Network+ Past Paper PDF

Summary

This document contains network+ exam questions. It covers various networking concepts, such as OSI model layers, network devices, and protocols.

Full Transcript

network+ QUESTION 1 What type of network uses radio signals for wireless LANs? A. PAN B. MAN C. WLAN D. SAN Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 2 Which OSI model layer is responsible for establishing, managing, and terminating ses...

network+ QUESTION 1 What type of network uses radio signals for wireless LANs? A. PAN B. MAN C. WLAN D. SAN Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 2 Which OSI model layer is responsible for establishing, managing, and terminating sessions between applications? A. Application B. Transport C. Session D. Data Link Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 3 What does DNS stand for in networking? A. Domain Network Service B. Domain Name System C. Distributed Network Service D. Direct Name System Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 4 Which device is used to segment a network and reduce collision domains? A. Switch B. Hub C. Repeater D. Firewall Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 5 In IP addressing, what does the subnet mask 255.255.255.0 indicate? A. Class A B. Class B C. Class C D. Class D Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 6 What protocol is used by devices on a network to automatically assign an IP address? A. DNS B. DHCP C. ARP D. NAT Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 7 Which tool is primarily used to troubleshoot physical network cabling issues? A. Ping B. Traceroute C. Multimeter D. Cable Tester Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 8 What is the primary purpose of a firewall in a network? A. To enable faster data transfer B. To increase network speed C. To filter traffic D. To provide encryption Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 9 What command would you use in Windows to check network connections and configuration details? A. tracert B. ping C. ifconfig D. ipconfig Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 10 Which command is used to display IP routes on a router or host? A. ping B. ipconfig C. tracert D. route Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 11 Which protocol is used for secure web traffic (HTTPS)? A. SSH B. SSL/TLS C. FTP D. SMTP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 12 What does the acronym “WPA” stand for in Wi-Fi security? A. Wireless Private Access B. Wi-Fi Protected Access C. Wireless Protection Algorithm D. Wi-Fi Public Access Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 13 What is the purpose of network segmentation? A. Increase internet speed B. Improve security and reduce congestion C. Enable routing D. Reduce bandwidth requirements Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 14 What type of attack uses numerous computers to overwhelm a target with traffic? A. DoS B. DDoS C. Phishing D. MITM Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 15 Which security protocol uses port 22? A. HTTPS B. FTP C. SSH D. SMTP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 16 What does MTU stand for in networking? A. Maximum Transfer Unit B. Minimum Transmission Unit C. Maximum Transmission Unit D. Minimum Transfer Unit Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 17 Which tool is used to determine the path data takes to reach a destination? A. Ping B. Netstat C. Traceroute D. nslookup Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 18 What device aggregates multiple network connections into one and performs no filtering? A. Router B. Switch C. Hub D. Firewall Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 19 What type of address does a switch use to forward data? A. IP address B. MAC address C. Port address D. Broadcast address Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 20 What is the function of the ARP protocol in a network? A. Resolves IP addresses to hostnames B. Resolves MAC addresses to IP addresses C. Resolves IP addresses to MAC addresses D. Resolves domain names to IP addresses Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 21 What is the default subnet mask for a Class B IP address? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.255 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 22 What is the binary equivalent of the IP address 192.168.1.1? A. 11000000.10101000.00000001.00000001 B. 10101000.11000000.00000001.00000001 C. 11000000.10101000.11111111.00000001 D. 10101000.11111111.11000000.00000001 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 23 Which IPv6 address type is used for one-to-many communication? A. Anycast B. Unicast C. Multicast D. Broadcast Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 24 How many usable host IP addresses are available in a /24 subnet? A. 254 B. 256 C. 512 D. 128 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 25 Which protocol allows the automatic configuration of IP addresses on a network? A. DHCP B. DNS C. ICMP D. ARP Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 26 Which port does HTTPS use by default? A. 21 B. 22 C. 80 D. 443 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 27 What protocol is used for sending emails? A. FTP B. SNMP C. SMTP D. HTTP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 28 Which protocol is responsible for the reliable transmission of data? A. UDP B. IP C. TCP D. ICMP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 29 What is the function of the POP3 protocol? A. Retrieve email from a mail server B. Send email to a mail server C. Manage DNS records D. Perform file transfers Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 30 Which port number is commonly associated with FTP data transfer? A. 20 B. 21 C. 25 D. 110 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 31 What type of connector is commonly used with twisted-pair Ethernet cables? A. RJ11 B. RJ45 C. BNC D. SC Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 32 Which cable type is used to connect similar devices directly? A. Straight-through cable B. Crossover cable C. Patch cable D. Serial cable Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 33 What is the maximum transmission distance for Category 5 twisted-pair cable? A. 50 meters B. 100 meters C. 300 meters D. 500 meters Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 34 What type of fiber optic cable is typically used for long-distance transmissions? A. Single-mode fiber B. Multi-mode fiber C. Twisted-pair D. Coaxial cable Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 35 Which cable type is most commonly used for connecting cable modems to ISP networks? A. Fiber optic cable B. Twisted-pair cable C. Coaxial cable D. Serial cable Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 36 In which topology are all devices connected to a central device? A. Bus topology B. Ring topology C. Star topology D. Mesh topology Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 37 Which IEEE standard is associated with Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11 D. IEEE 802.15 Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 38 What type of topology requires each device to be connected to every other device in the network? A. Star topology B. Ring topology C. Mesh topology D. Bus topology Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 39 Which technology standard is used to create Personal Area Networks (PANs)? A. Ethernet B. Bluetooth C. Wi-Fi D. Zigbee Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 40 Which type of network topology does Ethernet most commonly use? A. Bus B. Star C. Ring D. Mesh Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 41 Which frequency band is commonly used by Wi-Fi networks? A. 2.4 GHz and 5 GHz B. 3.5 GHz and 4 GHz C. 1.5 GHz and 2 GHz D. 5 GHz and 10 GHz Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 42 What is the maximum theoretical speed of 802.11ac Wi-Fi? A. 150 Mbps B. 300 Mbps C. 1.3 Gbps D. 10 Gbps Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 43 Which security protocol is considered the weakest for securing a wireless network? A. WPA B. WPA2 C. WPA3 D. WEP Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 44 Which wireless standard introduced MU-MIMO technology? A. 802.11a B. 802.11b C. 802.11n D. 