1.
(401)What device is a combination transmitter/receiver in a single package?
Correct Answer
A. A transceiver
Explanation
A transceiver is a device that combines the functions of both a transmitter and a receiver in a single package. It is commonly used in telecommunications and networking to transmit and receive signals over a network. Transceivers are essential components in various devices such as radios, wireless communication systems, and computer networks. They enable bidirectional communication by converting incoming signals into a format that can be understood by the receiving device and transmitting outgoing signals in a compatible format.
2.
(401)What device operates at the physical layer of the Open System Interconnection (OSI) model and is used in Ethernet networks to connect which device to a fiber or copper cable?
Correct Answer
A. Transceiver
Explanation
A transceiver is a device that operates at the physical layer of the OSI model and is used in Ethernet networks to connect a device to a fiber or copper cable. It combines both transmitter and receiver functions, allowing data to be transmitted and received over the network. This device converts electrical signals into optical signals for transmission over fiber cables or into electrical signals for transmission over copper cables. Thus, a transceiver plays a crucial role in connecting devices to the network infrastructure.
3.
(402)What device provides the physical, electrical, and electronic connections to the network media?
Correct Answer
D. Network interface card(NIC)
Explanation
A network interface card (NIC) provides the physical, electrical, and electronic connections to the network media. It is a hardware component that is installed in a computer or device to allow it to connect to a network. The NIC acts as an interface between the computer and the network, allowing data to be transmitted and received over the network. It provides the necessary connections, such as Ethernet or Wi-Fi, to establish a network connection and enable communication between devices.
4.
(402)What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?
Correct Answer
C. pHysical layer and Data Link layer
Explanation
Network interface cards (NIC) belong to the Physical layer and Data Link layer of the OSI model. The Physical layer is responsible for the physical transmission of data over the network, including the electrical, mechanical, and physical specifications of the network interface. The Data Link layer is responsible for the reliable transmission of data between two directly connected nodes, providing error detection and correction, as well as flow control. NICs handle both the physical connection to the network (Physical layer) and the data transmission between devices (Data Link layer).
5.
(403)The device that receives a digital signal and regenerates the signal along the next leg of the medium is a...
Correct Answer
D. Repeater
Explanation
A repeater is a device that receives a digital signal and amplifies or regenerates it before sending it along the next leg of the medium. This is done to overcome signal degradation and ensure that the signal quality is maintained over longer distances. Unlike bridges, brouters, and gateways, which are used for different purposes in network communication, a repeater specifically focuses on signal regeneration and amplification.
6.
(403)A repeater with more than one output port is a...
Correct Answer
A. Hub
Explanation
A repeater with more than one output port is a hub. A hub is a networking device that allows multiple devices to connect to a network. It receives data from one port and broadcasts it to all other ports, essentially acting as a multi-port repeater. Therefore, a hub is the correct answer in this case.
7.
(403)What can be used to extend the size of a network?
Correct Answer
C. Active Hubs
Explanation
Active Hubs can be used to extend the size of a network. Active Hubs are devices that amplify and regenerate signals, allowing them to extend the distance over which data can be transmitted. They receive data signals from one device and then transmit them to all other devices connected to the hub. This allows for the expansion of a network by connecting multiple devices to the hub, thereby extending the network's reach.
8.
(404)What is a device that subdivides a network into smaller logical pieces, or segments?
Correct Answer
A. Switch
Explanation
A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. Unlike a hub, which broadcasts data to all connected devices, a switch intelligently routes data only to the specific device it is intended for, improving network efficiency and security. Therefore, a switch is the correct answer to this question.
9.
(404)What is the time a switch takes to figure out where to forward a data unit called?
Correct Answer
C. Latency
Explanation
Latency refers to the time it takes for a switch to determine the appropriate destination for a data unit. It is the delay that occurs as the switch processes and forwards the data. The switch needs to analyze the data packet and make a decision on where to send it based on its destination address. This process takes a certain amount of time, which is known as latency.
10.
(405)What network device is a combination of networking hardware and software that connect two dissimilar kinds of networks?
Correct Answer
C. Gateway
Explanation
A gateway is a network device that combines both hardware and software to connect two different types of networks. It acts as an interface between these networks, allowing communication and data transfer between them. Unlike other devices like switches or repeaters, a gateway is specifically designed to handle the conversion and routing of data between dissimilar networks, making it the correct answer in this scenario.
11.
(405)What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?
Correct Answer
B. An internet gateway
Explanation
An internet gateway is a type of gateway that can restrict the kind of access local area network (LAN) users have to the internet, and vice versa. It acts as a bridge between the LAN and the internet, controlling the flow of data and allowing only authorized access. It can enforce security policies, filter content, and block certain websites or services to ensure that the LAN users have restricted access to the internet. Additionally, it can also restrict external access to the LAN, providing a secure network environment.
12.
(405)What type of gateway might include remote access servers that allow dial-up connectivity to a Local Area Network (LAN)?
Correct Answer
C. An LAN gateway
Explanation
An LAN gateway is the correct answer because it includes remote access servers that allow dial-up connectivity to a Local Area Network (LAN). This type of gateway serves as a bridge between the LAN and external networks, providing secure access for remote users to connect to the LAN using dial-up connections.
13.
(406)What is a router's strength?
Correct Answer
A. Its intelligence
Explanation
A router's strength lies in its intelligence. This refers to its ability to analyze and make decisions based on data packets it receives, allowing it to efficiently direct network traffic. The intelligence of a router enables it to determine the best path for data transmission, manage network congestion, and prioritize certain types of traffic. This ensures that data is delivered accurately and efficiently, optimizing network performance.
14.
(406)What is the oldest routing protocol?
Correct Answer
C. Routing Information Protocol(RIP)
Explanation
RIP, or Routing Information Protocol, is considered the oldest routing protocol. It was developed in the early 1980s and was one of the first routing protocols used in computer networks. RIP uses a distance-vector algorithm to determine the best path for data packets to travel through a network. It has a maximum hop count of 15, which limits its scalability in larger networks. Despite its limitations, RIP is still used in some small networks today.
15.
(406)What is the routing protocol of internet backbones?
Correct Answer
A. Border Gateway Protocol(BGP)
Explanation
The correct answer is Border Gateway Protocol (BGP). BGP is the routing protocol used in internet backbones. It is responsible for exchanging routing information between autonomous systems (AS) and is designed to provide scalability, stability, and security in large-scale networks. BGP allows routers to make informed decisions about the best path for data packets to travel across different networks, ensuring efficient and reliable routing on the internet backbone.
16.
(407)Based on a specific input address, which Local Area Network (LAN) switch has the lowest delay and should be considered for supporting real-time applications?
Correct Answer
B. Cut-through switch
Explanation
A cut-through switch is the best choice for supporting real-time applications because it has the lowest delay. Cut-through switches forward packets as soon as the destination address is received, without waiting for the entire packet to be received. This reduces the delay in transmitting data, making it ideal for real-time applications that require quick and efficient data transfer. Hybrid switches, fragment-free switches, and store and forward switches have higher delays compared to cut-through switches, making them less suitable for real-time applications.
17.
(408)What synchronous optical network (SONET) device aggregates or splits SONET traffic at various speeds so as to provide access to SONET without demultiplexing the SONET signal stream?
Correct Answer
A. Add/Drop multiplexer(ADM)
Explanation
An Add/Drop multiplexer (ADM) is a synchronous optical network (SONET) device that aggregates or splits SONET traffic at various speeds. It allows access to SONET without the need to demultiplex the SONET signal stream. This means that it can add or drop specific channels or signals from the SONET network without interfering with the rest of the traffic. ADMs are commonly used in telecommunications networks to efficiently manage and distribute SONET traffic.
18.
(408)What Synchronous Optical Network (SONET) devices are configured to split SONET traffic and copy individual channels on two or more output links?
Correct Answer
B. Drop-and-repeat node(D+R)
Explanation
A Drop-and-repeat node (D+R) is a Synchronous Optical Network (SONET) device that is configured to split SONET traffic and copy individual channels on two or more output links. This means that the D+R node can take the incoming SONET traffic and duplicate specific channels onto multiple output links, allowing for redundancy and improved reliability in the network. This feature is useful in scenarios where high availability and fault tolerance are required.
19.
(408)When tributary units are grouped together they form...
Correct Answer
A. A tributary unit group(TUG)
Explanation
When tributary units are grouped together, they form a tributary unit group (TUG). This implies that multiple tributary units are combined or assembled into a single group or entity called a TUG. The TUG serves as a higher-level unit that encompasses and manages the individual tributary units within it.
20.
(408)An OC-12's electrical signal is the same as a Synchronous Transport Signal level-12 (STS-12) frame and equal to what Synchronous Transport Modules (STM) frame?
Correct Answer
B. STM-4
Explanation
An OC-12's electrical signal is the same as a Synchronous Transport Signal level-12 (STS-12) frame, which is equivalent to an STM-4 frame.
21.
(409)Because of its cost, Asynchronous Transfer Mode (ATM) is rarely used on small local area networks (LAN). What technology is better suited for LANs?
