1.
What layers of the Open System Interconnect model defines the electrical, mechanical, procedual, and functional specifications for links between communicating network systems?
Correct Answer
A. pHysical
Explanation
The Physical layer of the Open System Interconnect model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data, such as the type of cables used, the voltage levels, and the physical connectors. This layer ensures that the signals can be transmitted reliably between devices and establishes the physical connection between them.
2.
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link layers into what two sublayers?
Correct Answer
B. Logical Link Control and Media Access Control
Explanation
The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for flow control, error control, and establishing connections between devices. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media, such as Ethernet or Wi-Fi, and handles addressing and data transmission. These two sublayers work together to ensure reliable and efficient data communication between network devices.
3.
At what Open System Interconnect layer do network switches and bridges operate?
Correct Answer
C. Data Link
Explanation
Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transmission of data between nodes on a network by providing error detection and correction, as well as controlling the flow of data. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN) and make decisions based on the destination address in the data link header. They are commonly used to connect multiple devices and create a network infrastructure.
4.
At what Open System Interconnect layer do routers operate?
Correct Answer
A. Network
Explanation
Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing and forwarding data packets across different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer information, such as IP addresses, to efficiently transmit data between different networks. Therefore, the correct answer is Network.
5.
At what Open System Interconnect layer are common data compression and encryption schemes used?
Correct Answer
C. Presentation
Explanation
Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting, encrypting, and compressing data before it is transmitted over the network. By using compression, the size of the data is reduced, which helps to optimize network bandwidth. Encryption ensures the security and confidentiality of the data during transmission. Therefore, the Presentation layer is the correct layer where these schemes are commonly utilized.
6.
What Open System Interconnect layer is closest to the end user?
Correct Answer
A. Application
Explanation
The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system into seven different layers. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with software applications and allows users to access network resources. Therefore, the Application layer is the correct answer in this case.
7.
What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
Correct Answer
D. Protocol
Explanation
A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that devices can communicate effectively and efficiently by establishing a common language and set of rules for data exchange.
8.
What topology defines the layout of a network's devices and media?
Correct Answer
A. pHysical
Explanation
The correct answer is Physical because the layout of a network's devices and media refers to the physical arrangement of these components. This includes the physical placement of routers, switches, cables, and other hardware devices that make up the network infrastructure. The physical topology determines how these devices are connected and the overall structure of the network.
9.
What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
Correct Answer
B. Logical
Explanation
Logical topology refers to the way in which devices communicate and data is transmitted in a network, regardless of the physical layout. It defines the logical connections between devices, such as how data flows from one device to another. This includes concepts like bus, ring, mesh, and tree topologies. Unlike physical topology, which focuses on the physical arrangement of devices and cables, logical topology focuses on the abstract representation of how devices communicate and data is transmitted.
10.
What topology consists of devices connested to a common, shared cable?
Correct Answer
A. Bus
Explanation
The correct answer is Bus. In a bus topology, all devices are connected to a single cable called the bus. This cable acts as a shared communication medium, allowing devices to transmit and receive data. Each device on the bus listens to the data being transmitted and only accepts the data intended for it. It is a simple and inexpensive topology, but if the main cable fails, the entire network can be affected.
11.
What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star
Explanation
The star topology consists of cable segments from each computer connected to a centralized component, usually a switch or a hub. In this topology, all the data traffic is routed through the central component, allowing for easy management and troubleshooting. Each computer has its own dedicated connection to the central component, ensuring that if one computer fails, it does not affect the rest of the network. This topology is commonly used in modern Ethernet networks.
12.
What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
Explanation
A hybrid topology combines two or more different physical topologies in a single network. This means that different sections of the network may be set up in different topologies, such as a combination of bus, ring, or star. This allows for more flexibility and scalability in the network design, as different topologies can be used to suit different needs or requirements.
13.
Which network protocol had the Department of Defense chosen as its standard to govern the flow of information?
Correct Answer
C. Transport Control Protocol/Internet Protocol
Explanation
The Department of Defense had chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of rules that govern how data is transmitted over the internet, ensuring reliable and efficient communication between devices. It is the foundation of the modern internet and is used by a wide range of devices and networks worldwide.
