Networking Concepts.pdf

Full Transcript

Networking Concepts 1. Which layer of the OSI model is responsible for logical addressing? a) Network layer b) Data link layer c) Transport layer d) Session layer 2. What is the maximum number of IP addresses available in a /24 subnet? a) 254 b) 256...

Networking Concepts 1. Which layer of the OSI model is responsible for logical addressing? a) Network layer b) Data link layer c) Transport layer d) Session layer 2. What is the maximum number of IP addresses available in a /24 subnet? a) 254 b) 256 c) 128 d) 512 3. Which protocol operates at the Transport layer and provides connectionless, unreliable data delivery? a) TCP b) UDP c) IP d) ICMP 4. What is the purpose of NAT (Network Address Translation)? a) To encrypt network traffic b) To convert private IP addresses to public IP addresses c) To assign IP addresses dynamically d) To filter malicious traffic 5. Which IPv6 address type is used for link-local communication? a) ::1 b) 2001:db8:: c) fe80:: d) ff02:: Network Implementation 6. What is the maximum cable length for Cat6 Ethernet in a 1000BASE-T network? a) 100 meters b) 50 meters c) 150 meters d) 200 meters 7. Which Wi-Fi standard operates in both 2.4 GHz and 5 GHz bands? a) 802.11b b) 802.11g c) 802.11n d) 802.11ac 8. What device operates at Layer 2 of the OSI model and uses MAC addresses to forward frames? a) Router b) Switch c) Hub d) Firewall 9. Which routing protocol is considered a link-state protocol? a) RIP b) OSPF c) BGP d) EIGRP 10. What is the purpose of a VLAN? a) To encrypt network traffic b) To segment a network logically c) To provide wireless access d) To translate IP addresses Network Operations 11. Which protocol is used to automatically assign IP addresses to devices on a network? a) DHCP b) DNS c) SNMP d) FTP 12. What is the primary purpose of SNMP (Simple Network Management Protocol)? a) To encrypt network traffic b) To monitor and manage network devices c) To assign IP addresses d) To resolve domain names 13. Which port number is commonly used for HTTPS traffic? a) 80 b) 443 c) 22 d) 21 14. What is the purpose of a syslog server? a) To centralize log collection and analysis b) To assign IP addresses c) To filter network traffic d) To encrypt data transmissions 15. Which command can be used to test network connectivity to a specific IP address? a) ipconfig b) nslookup c) ping d) tracert Network Security 16. What is the purpose of a firewall? a) To encrypt network traffic b) To filter network traffic based on rules c) To assign IP addresses d) To compress data for transmission 17. Which encryption protocol is commonly used for securing wireless networks? a) WEP b) WPA c) WPA2 d) SSL 18. What is a man-in-the-middle attack? a) A type of social engineering attack b) An attack where the attacker intercepts communication between two parties c) A denial-of-service attack d) A malware infection 19. Which authentication method uses a username, password, and a temporary code? a) Single-factor authentication b) Two-factor authentication c) Biometric authentication d) Certificate-based authentication 20. What is the purpose of a honeypot in network security? a) To detect and analyze potential attacks b) To encrypt network traffic c) To assign IP addresses dynamically d) To filter spam emails Network Troubleshooting 21. Which command can be used to view the routing table on a Windows computer? a) ipconfig b) netstat c) route print d) tracert 22. What tool is used to capture and analyze network traffic? a) Ping b) Wireshark c) nslookup d) ipconfig 23. Which layer of the OSI model would you investigate first if a user cannot access a website by its domain name? a) Physical layer b) Data link layer c) Network layer d) Application layer 24. What is the purpose of the traceroute (tracert) command? a) To test network connectivity b) To show the path packets take to reach a destination c) To display the routing table d) To assign IP addresses 25. Which of the following is NOT a common cause of network latency? a) Network congestion b) Distance between devices c) Encryption d) MAC address conflicts Additional Questions 26. What is the maximum transmission unit (MTU) for standard Ethernet frames? a) 1500 bytes