Correct Answer
A. Gigabit Ethernet
Explanation
ATM is rarely used on small LANs due to its high cost. Gigabit Ethernet, on the other hand, is a technology that provides high-speed data transmission and is better suited for LANs. It offers a data transfer rate of 1 gigabit per second, which is significantly faster than Fast Ethernet and Ethernet. Gigabit Ethernet is more cost-effective and provides better performance, making it the preferred choice for LANs.
22.
(410)What topology defines the layout of network's devices and media?
Correct Answer
A. pHysical
Explanation
Physical topology refers to the actual physical layout of devices and media in a network. It describes how the devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the types of cables used, and the location of devices within the network. In contrast, logical topology refers to the way in which data flows within the network, regardless of the physical layout. The star and hybrid topologies are examples of physical topologies, where devices are connected to a central hub or a combination of different topologies, respectively.
23.
(411)What topology consists of devices connected to a common, shared cable?
Correct Answer
A. Bus
Explanation
The correct answer is bus. In a bus topology, all devices are connected to a common cable called the bus. This cable acts as a shared communication medium, allowing devices to transmit and receive data. Each device on the bus can access the data transmitted by other devices, making it a simple and cost-effective solution for small networks. However, if the bus cable fails, the entire network can be affected.
24.
(411)What topology consists of cable segments from each computer connected to a centralized component?
Correct Answer
C. Star
25.
(411)What topology has the stations connected in the form of a circle?
Correct Answer
B. Ring
Explanation
A ring topology has the stations connected in the form of a circle. In this type of network, each station is connected to exactly two other stations, forming a closed loop. Data is transmitted in one direction around the ring, and each station receives the data and passes it along to the next station until it reaches the intended destination. This topology is commonly used in local area networks (LANs) and allows for efficient data transmission and easy expansion of the network.
26.
(411)What topology combines two or more different physical topologies in a single network?
Correct Answer
D. Hybrid
27.
(412)What is NOT an advantage of a logical bus topology?
Correct Answer
A. There are no collisions
Explanation
A logical bus topology does not eliminate collisions. In a logical bus topology, all nodes share the same communication channel, and when two or more nodes transmit data at the same time, collisions occur. However, collision detection and collision avoidance mechanisms can be implemented to minimize the impact of collisions. Therefore, the statement "There are no collisions" is not an advantage of a logical bus topology.
28.
(412)What is an advantage of a logical ring topology?
Correct Answer
A. There are no collisions
Explanation
In a logical ring topology, there are no collisions because data is transmitted in a sequential manner. Each node has a dedicated time slot to transmit data, ensuring that there is no interference or collision between different nodes. This advantage allows for efficient and reliable communication within the network.
29.
(413)What data communication protocol uses characters and symbols (character code set) to govern the flow and format of information between systems?
Correct Answer
A. Character-oriented
Explanation
Character-oriented data communication protocol uses characters and symbols (character code set) to govern the flow and format of information between systems. This means that the protocol focuses on the transmission and interpretation of individual characters, allowing for easy understanding and compatibility between different systems. Unlike bit-oriented protocols that focus on the transmission of individual bits, character-oriented protocols provide a higher level of abstraction and are commonly used in applications that require the transmission of human-readable data. Routing and the Internet are not specifically related to the use of characters and symbols in data communication protocols.
30.
(413)What data communication protocol uses character control or 'handshaking' to link and represent information?
Correct Answer
B. Binary synchronous protocol
Explanation
Binary synchronous protocol is a data communication protocol that uses character control or 'handshaking' to link and represent information. This protocol ensures reliable and error-free transmission of data by using start and stop bits to mark the beginning and end of each character. It also includes error checking mechanisms and acknowledgments to ensure data integrity. Overall, binary synchronous protocol provides a robust and efficient way to transmit data over a communication link.
31.
(413)What data communication protocol is based on bits and the position of the bits?
Correct Answer
B. Bit-oriented
Explanation
Bit-oriented is the correct answer because this data communication protocol is based on the manipulation and positioning of individual bits. It focuses on the transmission and reception of binary data, where each bit's position and value are crucial for communication. This protocol ensures accurate and reliable data transmission by considering the bits' order and arrangement.
32.
(413)What data communication protocol ensures that the receiving station can distinguish information from garbage?
Correct Answer
D. High-Level Data Link Control(HDLC)
Explanation
High-Level Data Link Control (HDLC) is a data communication protocol that ensures the receiving station can distinguish information from garbage. HDLC uses a frame structure, which includes a start and end flag, to mark the beginning and end of a frame. This helps the receiving station identify and extract the correct data from the transmission, while ignoring any noise or garbage data. HDLC also provides error detection and correction mechanisms to ensure data integrity and reliability during transmission.
