Networking

Download Q&A
Q. What happens to the source IP address of a packet when it passes through a NAT device?
  • A. It remains unchanged
  • B. It is replaced with the NAT device's public IP address
  • C. It is replaced with a random IP address
  • D. It is removed from the packet
Q. What happens when a link in a network using STP fails?
  • A. The network crashes
  • B. STP recalculates the topology
  • C. All devices are reset
  • D. Traffic is rerouted immediately without delay
Q. What is a common use case for Network Address Translation?
  • A. Connecting to a VPN
  • B. Hiding internal IP addresses from external networks
  • C. Improving network speed
  • D. Creating a mesh network
Q. What is a potential drawback of using NAT?
  • A. It simplifies network management
  • B. It can complicate peer-to-peer applications
  • C. It enhances security by hiding internal IP addresses
  • D. It reduces the number of required public IP addresses
Q. What is a Virtual LAN (VLAN)?
  • A. A physical network segment
  • B. A logical grouping of devices
  • C. A type of network protocol
  • D. A method of data encryption
Q. What is the default administrative distance of EIGRP?
  • A. 90
  • B. 110
  • C. 120
  • D. 20
Q. What is the default bridge priority value in Spanning Tree Protocol?
  • A. 0
  • B. 32768
  • C. 65535
  • D. 4096
Q. What is the default bridge priority value in STP?
  • A. 0
  • B. 32768
  • C. 65535
  • D. 4096
Q. What is the default VLAN ID for untagged traffic on most switches?
  • A. 1
  • B. 10
  • C. 100
  • D. 0
Q. What is the default VLAN on most switches?
  • A. VLAN 1
  • B. VLAN 10
  • C. VLAN 100
  • D. VLAN 0
Q. What is the effect of enabling PortFast on a switch port in STP?
  • A. The port will never participate in STP
  • B. The port transitions to the forwarding state immediately
  • C. The port will block all traffic
  • D. The port will only allow management traffic
Q. What is the first usable IP address in the subnet 10.0.0.0/8?
  • A. 10.0.0.0
  • B. 10.0.0.1
  • C. 10.0.0.255
  • D. 10.255.255.255
Q. What is the function of a VLAN Access Control List (VACL)?
  • A. To filter traffic between VLANs
  • B. To manage VLAN configurations
  • C. To monitor VLAN performance
  • D. To assign VLANs to ports
Q. What is the function of a VPN in network security?
  • A. To increase bandwidth
  • B. To create a secure connection over a public network
  • C. To manage network devices
  • D. To monitor network traffic
Q. What is the function of the IP protocol in the TCP/IP model?
  • A. To establish a connection between devices
  • B. To route packets across networks
  • C. To encrypt data for security
  • D. To manage network congestion
Q. What is the function of the Network Interface layer in the TCP/IP model?
  • A. To establish a connection between applications
  • B. To manage data flow between devices
  • C. To handle physical transmission of data
  • D. To provide routing information
Q. What is the main advantage of dynamic routing over static routing?
  • A. Easier to configure
  • B. More secure
  • C. Automatically adapts to network changes
  • D. Requires less bandwidth
Q. What is the main advantage of using NAT in a home network?
  • A. Increased bandwidth
  • B. Enhanced security
  • C. Simplified network configuration
  • D. Direct access to the internet
Q. What is the main advantage of using OSPF over EIGRP?
  • A. Faster convergence
  • B. Less bandwidth usage
  • C. Scalability
  • D. Simplicity of configuration
Q. What is the main disadvantage of using NAT?
  • A. It simplifies network configuration
  • B. It can complicate certain protocols that require end-to-end connectivity
  • C. It enhances security
  • D. It allows for IP address conservation
Q. What is the main function of a network intrusion detection system (NIDS)?
  • A. To block unauthorized access
  • B. To monitor network traffic for suspicious activity
  • C. To manage IP addresses
  • D. To encrypt data
Q. What is the main function of a router in a TCP/IP network?
  • A. To connect devices within the same network
  • B. To forward packets between different networks
  • C. To encrypt data packets
  • D. To manage bandwidth
Q. What is the main function of an Intrusion Detection System (IDS)?
  • A. To block unauthorized access
  • B. To monitor network traffic for suspicious activity
  • C. To encrypt data
  • D. To manage IP addresses
Q. What is the main purpose of a router in a WAN?
  • A. To connect devices within a local network
  • B. To filter traffic based on MAC addresses
  • C. To route data packets between different networks
  • D. To provide wireless connectivity
Q. What is the main purpose of error control in networking?
  • A. To increase bandwidth
  • B. To ensure data integrity during transmission
  • C. To manage network traffic
  • D. To provide encryption
Q. What is the main reason NAT is used in home networks?
  • A. To improve internet speed
  • B. To allow multiple devices to access the internet using one IP address
  • C. To provide a direct connection to the internet
  • D. To enable wireless connectivity
Q. What is the maximum data rate of 802.11ac Wi-Fi technology?
  • A. 54 Mbps
  • B. 600 Mbps
  • C. 1.3 Gbps
  • D. 3.5 Gbps
Q. What is the maximum data rate of the 802.11ac Wi-Fi standard?
  • A. 54 Mbps
  • B. 600 Mbps
  • C. 1.3 Gbps
  • D. 3.5 Gbps
Q. What is the maximum distance for a typical WAN connection using fiber optics?
  • A. Up to 1 km
  • B. Up to 10 km
  • C. Up to 100 km
  • D. Over 100 km
Q. What is the maximum hop count for RIP?
  • A. 10
  • B. 15
  • C. 20
  • D. 30
Showing 31 to 60 of 237 (8 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely