- web.groovymark@gmail.com
- November 18, 2024
Question 01
What is the function of an ad hoc network?
a) It connects devices through a centralized access point
b) It allows devices to connect directly without a wireless access point
c) It encrypts wireless data transmission
d) It provides dynamic IP addresses for connected devices
Correct Answer: b) It allows devices to connect directly without a wireless access point
Explanation: In an ad hoc network, devices communicate directly with each other without using a centralized access point, often used for temporary or small-scale wireless networks.
Question 02
What type of device is used to protect a system from power spikes and surges?
a) Uninterruptible Power Supply (UPS)
b) Firewall
c) Surge protector
d) Modem
Correct Answer: c) Surge protector
Explanation: A surge protector shields electronic devices from voltage spikes by blocking or shorting to ground any unwanted voltage above a safe threshold.
Question 03
What does the term “backbone” refer to in networking?
a) A primary network cable that connects various segments of a network
b) A wireless signal booster
c) A firewall that protects a network
d) A device that resolves domain names to IP addresses
Correct Answer: a) A primary network cable that connects various segments of a network
Explanation: The backbone in a network refers to the main transmission path that connects various smaller segments of a network, often carrying large amounts of traffic.
Question 04
What does the acronym ISDN stand for?
a) Internet Standard Dial Network
b) Integrated Services Digital Network
c) Internet Services Data Network
d) International Standard Digital Network
Correct Answer: b) Integrated Services Digital Network
Explanation: ISDN stands for Integrated Services Digital Network, a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the public switched telephone network.
Question 05
What does a proxy server typically do?
a) Encrypts all outgoing network traffic
b) Acts as an intermediary between a client and a server for security purposes
c) Resolves domain names to IP addresses
d) Assigns dynamic IP addresses to network devices
Correct Answer: b) Acts as an intermediary between a client and a server for security purposes
Explanation: A proxy server serves as an intermediary between a client and another server, often used to improve security, control access, or cache content.
Question 06
Which network topology is characterized by each node being connected to every other node?
a) Star topology
b) Bus topology
c) Mesh topology
d) Ring topology
Correct Answer: c) Mesh topology
Explanation: In a mesh topology, every node connects to every other node, ensuring redundancy and providing multiple paths for data to travel through the network.
Question 07
What is the primary purpose of a firewall in a network?
a) To amplify weak network signals
b) To filter network traffic based on security rules
c) To assign IP addresses to devices on a network
d) To route data between networks
Correct Answer: b) To filter network traffic based on security rules
Explanation: A firewall monitors and controls incoming and outgoing network traffic based on predefined security rules, protecting the network from unauthorized access and threats.
Question 08
What does a MAC (Media Access Control) address uniquely identify?
a) A physical network interface device
b) An IP address assigned to a device
c) A protocol used to secure communications
d) A network topology
Correct Answer: a) A physical network interface device
Explanation: A MAC address is a unique identifier assigned to a network interface card (NIC) for communication at the data link layer of a network.
Question 09
What is a demilitarized zone (DMZ) in network security?
a) A wireless network protected by encryption
b) A network segment that isolates public-facing servers from the internal network
c) A protocol used to secure remote connections
d) A backup system that automatically takes over in case of failure
Correct Answer: b) A network segment that isolates public-facing servers from the internal network
Explanation: A DMZ is a section of a network that contains publicly accessible resources, such as web servers, while keeping them isolated from the internal network for security reasons.
Question 10
Which protocol is used to map a MAC address to an IP address?
a) DNS
b) ARP
c) DHCP
d) FTP
Correct Answer: b) ARP
Explanation: Address Resolution Protocol (ARP) is used to map an IP address to the corresponding MAC address, enabling devices on a network to communicate.
Question 11
What is attenuation in networking?
a) The strengthening of a signal over distance
b) The encryption of data for secure transmission
c) The loss of signal strength over distance
d) The interference caused by electromagnetic waves
Correct Answer: c) The loss of signal strength over distance
Explanation: Attenuation refers to the reduction in signal strength as it travels over a distance, which can result in weaker and less reliable data transmission.
Question 12
Which type of IP address is used to send data to all devices on a network?
a) Unicast address
b) Broadcast address
c) Anycast address
d) Multicast address
Correct Answer: b) Broadcast address
Explanation: A broadcast address sends data to all devices on a network, typically used for network-wide communications like DHCP requests.
Question 13
What is the function of a DNS server?
a) To assign IP addresses automatically to devices on a network
b) To map domain names to IP addresses
c) To encrypt data transmitted between devices
d) To route data between different networks
Correct Answer: b) To map domain names to IP addresses
Explanation: A DNS server resolves human-readable domain names (like www.example.com) to numerical IP addresses, allowing easier navigation and access to websites.
Question 14
What is the main function of the transport layer in the OSI model?
a) To route data between networks
b) To provide error correction and ensure data is delivered reliably
c) To manage encryption and compression of data
d) To handle the physical transmission of data
Correct Answer: b) To provide error correction and ensure data is delivered reliably
Explanation: The transport layer (Layer 4) is responsible for ensuring reliable data transfer by managing error correction, packet sequencing, and flow control.
Question 15
What type of topology uses a central device to connect all nodes?
a) Star topology
b) Bus topology
c) Ring topology
d) Mesh topology
Correct Answer: a) Star topology
Explanation: In a star topology, all network nodes are connected to a central device such as a hub or switch, which manages the communication between them.
Question 16
Which protocol allows multiple VLANs to communicate over a single network link?
a) STP
b) ARP
c) VLAN Trunking Protocol (VTP)
d) IPsec
Correct Answer: c) VLAN Trunking Protocol (VTP)
Explanation: VLAN Trunking Protocol (VTP) allows multiple VLANs to communicate across a single network link by tagging VLANs with identifiers.
Question 17
What is a “hot spare” in a RAID configuration?
a) A backup hard drive that automatically replaces a failed drive without user intervention
b) A hard drive that requires manual installation when another drive fails
c) A network device that boosts wireless signals
d) A temporary IP address assigned by a DHCP server
Correct Answer: a) A backup hard drive that automatically replaces a failed drive without user intervention
Explanation: In a RAID configuration, a hot spare is a backup drive that is immediately used to replace a failed drive, ensuring data redundancy and fault tolerance.
Question 18
What does a DHCP server do in a network?
a) Encrypts data transmissions
b) Filters network traffic
c) Assigns IP addresses dynamically to devices
d) Maps MAC addresses to IP addresses
Correct Answer: c) Assigns IP addresses dynamically to devices
Explanation: A DHCP server automatically assigns IP addresses to devices on a network, streamlining the process of network configuration and management.
Question 19
What is a rogue access point?
a) A wireless access point that is encrypted with WPA2
b) A wireless access point installed without authorization
c) A firewall that filters network traffic
d) A repeater that extends the range of a network
Correct Answer: b) A wireless access point installed without authorization
Explanation: A rogue access point is an unauthorized device added to a network, which can pose a significant security risk by providing unmonitored entry points.
Question 20
What is a common cause of signal interference in wireless networks?
a) Increased bandwidth
b) Electromagnetic interference (EMI)
c) Strong encryption methods
d) Dynamic IP addressing
Correct Answer: b) Electromagnetic interference (EMI)
Explanation: Electromagnetic interference (EMI) can cause signal interference in wireless networks, resulting in reduced performance or dropped connections.