1.
__________ are the rules or languages in which networking is possible
Correct Answer
A. Protocols
Explanation
Protocols are the set of rules or languages that enable networking. They define the format, timing, and sequencing of data transmission between devices in a network. Protocols ensure that data is transmitted accurately and efficiently, allowing devices to communicate and exchange information. Without protocols, networking would not be possible as there would be no standardized way for devices to interact with each other. Therefore, protocols are essential for establishing and maintaining effective communication within a network.
2.
What type of connector does unshielded twisted pair (UTP) cable use
Correct Answer
B. RJ45
Explanation
The correct answer is RJ45. RJ45 is the type of connector used for unshielded twisted pair (UTP) cable. UTP cables are commonly used in Ethernet networking for transmitting data. The RJ45 connector has eight pins and is designed to fit into an RJ45 socket, which is found on most network devices such as routers, switches, and computers. This connector is widely used for connecting devices in local area networks (LANs) and is the standard connector for Ethernet connections.
3.
Which layer of the OSI model covers the cabling and electrical signaling?
Correct Answer
A. Physical
Explanation
The correct answer is Physical. The Physical layer of the OSI model is responsible for the physical transmission of data, including the cabling and electrical signaling. It deals with the physical aspects of the network, such as the type of cables used, the connectors, and the electrical voltages used for transmission. This layer ensures that the data is transmitted reliably and efficiently over the network.
4.
What layer of the OSI model are the Media Access Control address part of?
Correct Answer
B. Data-link
Explanation
The Media Access Control (MAC) address is a unique identifier assigned to network interfaces for communications on the data-link layer of the OSI model. This layer is responsible for the reliable transfer of data between network nodes over a physical medium. The MAC address is used to identify devices within a local network and is essential for the proper functioning of protocols like Ethernet. Therefore, the correct answer is Data-link.
5.
What is the primary protocol used by Windows to communicate over a network?
Correct Answer
A. TCP/IP
Explanation
TCP/IP is the primary protocol used by Windows to communicate over a network. TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a set of rules that governs how data is transmitted over the internet. It is the most widely used protocol for network communication as it provides reliable and efficient data transmission. TCP/IP is used for various purposes such as web browsing, email, file transfer, and remote access. It ensures that data packets are delivered accurately and in the correct order, making it essential for network communication in Windows systems.
6.
On which layer of the OSI model is IPv4 Addressing included?
Correct Answer
C. Network
Explanation
IPv4 addressing is included in the Network layer of the OSI model. The Network layer is responsible for logical addressing and routing of data packets across different networks. IPv4 addresses are used to uniquely identify devices on a network and enable communication between them. Therefore, it is appropriate for IPv4 addressing to be included in the Network layer of the OSI model.
7.
What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier?
Correct Answer
B. Subnet mask
Explanation
A subnet mask is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier. It is a 32-bit number that is used in conjunction with the IP address to determine the network and host portions of the address. The subnet mask is applied bitwise to the IP address, with the network portion of the address being determined by the bits that are set to 1 in the subnet mask. The host portion of the address is determined by the bits that are set to 0 in the subnet mask.
8.
In what class is the address of 156.43.75.212?
Correct Answer
A. Class A
Explanation
The address 156.43.75.212 belongs to Class A because it falls within the range of 1.0.0.0 to 126.0.0.0. Class A addresses have the first octet as the network portion, and the remaining three octets as the host portion.
9.
What is the default subnet mask for 198.54.65.3?
Correct Answer
C. 255.255.255.0
Explanation
The default subnet mask for the IP address 198.54.65.3 is 255.255.255.0. This subnet mask is used in a Class C network, where the first three octets (198.54.65) represent the network portion, and the last octet (3) represents the host portion. The subnet mask 255.255.255.0 indicates that the first three octets are used for the network, and the last octet is available for host addresses.
10.
What is used to avoid assigning entire addresses of a particular class to networks that didn't have that many hosts?
Correct Answer
C. CIDR
Explanation
CIDR (Classless Inter-Domain Routing) is used to avoid assigning entire addresses of a particular class to networks that didn't have that many hosts. In traditional IP addressing, classes were used to allocate address space, but this led to inefficient use of addresses. CIDR was introduced to allow for more flexible allocation of IP addresses by allowing the use of variable-length subnet masks. This allows network administrators to allocate smaller blocks of addresses to networks based on their actual requirements, thus avoiding wastage of address space.
11.
If you have an IPv4 address of 123.54.34.77 with a subnet mask of 255.255.240.0, what is the CIDR notation?
Correct Answer
B. /20
Explanation
The given IPv4 address 123.54.34.77 with a subnet mask of 255.255.240.0 falls under the /20 CIDR notation. This is because the subnet mask 255.255.240.0 has 20 network bits and 12 host bits. The CIDR notation represents the number of network bits in the subnet mask, which in this case is 20.
12.
Which of the following is NOT an IPv4 private address range?
Correct Answer
D. 224.0.0.0 through 224.255.255.255
Explanation
The given answer, 224.0.0.0 through 224.255.255.255, is not an IPv4 private address range. This range is reserved for multicast addresses, which are used for one-to-many communication. Private address ranges, on the other hand, are used for internal networks and are not routable on the internet. The correct IPv4 private address ranges are 10.0.0.0 through 10.255.255.255, 172.16.0.0 through 172.31.255.255, and 192.168.0.0 through 192.168.255.255.