802.11ac Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 45 What is the range limitation of the 5 GHz Wi-Fi band compared to the 2.4 GHz band? A. Greater range B. Similar range C. Shorter range D. Not used for Wi-Fi Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 46 What is the purpose of a packet sniffer? A. To encrypt data B. To intercept and log network traffic C. To detect malware D. To route data Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 47 What does SNMP stand for in network management? A. Simple Network Management Protocol B. Secure Network Management Protocol C. Standard Network Management Protocol D. Secure Network Management Procedure Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 48 Which tool is used to test connectivity between devices? A. nslookup B. Ping C. Traceroute D. Nmap Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 49 What command is used to look up the IP address associated with a domain name? A. Ping B. Traceroute C. nslookup D. ipconfig Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 50 What command provides information about active connections on a host? A. ifconfig B. ipconfig C. netstat D. traceroute Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 51 What layer of the OSI model is responsible for error detection and correction? A. Network B. Transport C. Data Link D. Session Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 52 Which OSI layer adds a header containing the IP address of the sender and receiver? A. Physical B. Data Link C. Network D. Transport Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 53 What protocol uses port 161 and is used for network device management? A. SNMP B. DHCP C. SMTP D. DNS Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 54 Which OSI model layer is responsible for the encryption of data? A. Application B. Presentation C. Network D. Transport Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 55 What type of network topology is best suited for fault tolerance? A. Star B. Ring C. Bus D. Mesh Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 56 Which protocol is used to automatically assign IP addresses within a certain range to devices in a network? A. ARP B. ICMP C. DNS D. DHCP Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 57 Which protocol is used by an IP router to discover the MAC address associated with a given IP address? A. DHCP B. ARP C. DNS D. ICMP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 58 In network monitoring, which metric measures the total time taken for a packet to travel from the source to the destination? A. Bandwidth B. Jitter C. Latency D. Throughput Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 59 What command is used on a Linux system to display the IP address configuration for all interfaces? A. ifconfig B. ipconfig C. tracert D. netstat Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 60 Which networking tool tests connectivity and provides details about intermediate hops? A. Ping B. Traceroute C. nslookup D. route Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 61 Which of the following is a symmetric encryption algorithm? A. RSA B. AES C. SHA-256 D. ECC Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 62 What does a firewall's "stateful inspection" mean? A. It inspects only outgoing traffic. B. It filters based on IP address only. C. It tracks the state of network connections. D. It filters based on port number only. Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 63 Which security protocol is commonly used in VPNs for encryption? A. TLS B. IPsec C. HTTP D. FTP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 64 Which of the following is an example of an asymmetric encryption algorithm? A. DES B. RSA C. 3DES D. Blowfish Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 65 What network security method uses physical separation of network segments to improve security? A. VLANs B. Firewalls C. DMZ D. IDS Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 66 Which CIDR notation represents a subnet mask of 255.255.255.240? A. /28 B. /29 C. /30 D. /31 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 67 How many total subnets are possible with a subnet mask of /26 in a Class C network? A. 2 B. 4 C. 8 D. 16 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 68 What is the range of valid host addresses for the subnet 192.168.1.0/25? A. 192.168.1.0 to 192.168.1.127 B. 192.168.1.1 to 192.168.1.126 C. 192.168.1.128 to 192.168.1.254 D. 192.168.1.129 to 192.168.1.255 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 69 What is the primary purpose of NAT (Network Address Translation)? A. Routing B. Switching C. Allow multiple devices to share a single public IP D. Encrypting data Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 70 Which address range is reserved for Automatic Private IP Addressing (APIPA)? A. 192.168.0.0/16 B. 169.254.0.0/16 C. 172.16.0.0/12 D. 10.0.0.0/8 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 71 What protocol is responsible for assigning IP addresses dynamically to devices in a network? A. DHCP B. DNS C. ARP D. SNMP Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 72 Which port is used by SSH for secure shell access? A. 21 B. 22 C. 80 D. 443 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 73 Which port does the POP3 protocol use by default? A. 25 B. 110 C. 143 D. 993 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 74 What is the primary purpose of the ICMP protocol? A. Assign IP addresses B. Manage routing C. Provide error messages and operational information D. Transfer files Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 75 Which protocol operates on port 53 and is responsible for translating domain names into IP addresses? A. DHCP B. DNS C. FTP D. SSH Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 76 What is the maximum bandwidth supported by Category 6 cable? A. 100 Mbps B. 1 Gbps C. 10 Gbps D. 100 Gbps Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 77 Which connector type is used with coaxial cables in Ethernet networks? A. RJ11 B. RJ45 C. BNC D. SC Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 78 What is the typical maximum distance for multi-mode fiber optic cable? A. 100 meters B. 300 meters C. 2 kilometers D. 40 kilometers Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 79 Which cable type uses light pulses to transmit data? A. Twisted-pair B. Coaxial C. Fiber optic D. Serial Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 80 What is the theoretical maximum data rate of the 802.11n Wi-Fi standard? A. 54 Mbps B. 150 Mbps C. 300 Mbps D. 600 Mbps Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 81 Which Wi-Fi security protocol is the most secure? A. WEP B. WPA C. WPA2 D. WPA3 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 82 What is the maximum theoretical range of 802.11ac Wi-Fi indoors? A. 30 meters B. 50 meters C. 70 meters D. 100 meters Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 83 What frequency bands are available for 802.11ax (Wi-Fi 6)? A. 2.4 GHz and 5 GHz B. 3.5 GHz and 5 GHz C. 5 GHz and 6 GHz D. 2.4 GHz, 5 GHz, and 6 GHz Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 84 What does MU-MIMO stand for in wireless networking? A. Multi-User Multiple Input, Multiple Output B. Multi-Unit Multi Input, Multi Output C. Multi-User Modular Input, Modular Output D. Multi-Unit Modular Input, Modular Output Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 85 Which tool is best for identifying packet loss and latency issues in a network? A. Ping B. Netstat C. Traceroute D. Wireshark Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 86 What does the term "MTU" represent in network configuration? A. Maximum Transmission Usage B. Maximum Transfer Unit C. Maximum Transmission Unit D. Minimum Transmission Usage Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 87 Which command provides detailed statistics about active network connections, routing tables, and network interfaces? A. Ping B. Netstat C. Traceroute D. Nslookup Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 88 Which troubleshooting tool can help diagnose DNS resolution issues? A. Ping B. Traceroute C. Nslookup D. Netstat Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 89 What is a common cause of "duplex mismatch" in Ethernet