b) 1000 bytes c) 2000 bytes d) 512 bytes 27. Which protocol is used to map IP addresses to MAC addresses? a) DHCP b) ARP c) DNS d) SNMP 28. What is the purpose of a proxy server? a) To assign IP addresses b) To act as an intermediary between clients and servers c) To encrypt network traffic d) To route packets between networks 29. Which IPv6 address is equivalent to the IPv4 loopback address? a) ::1 b) fe80:: c) 2001:db8:: d) ff02:: 30. What is the purpose of STP (Spanning Tree Protocol)? a) To prevent routing loops b) To encrypt network traffic c) To assign IP addresses dynamically d) To filter malicious traffic 31. Which of the following is NOT a valid IP address? a) 192.168.1.1 b) 10.0.0.256 c) 172.16.0.1 d) 224.0.0.1 32. What is the purpose of a RADIUS server? a) To provide centralized authentication and authorization b) To assign IP addresses dynamically c) To filter network traffic d) To encrypt data transmissions 33. Which protocol is used for sending email? a) POP3 b) IMAP c) SMTP d) HTTP 34. What is the purpose of QoS (Quality of Service)? a) To encrypt network traffic b) To prioritize certain types of network traffic c) To assign IP addresses dynamically d) To filter malicious traffic 35. Which of the following is a characteristic of a hub? a) It operates at Layer 2 of the OSI model b) It uses MAC addresses to forward frames c) It creates separate collision domains d) It broadcasts data to all connected devices 36. What is the purpose of a DMZ (Demilitarized Zone)? a) To provide a secure area for public-facing servers b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter spam emails 37. Which protocol is used to synchronize time across network devices? a) SNMP b) NTP c) DHCP d) DNS 38. What is the purpose of PAT (Port Address Translation)? a) To assign IP addresses dynamically b) To map multiple private IP addresses to a single public IP address c) To encrypt network traffic d) To filter malicious traffic 39. Which of the following is NOT a valid IPv6 address representation? a) 2001:0db8:85a3:0000:0000:8a2e:0370:7334 b) 2001:db8:85a3::8a2e:370:7334 c) 2001:db8:85a3:0:0:8a2e:370:7334 d) 2001::db8:85a3::8a2e:370:7334 40. What is the purpose of a VLAN trunk? a) To connect multiple switches and carry traffic for multiple VLANs b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter malicious traffic 41. Which protocol is used to dynamically assign IPv6 addresses? a) DHCPv6 b) SLAAC c) Both A and B d) Neither A nor B 42. What is the purpose of a load balancer? a) To distribute network traffic across multiple servers b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter malicious traffic 43. Which of the following is NOT a valid subnet mask? a) 255.255.255.0 b) 255.255.0.0 c) 255.255.255.255 d) 255.0.255.0 44. What is the purpose of CSMA/CD in Ethernet networks? a) To encrypt network traffic b) To detect and handle collisions c) To assign IP addresses dynamically d) To filter malicious traffic 45. Which protocol is used for secure remote administration of network devices? a) Telnet b) SSH c) HTTP d) FTP 46. What is the purpose of a DHCP relay agent? a) To forward DHCP requests between subnets b) To encrypt network traffic c) To filter malicious traffic d) To assign static IP addresses 47. Which of the following is NOT a characteristic of fiber optic cable? a) Immune to electromagnetic interference b) Capable of long-distance transmission c) Lower bandwidth compared to copper cable d) Uses light to transmit data 48. What is the purpose of a DNS server? a) To assign IP addresses dynamically b) To resolve domain names to IP addresses c) To encrypt network traffic d) To filter malicious traffic 49. Which protocol is used for transferring files securely? a) FTP b) SFTP c) HTTP d) SMTP 50. What is the purpose of a VLAN access port? a) To carry traffic for multiple VLANs b) To connect end devices to a single VLAN c) To encrypt network traffic d) To filter malicious traffic 51. Which of the following is NOT a valid IPv4 address class? a) Class A b) Class B c) Class C d) Class E 52. What is the purpose of a VPN (Virtual Private Network)? a) To create a secure connection over a public network b) To assign IP addresses dynamically c) To filter network