14.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
Correct Answer
B. Address Resolution Protocol
Explanation
The correct answer is Address Resolution Protocol (ARP). ARP is a network layer protocol that is used to map an IP address to a corresponding Media Access Control (MAC) address. It is responsible for finding the MAC address of a device on the same local network, given its IP address. ARP allows devices to communicate with each other using their MAC addresses, which are unique identifiers assigned to each network interface. By resolving IP addresses to MAC addresses, ARP enables the delivery of data packets within a local network.
15.
What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
Correct Answer
C. Reverse Address Resulution Protocol
Explanation
The Reverse Address Resolution Protocol (RARP) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server, which then responds with the corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.
16.
What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol
Explanation
The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to help with troubleshooting. ICMP is used by network devices to send error messages and operational information, such as error reporting and network congestion notifications. It allows for the detection of network problems, measurement of network performance, and troubleshooting of network connectivity issues. ICMP messages are typically used by network administrators and diagnostic tools to identify and resolve network-related problems.
17.
What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
Correct Answer
C. Transmission Control Protocol
Explanation
The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors or loss. TCP uses a combination of acknowledgments, sequencing, and retransmissions to guarantee the reliable delivery of data over IP networks.
18.
What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
Correct Answer
A. File Transfer Protocol
Explanation
File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files. FTP allows users to transfer files between a client and a server over a network. It provides a standard set of commands for accessing and manipulating files on remote servers. FTP is widely used for file sharing and is an essential tool for transferring large files or multiple files over the internet.
19.
What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
Correct Answer
B. Wide Area Network
Explanation
A wide area network (WAN) is the correct answer because it connects networks that are geographically separated over long distances, such as between cities, states, countries, or even globally. Unlike a local area network (LAN) that connects devices within a limited area like a home or office, a WAN is designed to connect larger networks and enable communication between them. Virtual private networks (VPNs) are a type of network that uses encryption and tunneling protocols to provide secure connections over public networks, while metropolitan area networks (MANs) connect networks within a specific metropolitan area.
20.
What type of network makes use of tunneling and security and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
Correct Answer
C. Virtual Private Network
Explanation
A Virtual Private Network (VPN) makes use of tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. It creates a secure and encrypted connection between the systems, allowing them to share data and resources as if they were connected on a local network. VPNs are commonly used by businesses to provide remote access to their employees, ensuring secure communication and protecting sensitive information from unauthorized access.
21.
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
Correct Answer
D. Port 8080
Explanation
Port 8080 is a common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative port for HTTP servers and proxies. This is typically done to avoid conflicts with other services that may be using port 80. Therefore, port 8080 is commonly used to host web servers and proxy servers that handle HTTP traffic.
22.
How many bits are in an IPv4 address?
Correct Answer
B. 32 bits
Explanation
An IPv4 address is a 32-bit number used to identify devices on a network. It is divided into four octets, with each octet represented by 8 bits. Therefore, the correct answer is 32 bits.
23.
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
Correct Answer
B. Dotted Decimal Notation
Explanation
IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four sections, each separated by a dot. Each section represents an 8-bit binary number, which is then converted to its decimal equivalent. This format is easier for users to read and understand compared to binary or hexadecimal formats.
24.
Using a range of 1-126 in the first octet of an IPv4 address, what class does it belong to?
Correct Answer
A. Class A
Explanation
An IPv4 address is divided into different classes based on the range of values in the first octet. Class A addresses have a range of 1-126 in the first octet. Therefore, an IPv4 address with a range of 1-126 in the first octet belongs to Class A.
25.
What IPv4 class address is used for networks with about 250 nodes?
Correct Answer
A. Class C
Explanation
Class C addresses are used for networks with about 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for 256 possible network addresses and 254 possible host addresses. This class of addresses is commonly used for small to medium-sized networks, such as those found in homes, small businesses, or small organizations. Class D, E, and F addresses are not suitable for networks with about 250 nodes. Class D addresses are used for multicast addresses, Class E addresses are reserved for experimental purposes, and Class F addresses are reserved for future use.
26.
What IPv4 class address is used for multicast addressing?
