bridge
Correct Answer: b) Repeater
Explanation: In fiber-optic networks, a repeater is used to amplify or regenerate weak signals, allowing data to travel longer distances without signal degradation.
Question 20
Which type of network topology uses a single cable to connect all devices?
a) Star topology
b) Ring topology
c) Mesh topology
d) Bus topology
Correct Answer: d) Bus topology
Explanation: A bus topology consists of a single central cable (the bus) to which all devices are connected, allowing data to travel along the cable to all devices.