networks? A. Incorrect IP configuration B. Different speed settings on two network devices C. One device set to full-duplex, the other to half-duplex D. IP address conflict Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 90 Which type of virtual network adapter allows a virtual machine to communicate directly with the host network? A. Host-only B. Internal-only C. Bridged D. NAT Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 91 What cloud service model provides hardware, network, and storage as managed services to users? A. SaaS B. PaaS C. IaaS D. DaaS Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 92 In a cloud environment, which protocol is commonly used to enable secure remote access? A. FTP B. SSH C. Telnet D. HTTP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 93 Which technology is commonly used in virtualized networks to isolate network traffic and enhance security? A. VLANs B. MAC filtering C. SSID hiding D. NAT Correct Answer: AA Section: (none) Explanation Explanation/Reference: QUESTION 94 Which protocol is often used to connect virtual private cloud networks across different cloud environments? A. GRE B. IPsec C. PPTP D. TLS Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 95 Which type of redundancy involves running duplicate paths within a network? A. Power redundancy B. Path redundancy C. Hardware redundancy D. Configuration redundancy Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 96 What is a common protocol used in high availability systems to avoid an IP address conflict between routers? A. RIP B. EIGRP C. VRRP D. OSPF Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 97 Which protocol is specifically designed to allow automatic failover for a default gateway? A. HSRP B. DHCP C. ARP D. NAT Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 98 What is the primary purpose of implementing load balancing in a network? A. Data encryption B. Redundant power supply C. Distributing network traffic across multiple servers D. Compressing data for faster transfer Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 99 What does the term "RAID" stand for in data storage technology, commonly used for redundancy? A. Random Access Internal Disk B. Redundant Array of Independent Disks C. Remote Access Internet Disk D. Redundant Access Internal Device Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 100 Which protocol supports the division of an autonomous system into areas to optimize routing efficiency? A. BGP B. RIP C. OSPF D. EIGRP Correct Answer: C Section: (none) Explanation Explanation/Reference: Answer: C) OSPF (Open Shortest Path First) QUESTION 101 What is the default administrative distance for a directly connected route in Cisco devices? A. 0 B. 1 C. 10 D. 20 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 102 Which routing protocol is commonly used for exchanging routing information between different autonomous systems? A. RIP B. BGP C. OSPF D. EIGRP Correct Answer: B Section: (none) Explanation Explanation/Reference: Answer: B) BGP (Border Gateway Protocol) QUESTION 103 In OSPF, what is an ABR (Area Border Router) used for? A. To connect different OSPF areas B. To provide NAT functions C. To control broadcast domains D. To connect external networks Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 104 Which metric does RIP (Routing Information Protocol) use to determine the best route? A. Bandwidth B. Hop count C. Delay D. Load Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 105 Which address format is used to represent an IPv6 address within an IPv4 network? A. IPv4-mapped IPv6 address B. IPv6-mapped IPv4 address C. Dual-stack IPv6 address D. IPv4-compatible IPv6 address Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 106 What type of IPv6 address starts with "ff00::"? A. Global unicast B. Link-local C. Multicast D. Unique local Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 107 How many bits are used in the subnet identifier for IPv6 addresses? A. 16 B. 32 C. 48 D. 64 Correct Answer: A Section: (none) Explanation Explanation/Reference: A) 16 (as part of the /64 format typically used) QUESTION 108 What is the primary difference between an IPv4 address and an IPv6 address in terms of format? A. IPv4 uses binary notation, IPv6 uses decimal B. IPv4 uses 32 bits, IPv6 uses 128 bits C. IPv4 is only for internal networks, IPv6 is for external D. IPv4 has no reserved addresses, IPv6 does Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 109 Which IPv6 address is automatically assigned to interfaces for local communication? A. Unique local address B. Global unicast address C. Multicast address D. Link-local address Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 110 What type of firewall filters traffic based on the session state of the connection? A. Packet-filtering firewall B. Stateful firewall C. Application firewall D. Proxy firewall Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 111 What is the main purpose of a Network Intrusion Detection System (NIDS)? A. To route traffic efficiently B. To block unauthorized access C. To monitor and analyze network traffic for suspicious activity D. To encrypt network traffic Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 112 Which type of firewall operates at the application layer to inspect HTTP and other specific traffic? – A. Stateful firewall B. Proxy firewall C. Packet-filtering firewall D. Circuit-level gateway Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 113 What is the main function of a Unified Threat Management (UTM) device? A. Provides only firewall protection B. Combines multiple security services into one device C. Encrypts all network traffic D. Manages DNS requests Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 114 Which firewall feature prevents multiple devices from using the same public IP address for internet access? A. NAT B. Port mirroring C. DMZ D. Load balancing Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 115 Scenario: You have configured a router, but after a network cable is connected, devices can ping other devices on the local network but cannot access the internet. What might be the issue? A. Incorrect subnet mask on the router B. Incorrect DNS configuration C. A router interface is down D. The device IP address is outside the subnet range Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 116 Scenario: Your company is transitioning to IPv6 and has configured a /64 subnet for the network. However, a device fails to communicate with others in the same subnet. What could be the issue? A. Incorrect DNS settings B. Incorrect default gateway configuration C. Subnet prefix mismatch D. The network is not using DHCPv6 Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 117 Scenario: A user reports that their device is not getting an IP address when connected to the network. After running diagnostics, you notice that the device is not receiving any DHCP offer. What is the most likely cause? A. The DHCP server is down B. Incorrect IP address assigned to the device C. Incorrect DNS configuration D. The router is misconfigured Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 118 Scenario: You need to monitor bandwidth usage on a network switch to identify users who consume excessive bandwidth. Which protocol or tool should you use? A. SNMP B. DNS C. FTP D. ICMP Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 119 Scenario: After a recent security audit, you are instructed to block access to the company network from specific external IP addresses. Which firewall rule would be appropriate? A. Allow traffic from all sources except specific IPs B. Deny traffic from specific IPs to the internal network C. Allow traffic from specific IPs to the internet D. Disable all inbound traffic Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 120 Scenario: You are troubleshooting a firewall that is blocking all incoming connections on port 443. What could be the cause? A. The web server is misconfigured B. A stateful firewall has blocked the session C. Port forwarding is misconfigured on the router D. The ACL on the firewall does not permit inbound traffic on port 443 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 121 Scenario: Your company has received a Class B IP address block of 172.16.0.0/16. You need to divide it into 100 