-
web.groovymark@gmail.com
- November 18, 2024
Question 21
Which type of address is used by a router to deliver packets to a single recipient?
a) Multicast address
b) Unicast address
c) Anycast address
d) Broadcast address
Correct Answer: b) Unicast address
Explanation: A unicast address is used to send data to a single recipient, such as when a router directs packets to one specific device on the network.
Question 22
Which encryption method uses a pair of keys: one public and one private?
a) Symmetric-key encryption
b) Hash-based encryption
c) Asymmetric-key encryption
d) Stream cipher encryption
Correct Answer: c) Asymmetric-key encryption
Explanation: Asymmetric-key encryption uses two different keys: a public key for encryption and a private key for decryption, ensuring secure communication.
Question 23
What does a RAID system provide in terms of data management?
a) Faster network speeds
b) Dynamic IP addressing
c) Data redundancy and fault tolerance
d) Encryption of sensitive data
Correct Answer: c) Data redundancy and fault tolerance
Explanation: A RAID (Redundant Array of Independent Disks) system provides redundancy by storing copies of data across multiple hard drives, improving fault tolerance and preventing data loss in case of hardware failure.
Question 24
What is a major difference between IPv4 and IPv6 addressing?
a) IPv4 addresses are longer than IPv6 addresses
b) IPv6 uses a 128-bit address, while IPv4 uses a 32-bit address
c) IPv4 can support more devices than IPv6
d) IPv6 addresses are encrypted, while IPv4 addresses are not
Correct Answer: b) IPv6 uses a 128-bit address, while IPv4 uses a 32-bit address
Explanation: IPv6 addresses are 128-bit, allowing for a much larger address space compared to IPv4's 32-bit addressing scheme.
Question 25
What is the purpose of NAT (Network Address Translation)?
a) To resolve domain names to IP addresses
b) To allow devices with private IP addresses to communicate with public networks
c) To encrypt data for secure transmission
d) To filter network traffic based on predefined security rules
Correct Answer: b) To allow devices with private IP addresses to communicate with public networks
Explanation: NAT enables devices on a private network to access the internet by translating private IP addresses into public IP addresses.
Question 26
What does APIPA (Automatic Private IP Addressing) do in the absence of a DHCP server?
a) It assigns a public IP address to devices on the network
b) It assigns a private IP address from a reserved range
c) It encrypts data for secure communication
d) It maps domain names to IP addresses
Correct Answer: b) It assigns a private IP address from a reserved range
Explanation: APIPA automatically assigns a private IP address to devices when a DHCP server is unavailable, allowing local communication.
Question 27
What is the primary purpose of a router in a network?
a) To assign dynamic IP addresses
b) To filter data packets based on security rules
c) To route data packets between different networks
d) To amplify network signals
Correct Answer: c) To route data packets between different networks
Explanation: A router is responsible for directing data packets between different networks, ensuring they reach the correct destination.
Question 28
What type of backup method copies all data regardless of changes?
a) Differential backup
b) Full backup
c) Incremental backup
d) Mirror backup
Correct Answer: b) Full backup
Explanation: A full backup copies all data, regardless of whether it has changed since the last backup, ensuring a complete data set is saved.
Question 29
What is an example of a physical layer device in the OSI model?
a) Router
b) Switch
c) Hub
d) Firewall
Correct Answer: c) Hub
Explanation: A hub operates at the physical layer (Layer 1) of the OSI model, transmitting data without any filtering or routing.
Question 30
What does a VLAN (Virtual Local Area Network) allow you to do?
a) Encrypt network traffic between devices
b) Segment a network into logical parts without physical separation
c) Automatically assign IP addresses
d) Amplify weak signals in a network
Correct Answer: b) Segment a network into logical parts without physical separation
Explanation: VLANs allow you to logically segment a network, improving traffic management and security without needing separate physical networks.
Question 31
Which protocol is responsible for email retrieval from a server?
a) SMTP
b) HTTP
c) FTP
d) IMAP
Correct Answer: d) IMAP
Explanation: IMAP (Internet Message Access Protocol) is used for retrieving and managing email from a server, allowing for synchronization between devices.
Question 32
Which security protocol is designed to make a wireless network as secure as a wired one?
a) WEP
b) WPA2
c) SSL
d) HTTPS
Correct Answer: a) WEP
Explanation: WEP (Wired Equivalent Privacy) was designed to provide wireless networks with security comparable to that of wired networks, though it is now considered insecure.
Question 33
What is the purpose of a patch panel in a network?
a) To terminate and manage network cables
b) To encrypt network traffic
c) To amplify network signals
d) To assign dynamic IP addresses
Correct Answer: a) To terminate and manage network cables
Explanation: A patch panel is used to terminate and organize network cables, providing an easy way to manage and connect network wiring in a central location.
Question 34
What type of cable is RG-58, and what is it commonly used for?
a) Coaxial cable used for Ethernet networking
b) Twisted-pair cable used for telephone lines
c) Fiber-optic cable used for long-distance communication
d) Shielded cable used for electrical wiring
Correct Answer: a) Coaxial cable used for Ethernet networking
Explanation: RG-58 is a type of coaxial cable commonly used in 10Base2 Ethernet networks, known as thinnet, due to its relatively small diameter.
Question 35
Which type of wireless network allows two devices to communicate directly without an access point?
a) Infrastructure mode
b) Ad hoc mode
c) WPA2
d) CSMA/CA
Correct Answer: b) Ad hoc mode
Explanation: In ad hoc mode, devices communicate directly with each other without the need for an access point, often used for temporary or small-scale wireless networks.
Question 36
What is the purpose of a backup system in network management?
a) To encrypt data for secure transmission
b) To provide fault tolerance and data recovery in case of system failure
c) To assign dynamic IP addresses
d) To filter network traffic
Correct Answer: b) To provide fault tolerance and data recovery in case of system failure
Explanation: A backup system ensures data is recoverable in case of hardware or software failure, helping to prevent data loss and maintain business continuity.
Question 37
What does DNSSEC provide for DNS queries?
a) Encryption of DNS requests
b) Digital signatures to ensure the authenticity of DNS responses
c) Dynamic IP address assignment
d) Resolution of domain names to IP addresses
Correct Answer: b) Digital signatures to ensure the authenticity of DNS responses
Explanation: DNSSEC (Domain Name System Security Extensions) adds security to DNS queries by using digital signatures to ensure the authenticity and integrity of DNS data.
Question 38
What type of cable is used in a bus topology?
a) Twisted-pair
b) Coaxial cable
c) Fiber-optic cable
d) USB cable
Correct Answer: b) Coaxial cable
Explanation: Coaxial cable is commonly used in bus topology networks, where all devices share a single communication line.
Question 39
What is a key advantage of fiber-optic cables over copper cables in networking?
a) Lower cost
b) Resistance to electromagnetic interference
c) Simplicity of installation
d) Better support for legacy systems
Correct Answer: b) Resistance to electromagnetic interference
Explanation: Fiber-optic cables are immune to electromagnetic interference, making them ideal for high-speed data transmission over long distances without signal degradation.
Question 40
What is the purpose of an encryption protocol in network security?
a) To assign dynamic IP addresses
b) To ensure that data is only accessible to authorized users
c) To map domain names to IP addresses
d) To amplify weak signals in a network
Correct Answer: b) To ensure that data is only accessible to authorized users
Explanation: Encryption protocols secure data by encoding it so that only authorized users with the correct decryption keys can access the original information.