Correct Answer
B. Class D
Explanation
Class D IPv4 addresses are used for multicast addressing. Multicast addressing allows a sender to send a single packet to multiple recipients simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast group communication. These addresses are not assigned to specific devices but are used for multicast group membership.
27.
What IPv4 reserved address is used for loop back?
Correct Answer
B. 127.0.0.1.
Explanation
The IPv4 reserved address used for loopback is 127.0.0.1. This address is commonly referred to as the loopback address and is used by a device to send network packets to itself. It is often used for testing and troubleshooting network connectivity on a local machine.
28.
What is a mechanism that allows a network device to divide an IP address into a network and host number?
Correct Answer
A. Subnet mask
Explanation
A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address belongs to the network and which part belongs to the host. By applying the subnet mask, the device can identify the network address and the host address, enabling proper routing and communication within the network.
29.
What is the default classful subnet mask on class B networks?
Correct Answer
A. 255.255.0.0.
Explanation
The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for a network size of 16 bits and a host size of 16 bits, which means that the first two octets are used for the network portion of the address and the last two octets are used for the host portion. This allows for a maximum of 65,536 networks and 65,534 hosts per network.
30.
What method borrows bits from the host field of an IP address to create a subnet?
Correct Answer
B. Classless Inter-Domain Routing
Explanation
Classless Inter-Domain Routing (CIDR) is the method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more flexible and efficient allocation of IP addresses by allowing variable-length subnet masks. This means that instead of being limited to the fixed subnet masks used in classful subnet masking, CIDR allows for the creation of subnets with different sizes depending on the needs of the network. CIDR also enables the aggregation of IP addresses, reducing the size of routing tables and improving network efficiency.
31.
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
Correct Answer
A. Colon Hexadecimal Format
Explanation
IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format replaces consecutive zeros in the address with a double colon (::), making the address shorter and easier to read. Additionally, each segment of the address is represented in hexadecimal notation, which allows for a larger range of possible values and simplifies the addressing scheme. This format is designed to improve the usability and readability of IPv6 addresses compared to the binary representation used in IPv4.
32.
What notation is expressed in leading zero compression of IPv6?
Correct Answer
A. 1234:1234:0:0:1234:0:0:1234.
Explanation
The notation expressed in leading zero compression of IPv6 is the answer: 1234:1234:0:0:1234:0:0:1234. This is because leading zero compression allows consecutive blocks of zeros to be represented by double colons (::), reducing the length of the IPv6 address. In this case, the blocks of zeros between the numbers are compressed, resulting in a shorter and more concise representation of the address.
33.
What notation is expressed in zero compression for IPv6?
Correct Answer
B. 10AB::3:0:1234:5678
Explanation
The correct answer is an IPv6 address expressed in zero compression notation. In IPv6, zero compression allows consecutive blocks of zeros to be represented with a double colon (::). This notation simplifies the representation of IPv6 addresses by eliminating consecutive blocks of zeros. The given answer, 10AB::3:0:1234:5678, follows this zero compression notation as it replaces two consecutive blocks of zeros with a double colon.
34.
What Unicast address scope opertates within a network segment, and will not originate form, or be destined to, an interface that requires a router to direct traffic?
Correct Answer
A. Site-local
Explanation
Site-local addresses are used within a specific network segment and are not meant to be routed outside of that segment. They are unique within the site but not globally routable. This means that they will not originate from or be destined to an interface that requires a router to direct traffic. Site-local addresses were deprecated in 2004 and are no longer recommended for use.
35.
What Unicast address scope is desiged to be private, internally routable addresses that do not route outside the site?
Correct Answer
A. Site-local
Explanation
Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific organization or site and are not meant to be globally routable. They provide a way for devices within the same site to communicate with each other without the need for external routing. Site-local addresses were deprecated in favor of Unique Local Addresses (ULA) in IPv6.
36.
What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different aresa allowing for hierarchical design and allocation?
Correct Answer
D. Aggregatable Global
Explanation
Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is broken up into different areas, allowing for hierarchical design and allocation. This means that the address can be divided into smaller subnets, making it more efficient for routing and allocation purposes.