subnets. Which subnet mask should you use? A. /17 B. /18 C. /19 D. /22 Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 122 Scenario: A network is experiencing slow connectivity after assigning a subnet mask of 255.255.255.240 (/28). Devices are unable to communicate with some other subnets. What is the most likely issue? A. The subnet mask is too large for the number of devices on the network B. The subnet mask is too small, limiting the number of available host IPs C. The router is misconfigured D. The IP address range is incorrect Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 123 Scenario: A user is unable to access a website, but they can ping the server successfully. What is the most likely issue? A. DNS resolution failure B. Incorrect IP configuration C. Physical layer connectivity issue D. Incorrect subnet mask Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 124 Scenario: Your organization uses both IPv4 and IPv6 on the same network, but some clients are not able to reach the web servers. You have confirmed that both address types are configured properly. What could be the problem? A. DHCP is not configured for IPv6 B. The network is configured with a single default gateway for both IP versions C. Dual-stack network configuration is incomplete D. A firewall is blocking one of the IP versions Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 125 Scenario: You are setting up a new office and have to connect several computers to the network. After wiring the network, you notice that some machines intermittently lose connectivity. What is the most likely cause? A. Faulty switches B. Misconfigured routers C. Interference due to unshielded cables D. Incorrect subnet mask configuration Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 126 Scenario: You are working on a project where fiber optic cabling is required for high-speed data transmission between two buildings. What is the most suitable fiber optic cable type for this application? A. Single-mode fiber B. Multi-mode fiber C. Coaxial cable D. CAT6a cable Correct Answer: A Section: (none) Explanation Explanation/Reference: ________________________________________ QUESTION 127 Scenario: You are deploying a wireless network in a large office building. During testing, users report poor signal strength in certain areas. What is the most likely cause of the issue? A. Channel interference B. Incorrect wireless encryption settings C. Incorrect wireless AP placement D. DHCP server misconfiguration Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 128 Scenario: A wireless access point supports both 2.4 GHz and 5 GHz frequencies, but users report better performance when connected to the 5 GHz band. What is the primary advantage of the 5 GHz frequency band? A. Better range but lower speeds B. Less interference and higher speeds C. More channels but lower speeds D. Better compatibility with older devices Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 129 Scenario: A network administrator is troubleshooting a slow connection and runs a ping test to a remote server, but the response time is high. What is the next best step to diagnose the problem? A. Run a traceroute to identify the path and latency across intermediate routers B. Check the local firewall rules for blocking ping responses C. Change the IP address of the local machine D. Reboot the router Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 130 Scenario: A user reports that they cannot access internal resources, but their IP address is correctly configured. The router is properly routing traffic, but access to external resources is still working. What is most likely the issue? A. The DNS server is misconfigured B. A misconfigured firewall is blocking access to internal resources C. The DHCP server is down D. Incorrect IP routing tables Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 131 Scenario: You are setting up a cloud-based virtual machine, but the virtual network interface is unable to communicate with the on-premises network. What is the most likely cause of the problem? A. The virtual machine's security group settings do not allow traffic B. The cloud network interface is using the wrong IP range C. The on-premises firewall is blocking traffic from the cloud D. The cloud DNS settings are misconfigured Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 132 Scenario: Your organization is planning to migrate from an on-premises infrastructure to a hybrid cloud environment. Which method will ensure the secure communication between the on-premises data center and the cloud? A. Implementing a Virtual Private Network (VPN) connection B. Configuring a public IP address for the on-premises servers C. Setting up a local firewall to restrict inbound traffic D. Using a NAT gateway for cloud communication Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 133 Scenario: Your network has multiple internet connections for redundancy. However, during a failover event, users experience service interruptions. What could be causing this issue? A. Incorrect routing table configuration B. The redundant ISP link is not physically connected C. DNS servers are misconfigured D. The failover system is not using load balancing Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 134 Scenario: You are configuring HSRP on two routers in a network for high availability. After configuring the active and standby routers, users are still unable to reach the gateway. What is the most likely cause? A. The HSRP priority is incorrectly configured on the standby router B. The IP address of the virtual router is incorrectly configured C. The routers are not on the same subnet D. The standby router is not powered on Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 135 Scenario: A user can access the company’s internal website, but they cannot reach any external sites. You verify that the device has a correct IP address, subnet mask, and gateway configured. What is the next step to resolve the issue? A. Verify that DNS is correctly configured B. Verify that the DHCP server is functioning properly C. Verify that the switch ports are correctly configured D. Check the firewall for inbound rules Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 136 Scenario: After replacing a faulty router, your network is still experiencing connectivity issues. A traceroute command indicates that packets are not reaching beyond the first hop. What is the most likely cause of the problem? A. The router is not routing packets to the correct destination B. There is a problem with the local DNS server C. There is a VLAN misconfiguration D. The router's ARP table is outdated Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 137 Scenario: You receive a complaint that some users cannot access internal resources, while others have no issues. After checking the DHCP server, you find that it is assigning IP addresses correctly. What could be the issue? A. A misconfigured VLAN on the switches B. A faulty cable between the client and switch C. Incorrect DNS settings on the client devices D. A router misconfiguration blocking internal access Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 138 Scenario: You are asked to configure port forwarding on your router to allow external access to a web server located on an internal network. Which information is most important to configure? A. Internal IP address of the web server and external port number B. Internal IP address of the web server and the subnet mask C. Router's external IP address and port number D. Default gateway and DNS servers for the router Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 139 Scenario: After deploying a firewall in your network, users report that they can no longer access an external website. The firewall is configured with the default deny rule. What is the next step to resolve the issue? A. Add an outbound rule to allow web traffic on port 80 and 443 B. Reconfigure the router to allow traffic on port 80 and 443 C. Verify that DNS resolution is enabled on the client D. Disable the firewall temporarily to check for other issues Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 140 Scenario: Your company is being attacked with a Distributed Denial-of-Service (DDoS) attack. The network is experiencing a significant slowdown, and many