13.
What would a corporation use to allow private IPv4 addresses to communicate with the Internet?
Correct Answer
D. NAT
Explanation
A corporation would use NAT (Network Address Translation) to allow private IPv4 addresses to communicate with the Internet. NAT is a technique that allows multiple devices with private IP addresses to share a single public IP address when connecting to the Internet. It translates the private IP addresses to the public IP address and vice versa, enabling communication between the private network and the Internet. This helps conserve public IP addresses and provides an extra layer of security by hiding the internal network structure from external sources.
14.
What address is assigned to a computer that fails to locate a DHCP server?
Correct Answer
C. APIPA
Explanation
When a computer fails to locate a DHCP server, it is unable to receive an IP address automatically. In such cases, the computer assigns itself an IP address using Automatic Private IP Addressing (APIPA). APIPA assigns a unique IP address from the range 169.254.0.1 to 169.254.255.254 to the computer. This allows the computer to communicate with other devices on the same network segment that are also using APIPA.
15.
What server automatically assigns IP addresses?
Correct Answer
C. DHCP
Explanation
DHCP stands for Dynamic Host Configuration Protocol, which is a network management protocol used by servers to automatically assign IP addresses to devices on a network. This protocol allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration information without manual configuration. Therefore, DHCP is the server that automatically assigns IP addresses.
16.
What type of address is the FCC0:0:0:0B5D:FF:BE3B:F4F7:3311?
Correct Answer
C. IPv6
Explanation
The given address "FCC0:0:0:0B5D:FF:BE3B:F4F7:3311" is in the format of an IPv6 address. IPv6 is the latest version of the Internet Protocol, which provides a much larger address space compared to IPv4. IPv6 addresses are represented using eight groups of four hexadecimal digits, separated by colons. In this case, the address consists of eight groups, each containing four hexadecimal digits. Therefore, the correct answer is IPv6.
17.
Which type of address defines a single network interface in a computer or other device?
Correct Answer
A. Unicast
Explanation
A unicast address is used to define a single network interface in a computer or other device. This type of address is unique and identifies a specific device on a network. It allows for point-to-point communication between two devices, where data is sent from a source to a specific destination. Unlike multicast or anycast addresses, a unicast address is not shared or distributed among multiple devices.
18.
Which type of IPv6 address is unique throughout the IPv6 universe?
Correct Answer
D. Global
Explanation
A global IPv6 address is unique throughout the entire IPv6 universe. Unlike node-local, link-local, and site-local addresses which have limited scopes, a global address can be used to identify a device globally on the internet. It allows communication between devices across different networks and ensures that each device has a unique address that can be reached from anywhere in the world.
19.
What type of address mechanism is a tunneling protocol that enables computers to transmit IPv6 packets through NAT routers that do not support IPv6?
Correct Answer
D. Teredo
Explanation
Teredo is a tunneling protocol that allows computers to transmit IPv6 packets through NAT routers that do not support IPv6. It encapsulates IPv6 packets within IPv4 packets, allowing them to traverse the IPv4 network. Teredo provides a way for IPv6 traffic to be transmitted over an IPv4 network, enabling communication between IPv6-enabled devices and devices that only support IPv4.
20.
TCP is considered a __________ protocol.
Correct Answer
A. Connection-oriented
Explanation
TCP is considered a connection-oriented protocol because it establishes a reliable and ordered connection between two devices before data transmission. This means that TCP ensures that all data packets are received in the correct order and without any errors. It also provides flow control and congestion control mechanisms to optimize data transmission. This connection-oriented nature of TCP makes it suitable for applications that require reliable and accurate data delivery, such as web browsing, email, and file transfer.
21.
What do you call codes that identify specific applications running on the system?
Correct Answer
A. Ports
Explanation
Ports are codes that identify specific applications running on a system. These codes allow data to be sent and received between different applications on a network. Each application is assigned a unique port number, which helps in routing the data to the correct destination. By using ports, multiple applications can run simultaneously on a system without interference.
22.
What utility or tool allows you to view and manage all your network connections?
Correct Answer
B. Network and Sharing Center
Explanation
The Network and Sharing Center is a utility or tool in Windows that allows users to view and manage all their network connections. It provides a centralized location to access information about network connections, such as network status, network adapters, and sharing options. Users can also troubleshoot network problems, set up new connections, and modify network settings through this tool. It serves as a hub for managing and monitoring network connections on a computer.
23.
What is a software routine that acts as a virtual barrier between a computer and the network to which it is attached?
Correct Answer
B. Firewall
Explanation
A firewall is a software routine that acts as a virtual barrier between a computer and the network to which it is attached. It helps to monitor and control incoming and outgoing network traffic based on predetermined security rules. By filtering and blocking unauthorized access attempts, a firewall protects the computer and network from potential threats and malicious activities.
24.
What command is used to test network connectivity between two hosts?
Correct Answer
B. Ping
Explanation
The correct answer is "Ping." The Ping command is used to test network connectivity between two hosts by sending an ICMP Echo Request message to the target host and waiting for an ICMP Echo Reply message. It measures the round-trip time for the message to reach the destination and come back. By receiving a response from the target host, it confirms that there is a network connection between the two hosts.