traffic d) To resolve domain names 53. Which protocol is used for network device discovery and management? a) DHCP b) DNS c) SNMP d) FTP 54. What is the purpose of NAC (Network Access Control)? a) To encrypt network traffic b) To control device access to a network based on policies c) To assign IP addresses dynamically d) To filter malicious traffic 55. Which of the following is NOT a characteristic of a switch? a) It operates at Layer 2 of the OSI model b) It uses MAC addresses to forward frames c) It creates separate collision domains d) It broadcasts data to all connected devices 56. What is the purpose of a syslog server? a) To centralize log collection and analysis b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter malicious traffic 57. Which protocol is used for email retrieval? a) SMTP b) POP3 c) HTTP d) FTP 58. What is the purpose of RAID (Redundant Array of Independent Disks)? a) To encrypt network traffic b) To provide data redundancy and improve performance c) To assign IP addresses dynamically d) To filter malicious traffic 59. Which of the following is NOT a valid IPv6 address type? a) Unicast b) Multicast c) Broadcast d) Anycast 60. What is the purpose of a jump server? a) To provide secure access to other servers in a network b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter malicious traffic 61. Which protocol is used for secure web browsing? a) HTTP b) HTTPS c) FTP d) SMTP 62. What is the purpose of a VLAN trunking protocol (VTP)? a) To encrypt network traffic b) To manage and distribute VLAN information across switches c) To assign IP addresses dynamically d) To filter malicious traffic 63. Which of the following is NOT a valid wireless encryption method? a) WEP b) WPA c) WPA2 d) WPS 64. What is the purpose of a content filter? a) To encrypt network traffic b) To block access to specific websites or content c) To assign IP addresses dynamically d) To manage VLAN information 65. Which protocol is used for remote desktop access? a) SSH b) Telnet c) RDP d) FTP 66. What is the purpose of a honeypot? a) To encrypt network traffic b) To detect and analyze potential attacks c) To assign IP addresses dynamically d) To filter malicious traffic 67. Which of the following is NOT a valid network topology? a) Bus b) Star c) Mesh d) Circle 68. What is the purpose of OSPF (Open Shortest Path First)? a) To encrypt network traffic b) To determine the best route for packet delivery c) To assign IP addresses dynamically d) To filter malicious traffic 69. Which protocol is used for voice communication over IP networks? a) HTTP b) FTP c) SIP d) SMTP 70. What is the purpose of a patch panel? a) To encrypt network traffic b) To organize and manage network cable connections c) To assign IP addresses dynamically d) To filter malicious traffic 71. Which of the following is NOT a characteristic of a router? a) It operates at Layer 3 of the OSI model b) It uses IP addresses to forward packets c) It creates separate broadcast domains d) It broadcasts data to all connected devices 72. What is the purpose of a TACACS+ server? a) To provide centralized authentication and authorization b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter malicious traffic 73. Which protocol is used for network time synchronization? a) SNMP b) NTP c) DHCP d) DNS 74. What is the purpose of a WAF (Web Application Firewall)? a) To encrypt network traffic b) To protect web applications from specific attacks c) To assign IP addresses dynamically d) To manage VLAN information 75. Which of the following is NOT a valid IP addressing method? a) Static b) Dynamic c) Automatic d) Random 76. What is the purpose of a reverse proxy? a) To encrypt network traffic b) To protect and optimize access to web servers c) To assign IP addresses dynamically d) To filter malicious traffic 77. Which protocol is used for secure file transfer? a) FTP b) SFTP c) HTTP d) SMTP 78. What is the purpose of a RADIUS server? a) To provide centralized authentication and authorization b) To assign IP addresses dynamically c) To encrypt network traffic d) To filter malicious traffic 79. Which of the following is NOT a valid wireless standard? a) 802.11a b) 802.11b c) 802.11g

Use Quizgecko on...
Browser
Browser