legitimate users are unable to access resources. What is the best way to mitigate this attack? A. Block inbound traffic from the IPs involved in the DDoS attack B. Configure a new DNS server with filtering capabilities C. Use a content delivery network (CDN) to distribute the traffic D. Add more bandwidth to the network to handle the extra traffic Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 141 Scenario: You need to divide a Class C network (192.168.1.0/24) into four subnets. What subnet mask should you use? A. 255.255.255.128 B. 255.255.255.240 C. 255.255.255.192 D. 255.255.255.0 Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 142 Scenario: A company is moving to IPv6 and has allocated a global unicast address block. You need to assign an address to a device that is part of a specific subnet. Which part of the IPv6 address represents the subnet? A. The first 64 bits B. The first 48 bits C. The last 64 bits D. The middle 64 bits Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 143 Scenario: You are tasked with setting up a secure connection for a remote employee to access internal resources. You decide to use a VPN, but the connection is unstable. You discover the issue is related to TCP port 1723 being blocked. What is most likely the cause? A. The VPN protocol PPTP uses TCP port 1723, and it is being blocked by a firewall B. The VPN protocol L2TP uses TCP port 1723, and it is being blocked by the router C. The SSH protocol uses TCP port 1723, which is causing the issue D. The DNS server uses port 1723, which is preventing VPN communication Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 144 Scenario: A user cannot access a shared network drive, and you see the following message: "Access is denied." The user is on the same subnet, and other users can access the resource. What is the most likely cause? A. A firewall is blocking SMB traffic (TCP port 445) B. The user’s IP address is not within the same subnet range C. The user does not have appropriate permissions to access the drive D. DNS resolution is failing Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 145 Scenario: After wiring a new office with Cat5e cables, some users report intermittent connection drops. What is the most likely cause? A. The cable is not properly shielded against electromagnetic interference (EMI) B. The router is misconfigured C. The users' NICs are outdated D. The IP addresses are incorrectly assigned Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 146 Scenario: You are replacing an older coaxial cable with a fiber optic cable for higher-speed connections. After the installation, the connection speed is still lower than expected. What is the most likely cause? A. The fiber optic connectors were not installed properly B. The cable length exceeds the maximum allowed distance for fiber optic cables C. The fiber optic cable does not support high-speed data transfer D. The network switch does not support fiber optic connections Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 147 Scenario: You are setting up a wireless network in an office building with multiple floors. Some areas experience poor signal strength even though the wireless access points (APs) are placed strategically. What is the most likely cause? A. The wireless network is operating on a crowded channel B. The APs are too far from the devices C. There is interference from neighboring wireless networks D. The building's construction materials are blocking the signal Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 148 Scenario: A user reports that they cannot connect to the company's wireless network. The user is located in an area where the signal strength is low. Which of the following could resolve the issue? A. Configure a second SSID for low-signal areas B. Increase the transmit power of the wireless AP C. Decrease the wireless encryption strength D. Change the AP's IP address Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 149 Scenario: A user complains of intermittent network connectivity and slow speeds. You check the router and find that there is no packet loss. What should you check next to diagnose the issue? A. Verify if there is congestion on the network B. Check for firmware updates on the router C. Check the user's device for malware D. Check the subnet mask configuration Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 150 Scenario: A user’s computer is unable to obtain an IP address from the DHCP server, but other devices on the same network are successfully obtaining addresses. What is the most likely cause of the issue? A. The user's device has a static IP address configured B. The DHCP server is not properly configured C. The device’s DHCP lease is expired D. The router is blocking DHCP traffic Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 151 Scenario: A cloud-based server running a web application experiences periodic slowdowns during peak traffic hours. What could be the cause of this issue? A. The cloud server's resource allocation (CPU, RAM) is insufficient B. The web server's DNS settings are misconfigured C. The local router is experiencing congestion D. The internet connection is slow during peak hours Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 152 Scenario: You are setting up a virtual private cloud (VPC) in a public cloud environment. Which of the following components is required to allow secure access between your on-premises network and the cloud? A. VPN gateway B. Load balancer C. Subnet D. Virtual network interface card (vNIC) Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 153 Scenario: A network has a primary internet connection and a backup link. The backup link is not being used during primary link failure. What could be the cause? A. The backup link does not have the correct IP address configuration B. Routing protocols are not configured for failover C. The primary link's MAC address is still active D. The backup router is not powered on Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 154 Scenario: Your network has a redundant power supply for critical devices. However, during a power failure, some devices fail to switch to the backup power. What is the most likely cause? A. The UPS is not configured properly B. The power cables are not connected to the correct ports C. The devices are not connected to the UPS D. The backup power system is too small to handle all devices Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 155 Scenario: A company wants a network topology that allows each device to be connected to a central point, with minimal cabling required. The devices need to be easily replaced without disrupting the network. What topology should be used? A. Star B. Bus C. Ring D. Mesh Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 156 Scenario: In a bus topology, multiple devices share the same communication medium. Which of the following is a significant drawback of this topology? A. Single point of failure B. High cost of cables C. Complex to troubleshoot D. Devices are not directly connected Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 157 Scenario: A large enterprise network uses a mesh topology to connect multiple buildings. What is the primary benefit of using this topology? A. Easy to set up B. Redundancy and fault tolerance C. Cost-effective D. Simple to manage Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 158 Scenario: A user is unable to access a network service. You perform a diagnostic and see that a router forwards packets between different network segments. Which layer of the OSI model is responsible for this function? A. Layer 3 (Network Layer) B. Layer 2 (Data Link Layer) C. Layer 5 (Session Layer) D. Layer 4 (Transport Layer) Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 159 Scenario: A computer sends a message over the network, and the message is broken into smaller units called packets. The data link layer handles the addressing and packaging of these packets. Which OSI layer does this function belong to? A. Physical Layer B. Data Link Layer C. Transport Layer D. Application Layer Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 160 Scenario: A network administrator is troubleshooting a connection issue. The issue is related to managing the flow of data between two devices, ensuring that one device