33.
(414)Which network protocol has DOD chosen as its standard to govern the flow of information?
Correct Answer
D. Transmission control protocol/internet protocol(TCP/IP)
Explanation
The correct answer is TCP/IP. The Department of Defense (DOD) has chosen TCP/IP as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows computers to communicate with each other over the internet. It provides reliable and secure transmission of data, ensuring that information is delivered accurately and efficiently. TCP/IP is widely used and has become the standard protocol for internet communication.
34.
(414)Which TCP/IP Network layer protocol provides information about how and where data should be delivered, including the data's source and destination addresses?
Correct Answer
A. Internet Protocol(IP)
Explanation
The correct answer is Internet Protocol (IP). IP is responsible for providing information about how and where data should be delivered, including the source and destination addresses. It is a network layer protocol that ensures the proper routing and delivery of data packets across different networks. IP addresses are used to uniquely identify devices on a network and facilitate the transmission of data between them.
35.
(414)Which TCP/IP Network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address?
Correct Answer
B. Address Resolution Protocol(ARP)
Explanation
ARP (Address Resolution Protocol) is the correct answer because it is the TCP/IP Network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses by broadcasting an ARP request on the local network and receiving an ARP reply from the device with the corresponding MAC address. This allows devices to communicate with each other at the data link layer using MAC addresses.
36.
(414)Which TCP/IP Network layer protocol provides messaging that can help with troubleshooting?
Correct Answer
D. Internet Control Message Protocol(ICMP)
Explanation
ICMP is a TCP/IP network layer protocol that provides messaging for troubleshooting purposes. It is used to send error messages and operational information about network conditions. ICMP messages can be used to diagnose network connectivity issues, identify problems with routers or hosts, and determine the status of network devices. It is commonly used by network administrators and technicians to troubleshoot and resolve network problems.
37.
(414)Which TCP/IP Application layer protocol is used to send and receive files via TCP/IP?
Correct Answer
A. File Transfer Protocol(FTP)
Explanation
The correct answer is File Transfer Protocol (FTP). FTP is a TCP/IP application layer protocol that is used to transfer files between a client and a server on a network. It provides a simple and standardized way to send and receive files, allowing users to upload, download, and manage files on remote servers. FTP uses TCP as its transport protocol, ensuring reliable and secure file transfer over the network.
38.
(414)Which protocol is a simpler way to transfer files between computers but is simpler or more trivial than FTP?
Correct Answer
B. Trivial File Transfer Protocol(TFTP)
Explanation
TFTP is a simpler way to transfer files between computers compared to FTP. It is considered more trivial because it lacks some of the advanced features and functionalities of FTP. TFTP is primarily used for simple file transfers and is commonly used in scenarios where simplicity and efficiency are more important than advanced capabilities.
39.
(414)Which TCP/IP Application layer protocol is a terminal emulation protocol used to log on to remote hosts?
Correct Answer
A. Telnet
Explanation
Telnet is a TCP/IP Application layer protocol that allows users to log on to remote hosts and access them as if they were directly connected to the local machine. It provides terminal emulation, allowing users to interact with the remote host's command-line interface. Telnet is commonly used for remote administration, troubleshooting, and accessing network devices. It is a simple and lightweight protocol that transmits data in clear text, making it less secure compared to other protocols like SSH.
40.
(414)Which TCP/IP Application layer protocol is an automated means of assigning a unique IP address to every device on a network?
Correct Answer
A. Dynamic Host Configuration Protocol(DHCP)
Explanation
DHCP is an automated means of assigning a unique IP address to every device on a network. It allows devices to obtain an IP address, subnet mask, default gateway, and other network configuration settings automatically. This eliminates the need for manual IP address assignment, making it easier to manage and scale networks. TFTP is a file transfer protocol, SMTP is used for email transmission, and HTTP is used for web communication, so they are not directly related to assigning IP addresses.
41.
(414)Which TCP/IP Application layer protocol is a simple protocol used to synchronize the clocks of computers on a network?
Correct Answer
C. Network Time Protocol(NTP)
Explanation
Network Time Protocol (NTP) is a TCP/IP Application layer protocol used to synchronize the clocks of computers on a network. It allows computers to maintain accurate time synchronization by exchanging time information between clients and servers. NTP uses a hierarchical system of time sources, where lower-level servers synchronize with higher-level servers, ultimately obtaining time from highly accurate reference clocks. This ensures that all devices on the network have a consistent and accurate time, which is crucial for various network operations and services that rely on synchronized timekeeping. DHCP, SNMP, and PING are not specifically designed for clock synchronization.
