-
web.groovymark@gmail.com
- November 18, 2024
Question 21
What does APIPA stand for, and what is its purpose?
a) Automatic Public IP Addressing, assigns public IP addresses
b) Automatic Private IP Addressing, assigns an IP address when DHCP fails
c) Advanced Protocol Internet Assignment, encrypts data traffic
d) Automatic Packet IP Assignment, manages data transmission
Correct Answer: b) Automatic Private IP Addressing, assigns an IP address when DHCP fails
Explanation: APIPA is a feature that assigns a local IP address from a reserved range when a DHCP server cannot be reached, allowing basic network communication.
Question 22
What does SNMP (Simple Network Management Protocol) enable?
a) Dynamic IP address assignment
b) Centralized management and monitoring of network devices
c) Encryption of data packets
d) Direct access to network servers
Correct Answer: b) Centralized management and monitoring of network devices
Explanation: SNMP allows network administrators to manage and monitor network devices such as switches, routers, and servers from a central location.
Question 23
What is the purpose of an SSL (Secure Sockets Layer) certificate?
a) To encrypt data transmitted between a web server and a client
b) To assign IP addresses to devices on a network
c) To filter traffic based on security rules
d) To resolve domain names to IP addresses
Correct Answer: a) To encrypt data transmitted between a web server and a client
Explanation: SSL certificates provide encryption to secure communication between a client (e.g., a web browser) and a server, protecting sensitive information like passwords.
Question 24
Which device creates separate collision domains within a network?
a) Repeater
b) Router
c) Switch
d) Hub
Correct Answer: c) Switch
Explanation: A switch operates at Layer 2 of the OSI model and creates separate collision domains for each connected device, improving network efficiency and reducing data collisions.
Question 25
What does WPA2 use to enhance wireless network security?
a) WEP encryption
b) AES encryption
c) DES encryption
d) SSL encryption
Correct Answer: b) AES encryption
Explanation: WPA2 uses Advanced Encryption Standard (AES), a more secure encryption method compared to WEP, to protect wireless network communications.
Question 26
Which protocol is commonly used for transferring large files between computers?
a) HTTP
b) SMTP
c) FTP
d) IMAP
Correct Answer: c) FTP
Explanation: File Transfer Protocol (FTP) is commonly used to transfer large files between computers over a network.
Question 27
Which backup method only backs up data that has changed since the last full or incremental backup?
a) Full backup
b) Incremental backup
c) Differential backup
d) Mirror backup
Correct Answer: b) Incremental backup
Explanation: Incremental backups only save data that has changed since the last backup (either full or incremental), making them faster and more efficient than full backups.
Question 28
What is the primary function of the transport layer in the OSI model?
a) To manage data flow between networks
b) To ensure reliable data transfer between devices
c) To assign IP addresses to devices
d) To encrypt data packets for secure transmission
Correct Answer: b) To ensure reliable data transfer between devices
Explanation: The transport layer (Layer 4) is responsible for reliable data transfer, managing error correction, and packet sequencing between devices.
Question 29
Which address type is used by routers to deliver packets to multiple destinations at once?
a) Unicast address
b) Multicast address
c) Anycast address
d) Broadcast address
Correct Answer: b) Multicast address
Explanation: Multicast addresses allow routers to send packets to multiple specific destinations simultaneously, improving network efficiency in scenarios like video streaming.
Question 30
What is a “cold spare” in network hardware?
a) A backup device that is always powered on and ready to replace a failed component
b) A backup device that is stored and used only when needed
c) A device used to amplify network signals
d) A spare switch that is automatically used in case of failure
Correct Answer: b) A backup device that is stored and used only when needed
Explanation: A cold spare is a backup device that is kept in storage and only used when needed to replace a failed component.
Question 31
What type of network device is responsible for assigning IP addresses to devices on a network?
a) Router
b) DHCP server
c) Switch
d) Hub
Correct Answer: b) DHCP server
Explanation: A DHCP server automatically assigns IP addresses to devices on a network, simplifying network management.
Question 32
What does the presentation layer of the OSI model handle?
a) Physical transmission of data
b) Error correction and flow control
c) Data encryption and formatting for the application layer
d) Network routing and addressing
Correct Answer: c) Data encryption and formatting for the application layer
Explanation: The presentation layer (Layer 6) ensures data is properly formatted, encrypted, and compressed before it is passed to the application layer.
Question 33
What is a common method of authenticating users in network security?
a) MAC filtering
b) Kerberos
c) DNS resolution
d) SNMP
Correct Answer: b) Kerberos
Explanation: Kerberos is a network authentication protocol that uses tickets and encryption to securely authenticate users on a network.
Question 34
Which protocol is used to resolve IP addresses to MAC addresses?
a) DNS
b) DHCP
c) ARP
d) ICMP
Correct Answer: c) ARP
Explanation: The Address Resolution Protocol (ARP) is used to resolve IP addresses to MAC addresses, allowing devices to communicate on a local network.
Question 35
What is the primary purpose of a firewall in network security?
a) To encrypt all network traffic
b) To filter incoming and outgoing traffic based on predefined rules
c) To assign IP addresses to devices on a network
d) To amplify network signals
Correct Answer: b) To filter incoming and outgoing traffic based on predefined rules
Explanation: A firewall filters network traffic to prevent unauthorized access and protect the network from external threats.
Question 36
What is the function of an IDS (Intrusion Detection System)?
a) To detect unauthorized access or malicious activity in a network
b) To assign IP addresses to devices
c) To block unwanted traffic from entering the network
d) To encrypt data transmissions
Correct Answer: a) To detect unauthorized access or malicious activity in a network
Explanation: An IDS monitors network traffic for suspicious activity, alerting administrators if unauthorized access or attacks are detected.
Question 37
What does the acronym SSH stand for?
a) Secure Shell
b) Secure Hyperlink
c) Simple Shell
d) Secure HTTP
Correct Answer: a) Secure Shell
Explanation: SSH stands for Secure Shell, a protocol used to securely access and manage remote systems over a network.
Question 38
What does MTU (Maximum Transmission Unit) refer to in networking?
a) The maximum amount of data that can be transmitted per second
b) The largest size of a data packet that can be transmitted
c) The number of devices that can be connected to a network
d) The maximum number of hops in a network
Correct Answer: b) The largest size of a data packet that can be transmitted
Explanation: The MTU is the maximum size of a data packet that can be transmitted over a network, impacting network efficiency and performance.
Question 39
What is a VLAN used for in network management?
a) To encrypt data packets for secure transmission
b) To logically segment a network into smaller parts
c) To assign IP addresses dynamically
d) To amplify wireless network signals
Correct Answer: b) To logically segment a network into smaller parts
Explanation: A VLAN allows a network to be divided into separate segments, improving security and traffic management without requiring physical separation.
Question 40
Which protocol is used to send email from a client to a server?
a) SMTP
b) IMAP
c) FTP
d) HTTP
Correct Answer: a) SMTP
Explanation: Simple Mail Transfer Protocol (SMTP) is used for sending email from a client to an email server and for server-to-server email transmission.