sends data only when the other is ready. Which OSI layer is involved in this function? A. Transport Layer B. Network Layer C. Data Link Layer D. Physical Layer Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 161 Scenario: An Ethernet switch is learning the MAC addresses of devices connected to it and using these addresses to forward traffic. What is this process called? A. Flooding B. Switching C. Learning D. Routing Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 162 Scenario: An Ethernet frame with a destination MAC address that is not in the MAC table will be sent to all ports of the switch except the port where the frame originated. What is this process known as? A. Broadcast B. Multicast C. Flooding D. Unicast Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 163 Scenario: A device on the network is configured with a full-duplex Ethernet connection. What does this mean? A. The device can only send or receive data at one time B. The device can send and receive data simultaneously C. The device is limited to 10 Mbps speeds D. The device uses token passing to communicate Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 164 Scenario: A hub is used in a network where devices must send data to all other devices connected to the hub. Which of the following is a disadvantage of using a hub? A. Devices connected to a hub are limited to half-duplex communication B. Increased collisions in the network C. Better fault tolerance D. Devices are logically isolated from each other Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 165 Scenario: A bridge is used to segment a large network into smaller segments. What is the primary function of a bridge in a network? A. To provide wireless access to the network B. To connect different network segments and filter traffic based on MAC addresses C. To route traffic between networks D. To amplify signals for longer transmission distances Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 166 Scenario: You need to connect multiple devices in a network and direct the traffic between devices in a way that minimizes collisions. Which device should you use? A. Hub B. Router C. Switch D. Repeater Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 167 Scenario: A company needs to connect two geographically separated buildings. What type of connection would be most appropriate to ensure reliable communication between them? A. Virtual Private Network (VPN) B. Fiber optic cable C. Satellite link D. Leased line Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 168 Scenario: A network designer needs to implement redundancy and ensure that network traffic can still flow if a device or link fails. What should the network designer implement to achieve this? A. Static routing B. Spanning Tree Protocol (STP) C. IP addressing scheme D. Port forwarding Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 169 Scenario: You are designing a network for a large campus with multiple floors. You want to minimize the amount of cabling and ensure scalability. Which network design approach would be most appropriate? A. Star topology with a centralized distribution frame B. Mesh topology with direct connections between all devices C. Bus topology with a single backbone cable D. Ring topology with redundant links Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 170 Scenario: A client is connecting to a web server and wants to establish a reliable, connection-oriented communication. Which protocol should be used? A. UDP B. ICMP C. TCP D. ARP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 171 Scenario: You are troubleshooting a network issue and notice that a certain application is using UDP instead of TCP. Which of the following is a characteristic of UDP? A. Reliable data transfer with error checking B. Connection-oriented and guarantees delivery C. Faster but does not guarantee delivery D. It is only used for secure communication Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 172 Scenario: You are setting up a server that needs to send real-time video streams. Which protocol is better suited for this application, TCP or UDP, and why? A. TCP, because it ensures reliable delivery of packets B. UDP, because it provides faster transmission and tolerates some packet loss C. TCP, because it allows for flow control and congestion management D. UDP, because it guarantees packet delivery Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 173 Scenario: A company’s network is experiencing congestion. You suspect that bandwidth is being consumed by non-business-related applications. What is the best way to manage this issue? A. Implement Quality of Service (QoS) to prioritize business-critical traffic B. Use a load balancer to distribute traffic evenly C. Install more network cables to increase bandwidth D. Disable non-business-related applications Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 174 Scenario: A company has multiple remote offices that need to securely connect to the corporate data center. Which technology would be most appropriate for this setup? A. MPLS (Multiprotocol Label Switching) B. VPN (Virtual Private Network) C. Cloud computing D. VLANs (Virtual Local Area Networks) Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 175 Scenario: A network administrator is tasked with ensuring high availability and fault tolerance in the company’s network. Which strategy is best for achieving this? A. Use multiple static routes to ensure traffic is always routed B. Implement redundancy through protocols like HSRP, VRRP, or GLBP C. Implement a single central router to manage all traffic D. Use dynamic IP addressing via DHCP for all devices Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 176 Which topology uses a central device to connect all other devices, and if the central device fails, the entire network is down? A. Star B. Mesh C. Bus D. Ring Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 177 Which network topology is most cost-effective but has a high risk of a single point of failure? A. Bus B. Star C. Mesh D. Tree Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 178 Which topology requires each device to be connected to every other device in the network? A. Mesh B. Star C. Bus D. Hybrid Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 179 Which OSI model layer is responsible for the physical transmission of data across a network medium? A. Physical Layer B. Network Layer C. Data Link Layer D. Transport Layer Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 180 Which OSI layer is responsible for error detection and correction and provides the logical addressing of devices? A. Data Link Layer B. Transport Layer C. Network Layer D. Application Layer Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 181 At which OSI layer would you find a router functioning? A. Layer 1 (Physical) B. Layer 2 (Data Link) C. Layer 3 (Network) D. Layer 4 (Transport) Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 182 Which OSI layer is responsible for ensuring end-to-end communication, reliability, and flow control? A. Application Layer B. Transport Layer C. Network Layer D. Data Link Layer Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 183 Which of the following Ethernet standards operates at 100 Mbps? A. 10BASE-T B. 100BASE-TX C. 1000BASE-T D. 10GBASE-T Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 184 In Ethernet, which of the following is responsible for managing the collision domain? A. Hub B. Router C. Switch D. Bridge Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 185 Which device operates in the Ethernet environment and allows communication between devices on different network segments, using the MAC address for forwarding decisions? A. Router B. Bridge C. Hub D. Switch Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 186 Which of the following devices operates in half-duplex mode, where it can either send or receive data, but not both at the same time? A. Switch B. Hub C. Bridge D. Router Correct Answer: BB Section: (none) Explanation Explanation/Reference: QUESTION 187 Which device is used to connect multiple devices on a local area network (LAN) and forwards data based on the MAC address? A. Switch B. Hub C. Router D. Bridge Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 188 What is the main function of a