42.
(414)Which TCP/IP Application layer protocol is a utility that can verify that TCP/IP is installed and communicating with the network?
Correct Answer
D. Packet Internet Groper(PING)
Explanation
PING is a utility that sends a message to a specific IP address or domain name and waits for a response. It is commonly used to test network connectivity and verify if TCP/IP is installed and functioning correctly. PING sends a series of small packets to the target address and measures the time it takes for the packets to be sent and received. If a response is received, it confirms that the network is properly configured and communication is established. Therefore, PING is the correct answer for this question.
43.
(415)What is a group of computers and associated devices that share a common communications line within a small geographic?
Correct Answer
B. Local area network(LAN)
Explanation
A local area network (LAN) is a group of computers and associated devices that share a common communications line within a small geographic area. This network is typically confined to a building or a campus and is used to facilitate communication and resource sharing among the devices connected to it. Unlike a wide area network (WAN) or a metropolitan area network (MAN), a LAN has a smaller coverage area and is usually privately owned and operated by an organization. A virtual private network (VPN) is a technology that allows users to securely access a private network over a public network, but it is not specifically related to a group of computers sharing a common communications line within a small geographic area.
44.
(415)The interconnection of several networks of computer resources in a city into a single larger network is a...
Correct Answer
D. Metropolitan area network(MAN)
Explanation
A metropolitan area network (MAN) is the correct answer because it refers to the interconnection of several networks of computer resources in a city into a single larger network. A LAN is a network that covers a small area, such as a home or office. A WAN is a network that spans a large geographical area, such as multiple cities or countries. A VPN is a secure private network that allows users to access a network remotely. Therefore, a MAN best describes the scenario where multiple networks in a city are interconnected into a larger network.
45.
(415)What type of network enables a group of two or more computer systems to communicate over the public internet?
Correct Answer
C. Virtual Private Network(VPN)
Explanation
A Virtual Private Network (VPN) enables a group of computer systems to communicate over the public internet by creating a secure and encrypted connection. It allows users to access and share data remotely while maintaining privacy and security. VPNs are commonly used by businesses to connect remote offices or remote workers to the main office network, as well as by individuals to secure their internet connections and protect their online activities from prying eyes.
46.
(416)What network model enables users to share resources, files, and printers in a decentralized way?
Correct Answer
C. Peer-to-peer
Explanation
Peer-to-peer network model enables users to share resources, files, and printers in a decentralized way. In this model, each device on the network can act as both a client and a server, allowing users to directly connect and share resources without the need for a central server. This model is commonly used in file-sharing applications and allows for greater flexibility and scalability compared to other network models.
47.
(416)What network model is a centralized model for data storage, security, running applications, and network administration?
Correct Answer
D. Client-server
Explanation
A client-server network model is a centralized model for data storage, security, running applications, and network administration. In this model, there are dedicated servers that store and manage data, run applications, and handle security measures. Clients, on the other hand, are devices that connect to the servers to access the resources and services provided. This model allows for efficient management and control of the network, ensuring that data and applications are centrally managed and accessed by authorized users.
48.
(417)What is the physical address of any device on the network?
Correct Answer
D. Media Access Control(MAC) address
Explanation
A MAC address is a unique identifier assigned to a network interface controller (NIC) for communications at the data link layer of a network segment. It is a hardware address that is physically assigned to the device and remains constant, regardless of the network it is connected to. Unlike IP addresses, MAC addresses are not assigned by a network administrator and cannot be changed. Therefore, the MAC address is the physical address of any device on the network.
49.
(417)What address is a 32-bit number?
Correct Answer
A. Internet protocol version 4(IPv4) address
Explanation
A 32-bit number is the format used for Internet Protocol version 4 (IPv4) addresses. IPv4 addresses are used to identify devices on a network and are made up of four sets of numbers separated by periods. Each set can range from 0 to 255, resulting in a total of approximately 4.3 billion unique addresses. However, due to the rapid growth of the internet, the number of available IPv4 addresses is now limited, leading to the development and adoption of IPv6, which uses a 128-bit number format.
50.
(417)What address uses a 128 bit addressing scheme?
Correct Answer
B. Internet protocol version 6(IPv6) address
Explanation
IPv6 addresses use a 128-bit addressing scheme, which allows for a significantly larger number of unique addresses compared to IPv4. This is necessary due to the increasing number of devices connected to the internet. IPv6 addresses are written in a hexadecimal format and are separated by colons.