network bridge? A. It forwards packets based on IP addresses B. It forwards packets based on MAC addresses and segments collision domains C. It connects different networks with different protocols D. It increases the bandwidth of the network Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 189 Which type of network design separates different types of traffic, such as voice, video, and data, for better performance? A. Flat network design B. Hierarchical network design C. Segmented network design D. Multilayered network design Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 190 In a large corporate network, which protocol is commonly used to ensure that all network devices are able to communicate with each other? A. HTTP B. DNS C. SNMP D. DHCP Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 191 What type of network topology is typically used for connecting buildings in a campus environment, where each building is connected to a central backbone? A. Star B. Bus C. Tree D. Ring Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 192 Which of the following is a key feature of a software-defined network (SDN)? A. Decentralized management B. Centralized control of network traffic C. Physical devices control the flow of traffic D. Static IP address assignment Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 193 Which of the following is a feature of the Transmission Control Protocol (TCP)? A. Connectionless protocol B. Unreliable data transfer C. No error checking D. Reliable data transfer with error recovery Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 194 Which of the following protocols uses a three-way handshake to establish a connection? A. UDP B. ICMP C. TCP D. ARP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 195 Which protocol is typically used for applications where speed is critical and occasional data loss is acceptable, such as live video streaming? A. TCP B. FTP C. UDP D. HTTP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 196 Which of the following protocols is used by applications that require reliable, ordered, and error- checked delivery of data between applications? A. HTTP B. TCP C. UDP D. ARP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 197 What is the purpose of a VLAN in a network? A. To separate networks physically B. To segment broadcast domains within a network C. To increase the network speed D. To provide redundancy in a network Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 198 What technology is commonly used to secure network traffic over a public network, such as the internet, by creating an encrypted tunnel? A. IPsec B. MPLS C. RIP D. ARP Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 199 Which type of network operation involves automatically allocating IP addresses to devices in a network without requiring manual configuration? A. Static IP addressing B. Dynamic IP addressing C. NAT (Network Address Translation) D. Subnetting Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 200 What type of network device is used to direct packets based on the destination IP address to different network segments? A. Hub B. Switch C. Router D. Bridge Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 201 Which topology provides the most fault tolerance by allowing multiple paths for data transmission? A. Bus B. Ring C. Mesh D. Star Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 202 Which of the following is an advantage of using a star topology? A. Reduced cost due to minimal cable requirements B. Easy to expand and manage C. High fault tolerance due to redundancy D. No need for central networking devices Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 203 In which topology does each device send data to every other device in the network, and if any one device fails, the entire network is disrupted? A. Bus B. Star C. Ring D. Mesh Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 204 Which layer of the OSI model is responsible for routing packets between different networks? A. Physical Layer B. Data Link Layer C. Network Layer D. Transport Layer Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 205 Which OSI model layer is responsible for ensuring that data is presented in a readable format, including character encoding and data compression? A. Session Layer B. Application Layer C. Presentation Layer D. Data Link Layer Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 206 At which layer of the OSI model would you find protocols like HTTP, FTP, and DNS? A. Transport Layer B. Data Link Layer C. Application Layer D. Network Layer Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 207 Which Ethernet standard supports speeds of up to 10 Gbps over twisted-pair cables? A. 10BASE-T B. 100BASE-TX C. 1000BASE-T D. 10GBASE-T Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 208 Which of the following is a characteristic of Ethernet in a full-duplex mode? A. Data can be transmitted in only one direction at a time B. Data can be sent and received simultaneously C. Only one device can transmit data at any given time D. Ethernet frames are sent in a broadcast fashion Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 209 What type of cable is commonly used for Ethernet connections in a typical office environment? A. Fiber optic cable B. Coaxial cable C. Cat 5e or Cat 6 twisted-pair cable D. HDMI cable Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 210 What is the primary difference between a hub and a switch? A. A hub forwards data to specific devices, while a switch broadcasts to all devices B. A hub is faster than a switch C. A switch forwards data only to the device with the matching MAC address, while a hub broadcasts to all devices D. A switch does not support Ethernet communication Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 211 Which of the following devices operates at Layer 1 of the OSI model and simply amplifies and retransmits signals without analyzing or modifying the data? A. Hub B. Switch C. Router D. Bridge Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 212 Which of the following best describes the function of a network bridge? A. It increases the size of the collision domain B. It divides a network into segments and filters traffic based on MAC addresses C. It directs traffic based on IP addresses D. It connects two or more networks that use different protocols Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 213 What is the main advantage of using fiber optic cables for network infrastructure? A. High resistance to electromagnetic interference (EMI) B. Low cost C. Easy to install and configure D. Limited to short distances only Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 214 What is the purpose of a load balancer in a network design? A. To route traffic to different networks B. To prioritize traffic based on the type of application C. To distribute incoming network traffic across multiple servers D. To monitor network security and prevent unauthorized access Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 215 Which of the following network designs would be most appropriate for a scenario where multiple sites need to connect securely over the internet? A. VLAN B. VPN C. MPLS D. SD-WAN Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 216 Which of the following is true about UDP (User Datagram Protocol)? A. It provides reliable, connection-oriented communication B. It guarantees delivery of data and checks for errors C. It is faster than TCP but does not guarantee delivery D. It is used for establishing sessions between devices Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 217 Which of the following protocols is used to ensure the reliability of data transmission in a network? A. UDP B. TCP C. ARP D. DNS Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 218 Which of the following is an advantage of using UDP over TCP? A. More reliable delivery of data B. Slower but guarantees data arrival C. Faster transmission due to lower overhead D. It is connection-oriented Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 219 Which of the following technologies is commonly used to provide secure, encrypted communication between two devices over a public network like the internet? A. SSL/TLS B. DHCP C. FTP D. ARP Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 220 What is the main purpose of NAT (Network Address Translation) in a network? A. To assign static IP addresses to devices on the network B. To convert private IP addresses to public IP addresses C. To encrypt data packets for secure transmission D. To provide DNS resolution Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 221 Which of the following devices is responsible for forwarding packets between different networks based on the destination IP address? A. Switch B. Router C. Hub D. Bridge Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 222 What is the purpose of a network firewall? A. To direct traffic based on IP addresses B. To prevent unauthorized access to or from the network C. To enhance the signal strength of network traffic D. To route traffic between different subnets Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 223 In which network topology is a token used to manage access to the network medium? A. Star B. Mesh C. Ring D. Bus Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 224 Which topology would you use to reduce the impact of failures in a network where each device is connected to every other device, providing redundancy? A. Star B. Mesh C. Bus D. Tree Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 225 Which network topology is best for connecting a large number of devices over a wide area but requires a central device for communication? A. Star B. Bus C. Ring D. Hybrid Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 226 Which layer of the OSI model is responsible for establishing, maintaining, and terminating connections between devices? A. Application Layer B. Presentation Layer C. Session Layer D. Transport Layer Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 227 Which of the following is a function of the Transport Layer in the OSI model? A. Routing packets based on IP addresses B. Error detection and correction of data C. End-to-end communication and flow control D. Data encoding and compression Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 228 At which layer of the OSI model does a switch operate? A. Layer 2 (Data Link) B. Layer 3 (Network) C. Layer 4 (Transport) D. Layer 1 (Physical) Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 229 Which of the following Ethernet standards supports a data rate of 10 Gbps over fiber-optic cable? A. 10BASE-T B. 100BASE-TX C. 1000BASE-T D. 10GBASE-SR Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 230 What type of addressing scheme is used by Ethernet to forward frames across a network? A. IP addresses B. MAC addresses C. Port numbers D. Subnet masks Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 231 Which of the following Ethernet cables supports gigabit speeds (1000 Mbps)? A. Cat 5e B. Cat 3 C. Cat 6 D. Cat 5 Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 232 Which of the following devices is responsible for creating multiple collision domains in a network? A. Hub B. Switch C. Router D. Bridge Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 233 Which device operates at the Data Link layer of the OSI model and makes forwarding decisions based on MAC addresses? A. Hub B. Router C. Bridge D. Switch Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 234 What is a primary function of a network bridge? A. To route packets based on IP addresses B. To connect two LAN segments and forward frames based on MAC addresses C. To amplify signals on the network D. To connect devices using different protocols Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 235 Which of the following is the primary purpose of a DNS server? A. To provide a secure network communication channel B. To assign IP addresses to devices on a network C. To resolve domain names into IP addresses D. To monitor network traffic and prevent attacks Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 236 Which type of network topology combines multiple types of topologies to meet the needs of a specific organization or environment? A. Star B. Hybrid C. Mesh D. Tree Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 237 Which technology is used to establish a private, secure connection between devices over a public network, such as the internet? A. VLAN B. VPN C. SNMP D. RADIUS Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 238 Which of the following protocols operates at the Transport Layer and is connectionless? A. TCP B. UDP C. ICMP D. HTTP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 239 Which of the following is the main advantage of TCP over UDP? A. TCP provides faster communication by discarding corrupted packets B. TCP guarantees the delivery of packets and provides error-checking C. TCP does not require a three-way handshake to establish a connection D. TCP is used for real-time applications like video streaming Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 240 Which of the following protocols is used for email transmission and ensures reliable, error-free delivery of messages? A. SMTP B. POP3 C. IMAP D. FTP Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 241 What type of network address translation (NAT) is used to allow multiple devices in a private network to share a single public IP address? A. Static NAT B. Dynamic NAT C. Port Address Translation (PAT) D. Double NAT Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 242 Which of the following protocols is used by a router to determine the best path for forwarding packets across a network? A. RIP B. ARP C. HTTP D. DNS Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 243 What is the primary purpose of using VLANs in network design? A. To increase the speed of the network B. To allow the network to handle more devices without performance degradation C. To segment traffic and reduce broadcast domains D. To provide encryption for network traffic Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 244 Which of the following network tools is used for mapping IP address and checking the reachability of a device on a network? A. Traceroute B. Ping C. Telnet D. FTP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 245 Which protocol is used for secure communication over the internet, particularly for web browsing? A. FTP B. HTTPS C. SNMP D. ICMP Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 246 Which of the following is a primary function of a router in a network? A. It amplifies the signal to extend the network range B. It filters traffic based on MAC addresses C. It forwards packets between different networks based on IP addresses D. It prevents unauthorized access to the network Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 247 Which protocol is used by networked devices to automatically assign themselves IP addresses when a DHCP server is unavailable? A. DNS B. ARP C. APIPA D. ICMP Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 248 Which of the following best describes the function of a firewall in a network? A. It forwards data packets based on IP addresses B. It encrypts data to ensure secure communication C. It monitors and controls incoming and outgoing network traffic based on security rules D. It acts as a bridge between two different network segments Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 249 What is the maximum distance a 100BASE-TX Ethernet cable can run before signal degradation occurs? A. 50 meters B. 100 meters C. 200 meters D. 500 meters Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 250 Which of the following describes a key feature of IPv6 over IPv4? A. IPv6 allows for more granular subnetting B. IPv6 supports larger header sizes C. IPv6 provides a much larger address space (128-bit vs. 32-bit) D. IPv6 does not support NAT (Network Address Translation) Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 251 In a network environment, what is the purpose of a MAC address? A. To uniquely identify a network interface card (NIC) at Layer 2 B. To route packets between different networks at Layer 3 C. To assign IP addresses to devices in a subnet D. To handle error correction and retransmission of data Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 252 Which type of twisted-pair cable is shielded to protect against electromagnetic interference? A. UTP B. STP C. FTP D. SFTP Correct Answer: B Section: (none) Explanation Explanation/Reference:

Use Quizgecko on...
Browser
Browser